Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
08-05-2021 07:03
Static task
static1
Behavioral task
behavioral1
Sample
d7cfcefabc22cecb94af7cc290bef648.exe
Resource
win7v20210410
General
-
Target
d7cfcefabc22cecb94af7cc290bef648.exe
-
Size
188KB
-
MD5
d7cfcefabc22cecb94af7cc290bef648
-
SHA1
45844bd2f247d3e62e6d90762c84187e7f6c83cc
-
SHA256
76919d1b955f642d02652b03274a9d447d386b8071d1f51f41a22cc708a7db31
-
SHA512
19b78fb987fc585559489e75bb4e9c9a9ee43b2c2a32d7c8dc329cd02d3ca62fa8c0787c2bef6f7c3138ab6d0969a31591c493f8fb77a63aed7880307bda1630
Malware Config
Extracted
redline
firstma
45.67.231.56:3214
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/3212-114-0x0000000001FE0000-0x0000000001FFE000-memory.dmp family_redline behavioral2/memory/3212-116-0x0000000002390000-0x00000000023AD000-memory.dmp family_redline behavioral2/memory/4428-135-0x0000000002340000-0x000000000235E000-memory.dmp family_redline behavioral2/memory/4428-137-0x0000000004920000-0x000000000493D000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\rvs.exe family_redline C:\Users\Admin\AppData\Local\Temp\rvs.exe family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
servs.exervs.exepid process 4428 servs.exe 4548 rvs.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d7cfcefabc22cecb94af7cc290bef648.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation d7cfcefabc22cecb94af7cc290bef648.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Windows directory 1 IoCs
Processes:
MicrosoftEdge.exedescription ioc process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
MicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DomStorageState MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\NextUpdateDate = "327271274" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Extensible Cache MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar\WebBrowser MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "268435456" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "395205405" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url1 = "https://www.facebook.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BingPageData MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = db0c2411d943d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IntelliForms MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA\Certificates\83DA05A9886F7658BE MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\CRLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\DatabaseComplete = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = b2699bf6d843d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\Certificates MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$vBulletin 3 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$http://www.typepad.com/ MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url4 = "https://login.live.com/" MicrosoftEdge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
d7cfcefabc22cecb94af7cc290bef648.exeservs.exepid process 3212 d7cfcefabc22cecb94af7cc290bef648.exe 4428 servs.exe 4428 servs.exe 4428 servs.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
MicrosoftEdgeCP.exepid process 740 MicrosoftEdgeCP.exe 740 MicrosoftEdgeCP.exe 740 MicrosoftEdgeCP.exe 740 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
d7cfcefabc22cecb94af7cc290bef648.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeAUDIODG.EXEservs.exervs.exeMicrosoftEdgeCP.exedescription pid process Token: SeDebugPrivilege 3212 d7cfcefabc22cecb94af7cc290bef648.exe Token: SeDebugPrivilege 3524 MicrosoftEdge.exe Token: SeDebugPrivilege 3524 MicrosoftEdge.exe Token: SeDebugPrivilege 3524 MicrosoftEdge.exe Token: SeDebugPrivilege 3524 MicrosoftEdge.exe Token: SeDebugPrivilege 4240 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4240 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4240 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4240 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 4240 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 4240 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 4240 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 4240 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 4240 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 4240 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 4240 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 4240 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 4240 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 4240 MicrosoftEdgeCP.exe Token: 33 5000 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5000 AUDIODG.EXE Token: SeShutdownPrivilege 4240 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 4240 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4428 servs.exe Token: SeDebugPrivilege 4548 rvs.exe Token: SeDebugPrivilege 5060 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 5060 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 4240 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 4240 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 4240 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 4240 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 4240 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 4240 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 4240 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 4240 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 4240 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 4240 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 4240 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 4240 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 4240 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 4240 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 4240 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 4240 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 4240 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 4240 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 4240 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 4240 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 4240 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 4240 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 4240 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 4240 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 4240 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 4240 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 4240 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 4240 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 4240 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 4240 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 4240 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 4240 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 4240 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 4240 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 4240 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 4240 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 4240 MicrosoftEdgeCP.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exepid process 3524 MicrosoftEdge.exe 740 MicrosoftEdgeCP.exe 740 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
d7cfcefabc22cecb94af7cc290bef648.exeMicrosoftEdgeCP.exedescription pid process target process PID 3212 wrote to memory of 4428 3212 d7cfcefabc22cecb94af7cc290bef648.exe servs.exe PID 3212 wrote to memory of 4428 3212 d7cfcefabc22cecb94af7cc290bef648.exe servs.exe PID 3212 wrote to memory of 4428 3212 d7cfcefabc22cecb94af7cc290bef648.exe servs.exe PID 3212 wrote to memory of 4548 3212 d7cfcefabc22cecb94af7cc290bef648.exe rvs.exe PID 3212 wrote to memory of 4548 3212 d7cfcefabc22cecb94af7cc290bef648.exe rvs.exe PID 3212 wrote to memory of 4548 3212 d7cfcefabc22cecb94af7cc290bef648.exe rvs.exe PID 740 wrote to memory of 4644 740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 740 wrote to memory of 4644 740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 740 wrote to memory of 4644 740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 740 wrote to memory of 4644 740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 740 wrote to memory of 4240 740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 740 wrote to memory of 4240 740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 740 wrote to memory of 4240 740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 740 wrote to memory of 4240 740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 740 wrote to memory of 4240 740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 740 wrote to memory of 4240 740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 740 wrote to memory of 4240 740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 740 wrote to memory of 4240 740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 740 wrote to memory of 4240 740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 740 wrote to memory of 4240 740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 740 wrote to memory of 4240 740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 740 wrote to memory of 4240 740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 740 wrote to memory of 4240 740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 740 wrote to memory of 4240 740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 740 wrote to memory of 4240 740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 740 wrote to memory of 4240 740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 740 wrote to memory of 4240 740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 740 wrote to memory of 4240 740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7cfcefabc22cecb94af7cc290bef648.exe"C:\Users\Admin\AppData\Local\Temp\d7cfcefabc22cecb94af7cc290bef648.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\servs.exe"C:\Users\Admin\AppData\Local\Temp\servs.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\rvs.exe"C:\Users\Admin\AppData\Local\Temp\rvs.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3b81⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\4STTKXGU.cookieMD5
0518e5b90b9315908cc9560db5ef8575
SHA1b82e97d87f8ca1289edb84b22333a014e5f9cbb8
SHA256594266e943d75df077e3de9dfedb7a4940af245f662e1727bf5813d452bd6c55
SHA5126f97dd0c5a1049dbb2cfa6de7b4ce9c8f0097d4551773d92c80b58cf6250740e26ecffca845a73eb9449d19e5a49c80783dab2b7ccbd7794e8daf3a95f2abfc4
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\DZGWV7B6.cookieMD5
10be0046b4a8b6ddfd91f60cce01fb6a
SHA160817767b698bbf4ccccc9cf8bdda0f9c26d92ff
SHA256116e00ce8d18df133e102e333aca4c0c1ae4a97f06c20bbdf350b54bc12fe656
SHA5126c316a4e073212a2102c7ce475aacc9dc4d269b2b67aa971cf31803bdd0f4f203679697a562333ba4807413bde09c78f1b4bf1a9479087f6fe883edfcb156c09
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\QU1J8OIC.cookieMD5
12534468d236a77e6bc80c8ff603883f
SHA133bcf8a3d813a661bfdf073b287637686e527fa8
SHA256559365863dc19fdd4b268a67d0a3017863956ceed6c2572123993f7d5ec3f32c
SHA5123977f5257ac812575ef2d78beecc01b71dfa47a603d6f4d58c0e2c794b327f895372cc6b41ac9a17f633d861e441f501dc6d396fee83cf7c528ce89d2cb2489a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DMD5
4da169703a57baca38f256b2280faecd
SHA1e87a670377f5d5467900e49f3f76dda55a132090
SHA256b667c70765fde990bfbcd50d0142f6555751dc700d17c2ef67cb33154376e5cc
SHA5121778fe73ac495141d11b13fb30d41e5bf233919df5060de5fb185a6b99f579efbfcb785e53179f8e43316023c2f1fa43db7a17edc638b5aa145f223032a29b67
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157MD5
f7dcb24540769805e5bb30d193944dce
SHA1e26c583c562293356794937d9e2e6155d15449ee
SHA2566b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea
SHA512cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\5EE9003E3DC4134E8CF26DC55FD926FAMD5
896448ad42085ea2a486ba8fd0ac0cae
SHA14d9abc283635aa9f7eb1bdb2231a0915c374cd8c
SHA2564f7cce8f5074099dba71e1ec72394a0ca49e864bd93910a37adf5f97feacce3c
SHA512b0ced50da82599839b5d46178f52e994e12cbcadd848a5f32788218493f4abb4e0fcb9eb1d908b17ddd0cd147e218146678cb556c72b52f5b947dc801726f871
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
4520694ea0e43a9d965e80f78326d6f3
SHA118c3818ef4557df202a7bedc2926fbe0026b847a
SHA256c36197ecfd61038295dfbdcbe6f8d00cbe6f535f48b5eeb053a38040dc85090d
SHA512a63271a7346808ecd6c18add2e93d7870799f0d5365c68cfc5218bd328dcc93dea511c86515fba7116fcca0356e96c2292dee1e577303c3041faea940060ef3b
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DMD5
bb5062aac7d4dd6317a029182b24c2e8
SHA1febc31c844101893186232a37a0717e0aae66449
SHA25646ac81d4aaeebf527bbb355f2fe916712ab9648f0facb288db220f9826fa337b
SHA512cef5629ddd96887373cf191585a49dcd1e7772510524e0b67ced392d36c531a89167baedcb67764c76506bcf995fc72ae12ba215848b927e17a3026bb232c7c7
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157MD5
8d2de965d2b9c97b54993ca30912e903
SHA1afae3deb25735a51b12ea02f006f756e403fc38a
SHA256afd3e03ec651c7062937193809523ea1cf6cb838901798cdc663c8722bb54f07
SHA512d0ef0e150e5d8980e5e9d551319503fd14e583f8864d51d8fde1b54589fdc4ece3b56c9f128ea74726bf0725eb7b4802d644eeaa46fbc3b3369b18fc543acc32
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\5EE9003E3DC4134E8CF26DC55FD926FAMD5
6220047a5e41c45f4e48ce8de4c2821f
SHA110cafccb4e0fefade1cc51e93f14bd44bbf2c944
SHA256acb23647b323ace380df166f991f84ee726f1e367651c583ed8000ada94c04c0
SHA51245b8c76ce8d24150ebc2d5ea9d6706b0ed721d86f79a21f8a41667ce4837c78e2b6909163cb35471e932fb883f5ee87600773f111da5e7c8fe7bf7597d09d892
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
d709f6ed85535bb8c4c41b6f00dc2ca2
SHA1e594e81952b53d26b02e5d94a72c2971fc12c4ee
SHA25610c250e4d40cbceb1a298b192c525a754b7687636cf85be62772fbb53424a5ed
SHA512877de6435f5d841e578349fbdcf0982778bb070c4cedae339475c63ac45f2de2cda5d84661a819940a7dc00e404bdd22223a243831327dc0915ae069138e9e6a
-
C:\Users\Admin\AppData\Local\Temp\rvs.exeMD5
830791e50ebd569c3169a7860455dde9
SHA1decc913ea54066aca3bfd0e3bc791b3e10840eb5
SHA2565b2c3cc04375edc534a731821cefd6563d358035ed737ceb66f69b0f54077a66
SHA512b50ce56df27fb5dc8a8645e5131821e6d3d9cf4589510e004f0a9fb212e1a7fdc35831109a7f5067856aa0f0b901fbea112799a9badbdfa4100c51852004ed9e
-
C:\Users\Admin\AppData\Local\Temp\rvs.exeMD5
830791e50ebd569c3169a7860455dde9
SHA1decc913ea54066aca3bfd0e3bc791b3e10840eb5
SHA2565b2c3cc04375edc534a731821cefd6563d358035ed737ceb66f69b0f54077a66
SHA512b50ce56df27fb5dc8a8645e5131821e6d3d9cf4589510e004f0a9fb212e1a7fdc35831109a7f5067856aa0f0b901fbea112799a9badbdfa4100c51852004ed9e
-
C:\Users\Admin\AppData\Local\Temp\servs.exeMD5
14c4511f1f708818203e97f28adcb422
SHA1e92fe1d751db00e1a78e62383884ed50ad7562b1
SHA2564cd909b0c0733cb1191dcbb20ef2a62683873c902c0ae037f33c6cb779a34be5
SHA5128d1907ebbbd6b856767a37ca385a74cfdd1265303e245ec4656a9f5812b79a0cc4730e4dec66fffca8346e32c80144ce724b118bed1f4a7acd92876d6f4ffcf2
-
C:\Users\Admin\AppData\Local\Temp\servs.exeMD5
14c4511f1f708818203e97f28adcb422
SHA1e92fe1d751db00e1a78e62383884ed50ad7562b1
SHA2564cd909b0c0733cb1191dcbb20ef2a62683873c902c0ae037f33c6cb779a34be5
SHA5128d1907ebbbd6b856767a37ca385a74cfdd1265303e245ec4656a9f5812b79a0cc4730e4dec66fffca8346e32c80144ce724b118bed1f4a7acd92876d6f4ffcf2
-
memory/3212-120-0x00000000022C3000-0x00000000022C4000-memory.dmpFilesize
4KB
-
memory/3212-124-0x00000000022C4000-0x00000000022C6000-memory.dmpFilesize
8KB
-
memory/3212-128-0x00000000066A0000-0x00000000066A1000-memory.dmpFilesize
4KB
-
memory/3212-127-0x0000000006490000-0x0000000006491000-memory.dmpFilesize
4KB
-
memory/3212-126-0x0000000005F70000-0x0000000005F71000-memory.dmpFilesize
4KB
-
memory/3212-114-0x0000000001FE0000-0x0000000001FFE000-memory.dmpFilesize
120KB
-
memory/3212-125-0x0000000005710000-0x0000000005711000-memory.dmpFilesize
4KB
-
memory/3212-129-0x0000000006CB0000-0x0000000006CB1000-memory.dmpFilesize
4KB
-
memory/3212-123-0x0000000005580000-0x0000000005581000-memory.dmpFilesize
4KB
-
memory/3212-122-0x0000000005520000-0x0000000005521000-memory.dmpFilesize
4KB
-
memory/3212-121-0x0000000005500000-0x0000000005501000-memory.dmpFilesize
4KB
-
memory/3212-119-0x00000000022C2000-0x00000000022C3000-memory.dmpFilesize
4KB
-
memory/3212-117-0x0000000004E60000-0x0000000004E61000-memory.dmpFilesize
4KB
-
memory/3212-118-0x00000000022C0000-0x00000000022C1000-memory.dmpFilesize
4KB
-
memory/3212-116-0x0000000002390000-0x00000000023AD000-memory.dmpFilesize
116KB
-
memory/3212-115-0x0000000004920000-0x0000000004921000-memory.dmpFilesize
4KB
-
memory/4428-137-0x0000000004920000-0x000000000493D000-memory.dmpFilesize
116KB
-
memory/4428-158-0x0000000004A94000-0x0000000004A96000-memory.dmpFilesize
8KB
-
memory/4428-143-0x0000000004A93000-0x0000000004A94000-memory.dmpFilesize
4KB
-
memory/4428-141-0x0000000004A92000-0x0000000004A93000-memory.dmpFilesize
4KB
-
memory/4428-139-0x0000000004A90000-0x0000000004A91000-memory.dmpFilesize
4KB
-
memory/4428-135-0x0000000002340000-0x000000000235E000-memory.dmpFilesize
120KB
-
memory/4428-132-0x0000000000000000-mapping.dmp
-
memory/4548-159-0x00000000054C0000-0x00000000054C1000-memory.dmpFilesize
4KB
-
memory/4548-148-0x0000000000BB0000-0x0000000000BB1000-memory.dmpFilesize
4KB
-
memory/4548-145-0x0000000000000000-mapping.dmp