Analysis
-
max time kernel
76s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
13-07-2021 08:46
Static task
static1
Behavioral task
behavioral1
Sample
otc 4 fix (no depot).exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
otc 4 fix (no depot).exe
Resource
win10v20210408
General
-
Target
otc 4 fix (no depot).exe
-
Size
36.1MB
-
MD5
2af397334802bc90ee5f14270e51446e
-
SHA1
38d211c10f0b10ee007a9d3fa39513485a08524d
-
SHA256
6d5225ec9ee44d1d375dae8f6df80dcd102faa80c1d9072deed04635635c5dc4
-
SHA512
b4ddc0dc3e376e398646a09ccf225ee628aefe75ff83d384fc180dd79aef2732b21db423b0c4144ba1d64f48b1d93d39056373bbecd6ec7c7fa482963773e532
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
INJECT.exeCHEAT.exeINJECT.exeCHEAT.exepid process 2924 INJECT.exe 2624 CHEAT.exe 192 INJECT.exe 1856 CHEAT.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 7 IoCs
Processes:
cmd.exeINJECT.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CHEAT.exe cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\INJECT.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\INJECT.exe cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Firewall.exe INJECT.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Firewall.exe INJECT.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Firewall.bat INJECT.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CHEAT.exe cmd.exe -
Loads dropped DLL 64 IoCs
Processes:
INJECT.exeCHEAT.exepid process 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 1856 CHEAT.exe 192 INJECT.exe 1856 CHEAT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 1856 CHEAT.exe 192 INJECT.exe 1856 CHEAT.exe 1856 CHEAT.exe 192 INJECT.exe 192 INJECT.exe 1856 CHEAT.exe 192 INJECT.exe 1856 CHEAT.exe 192 INJECT.exe 1856 CHEAT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 1856 CHEAT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 192 INJECT.exe 1856 CHEAT.exe 1856 CHEAT.exe 1856 CHEAT.exe 1856 CHEAT.exe 1856 CHEAT.exe 1856 CHEAT.exe 192 INJECT.exe 1856 CHEAT.exe 1856 CHEAT.exe 1856 CHEAT.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 14 api.ipify.org 15 api.ipify.org -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
INJECT.exeCHEAT.exepid process 192 INJECT.exe 1856 CHEAT.exe -
Drops file in Windows directory 1 IoCs
Processes:
MicrosoftEdge.exedescription ioc process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Detects Pyinstaller 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\92FE.tmp\CHEAT.exe pyinstaller C:\Users\Admin\AppData\Local\Temp\92FE.tmp\INJECT.exe pyinstaller C:\Users\Admin\AppData\Local\Temp\92FE.tmp\INJECT.exe pyinstaller C:\Users\Admin\AppData\Local\Temp\92FE.tmp\CHEAT.exe pyinstaller C:\Users\Admin\AppData\Local\Temp\92FE.tmp\INJECT.exe pyinstaller C:\Users\Admin\AppData\Local\Temp\92FE.tmp\CHEAT.exe pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
MicrosoftEdgeCP.exeMicrosoftEdge.exebrowser_broker.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\InProgressFlags = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\FlipAheadCompletedVersion = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\ClearBrowsingHistoryOnStart = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 01000000e273295b1c4b184d7471286e7ffa11c8426bf75df0f490e0f1c356bef712fe1cebf10d5f07f1fc6cba1f44bcd648ba3299e4d71115b6b6d08b0c MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DontShowMeThisDialogAgain MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 88d47dd8d477d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingDelete MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\FontSize = "3" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url3 = "https://signin.ebay.com/ws/ebayisapi.dll" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\UUID = "{0A440178-A0C6-4DCE-9E89-F2FC17F33569}" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PageSetup MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension = "5" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\LastClosedHeight = "600" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\AllComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main\OperationalData = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\FirstRecoveryTime = 1d24df8b702cd701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersi = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IntelliForms MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = 1d24df8b702cd701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\InProgressFlags = "262144" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url5 = "https://twitter.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming\ChangeUnitGenerationNeeded = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{39F1EC78-B6A3-437E-A86C-B234CE817C83} = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-08760 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = f7dc69d9d477d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows\AllowInPrivate MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage MicrosoftEdge.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
MicrosoftEdge.exeCHEAT.exeMicrosoftEdgeCP.exedescription pid process Token: SeDebugPrivilege 3772 MicrosoftEdge.exe Token: SeDebugPrivilege 3772 MicrosoftEdge.exe Token: SeDebugPrivilege 3772 MicrosoftEdge.exe Token: SeDebugPrivilege 3772 MicrosoftEdge.exe Token: SeDebugPrivilege 1856 CHEAT.exe Token: SeDebugPrivilege 4276 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4276 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4276 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4276 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3772 MicrosoftEdge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exepid process 3772 MicrosoftEdge.exe 4192 MicrosoftEdgeCP.exe 4192 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
otc 4 fix (no depot).execmd.exeINJECT.exeCHEAT.exedescription pid process target process PID 3128 wrote to memory of 2700 3128 otc 4 fix (no depot).exe cmd.exe PID 3128 wrote to memory of 2700 3128 otc 4 fix (no depot).exe cmd.exe PID 2700 wrote to memory of 2924 2700 cmd.exe INJECT.exe PID 2700 wrote to memory of 2924 2700 cmd.exe INJECT.exe PID 2700 wrote to memory of 2624 2700 cmd.exe CHEAT.exe PID 2700 wrote to memory of 2624 2700 cmd.exe CHEAT.exe PID 2700 wrote to memory of 2624 2700 cmd.exe CHEAT.exe PID 2924 wrote to memory of 192 2924 INJECT.exe INJECT.exe PID 2924 wrote to memory of 192 2924 INJECT.exe INJECT.exe PID 2624 wrote to memory of 1856 2624 CHEAT.exe CHEAT.exe PID 2624 wrote to memory of 1856 2624 CHEAT.exe CHEAT.exe PID 2624 wrote to memory of 1856 2624 CHEAT.exe CHEAT.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\otc 4 fix (no depot).exe"C:\Users\Admin\AppData\Local\Temp\otc 4 fix (no depot).exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\92FE.tmp\92FF.bat "C:\Users\Admin\AppData\Local\Temp\otc 4 fix (no depot).exe""2⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\92FE.tmp\INJECT.exeINJECT.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\92FE.tmp\INJECT.exeINJECT.exe4⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\92FE.tmp\CHEAT.exeCHEAT.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\92FE.tmp\CHEAT.exeCHEAT.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\92FE.tmp\92FF.batMD5
54bb59dbd2927966702a0e8ccc778ee1
SHA1b6e2ece32a856393a6e40c65c5e05ddd3e1b171d
SHA256405533bd21c1ba7bf54000cf245751f67664fadaff03d38c6280e7bff00fd006
SHA512e64e84683f28cf9a9d9271a37b5c1806d92647e3bd368821de07d83aadba67b94217c9f1951d275a37b4643be2a97cd161b1102321bb01bbaeffead82efb4c2c
-
C:\Users\Admin\AppData\Local\Temp\92FE.tmp\CHEAT.exeMD5
c480f938d24a2e21d060b44a4e4e5f72
SHA168be2577912e115ac454554da0db0bbb66edec50
SHA256e23c7a88601e0c149a4f56bb6084467e8d7f1d0b9001d69a49cf9aa4d2e1b8df
SHA512554eea6aecb1697ecc761144bc29191ee38a46612e130bea769b874a95074a6ef7977b51ba47fb2e6fd3333878898fdb85e13ef86d14a2a9c7c4ea3b28dc8f06
-
C:\Users\Admin\AppData\Local\Temp\92FE.tmp\CHEAT.exeMD5
c480f938d24a2e21d060b44a4e4e5f72
SHA168be2577912e115ac454554da0db0bbb66edec50
SHA256e23c7a88601e0c149a4f56bb6084467e8d7f1d0b9001d69a49cf9aa4d2e1b8df
SHA512554eea6aecb1697ecc761144bc29191ee38a46612e130bea769b874a95074a6ef7977b51ba47fb2e6fd3333878898fdb85e13ef86d14a2a9c7c4ea3b28dc8f06
-
C:\Users\Admin\AppData\Local\Temp\92FE.tmp\CHEAT.exeMD5
c480f938d24a2e21d060b44a4e4e5f72
SHA168be2577912e115ac454554da0db0bbb66edec50
SHA256e23c7a88601e0c149a4f56bb6084467e8d7f1d0b9001d69a49cf9aa4d2e1b8df
SHA512554eea6aecb1697ecc761144bc29191ee38a46612e130bea769b874a95074a6ef7977b51ba47fb2e6fd3333878898fdb85e13ef86d14a2a9c7c4ea3b28dc8f06
-
C:\Users\Admin\AppData\Local\Temp\92FE.tmp\INJECT.exeMD5
fe829055d645035e3251a8e7fc36238e
SHA1a68e5896a99b9f16eb1d480f493663d45a1d41e5
SHA25673f6d2d8062e17bd3b6e169de7666c7650302fff4330bd5c5f96565dd7f555dd
SHA512309f989e7d25950960bb600ba8b0931834cb0ed94e41910bd416d2358926a1ff360537906f3ad04ca6726b5ece0ffce857986e9675fe4e09c45b3631739a7b13
-
C:\Users\Admin\AppData\Local\Temp\92FE.tmp\INJECT.exeMD5
fe829055d645035e3251a8e7fc36238e
SHA1a68e5896a99b9f16eb1d480f493663d45a1d41e5
SHA25673f6d2d8062e17bd3b6e169de7666c7650302fff4330bd5c5f96565dd7f555dd
SHA512309f989e7d25950960bb600ba8b0931834cb0ed94e41910bd416d2358926a1ff360537906f3ad04ca6726b5ece0ffce857986e9675fe4e09c45b3631739a7b13
-
C:\Users\Admin\AppData\Local\Temp\92FE.tmp\INJECT.exeMD5
fe829055d645035e3251a8e7fc36238e
SHA1a68e5896a99b9f16eb1d480f493663d45a1d41e5
SHA25673f6d2d8062e17bd3b6e169de7666c7650302fff4330bd5c5f96565dd7f555dd
SHA512309f989e7d25950960bb600ba8b0931834cb0ed94e41910bd416d2358926a1ff360537906f3ad04ca6726b5ece0ffce857986e9675fe4e09c45b3631739a7b13
-
C:\Users\Admin\AppData\Local\Temp\_MEI26242\VCRUNTIME140.dllMD5
87dd91c56be82866bf96ef1666f30a99
SHA13b78cb150110166ded8ea51fbde8ea506f72aeaf
SHA25649b0fd1751342c253cac588dda82ec08e4ef43cebc5a9d80deb7928109b90c4f
SHA51258c3ec6761624d14c7c897d8d0842dbeab200d445b4339905dac8a3635d174cdfb7b237d338d2829bc6c602c47503120af5be0c7de6abf2e71c81726285e44d6
-
C:\Users\Admin\AppData\Local\Temp\_MEI26242\python39.dllMD5
7d1adb0020f8741ee1f868f89a5baaa6
SHA1ccd754886df8d40dd21214ca4c0a16166f03b0ea
SHA256185fdf02a835008b741751a3bf67d51f306f6ede2a5ba8bbb6edfeeb646fa232
SHA512cda07ab982e2fc2347f6efbf6ee0d9e11006cd9d96058bb743b2c7b86a7ee3337485220e486bf885214fff362080dfbe12cc129911818fbe9aa46e1e8e81b9e5
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\PIL\_imaging.cp39-win_amd64.pydMD5
35f50141e5098b5c4f07d665974667fd
SHA1d06651f3964ac9558270742d2fe2e374c7ae0c36
SHA2567a080c64f55abca2c577da08a370802aff9ee7803edca775ee18aaa6b3dd3c82
SHA512b992fb66f258a80d35c1052f5c38498ec602e16e7ff2ee5d1cdbfa8494ed7d9481135e4404799e37af5e6adda647c1a5bd95dcd269e0a967ac59c6b7898ada5d
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\VCRUNTIME140.dllMD5
4a365ffdbde27954e768358f4a4ce82e
SHA1a1b31102eee1d2a4ed1290da2038b7b9f6a104a3
SHA2566a0850419432735a98e56857d5cfce97e9d58a947a9863ca6afadd1c7bcab27c
SHA51254e4b6287c4d5a165509047262873085f50953af63ca0dcb7649c22aba5b439ab117a7e0d6e7f0a3e51a23e28a255ffd1ca1ddce4b2ea7f87bca1c9b0dbe2722
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\_bz2.pydMD5
e91b4f8e1592da26bacaceb542a220a8
SHA15459d4c2147fa6db75211c3ec6166b869738bd38
SHA25620895fa331712701ebfdbb9ab87e394309e910f1d782929fd65b59ed76d9c90f
SHA512cb797fa758c65358e5b0fef739181f6b39e0629758a6f8d5c4bd7dc6422001769a19df0c746724fb2567a58708b18bbd098327bfbdf3378426049b113eb848e9
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\_ctypes.pydMD5
6fe3827e6704443e588c2701568b5f89
SHA1ac9325fd29dead82ccd30be3ee7ee91c3aaeb967
SHA25673acf2e0e28040cd696255abd53caaa811470b17a07c7b4d5a94f346b7474391
SHA512be2502c006a615df30e61bea138bd1afca30640f39522d18db94df293c71df0a86c88df5fd5d8407daf1ccea6fac012d086212a3b80b8c32ede33b937881533a
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\_elementtree.pydMD5
37ce940391c061734bbb44f51725c502
SHA105f9ef31382524504a41b06ab1b14c94eb4acedb
SHA25646e3e9e4dee333231d12381de9c0a7d44f877c0f8c0c48d49c78005f5aa237a6
SHA5129e7d36da259acb56e03b6f4ca108b47ca0588b3333fba14f32e99cc1678f025a72b7729de0c09be22f5064303e2185a7477636786cbc7541000e6a6470947143
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\_hashlib.pydMD5
7c69cb3cb3182a97e3e9a30d2241ebed
SHA11b8754ff57a14c32bcadc330d4880382c7fffc93
SHA25612a84bacb071b1948a9f751ac8d0653ba71a8f6b217a69fe062608e532065c20
SHA51296dbabbc6b98d473cbe06dcd296f6c6004c485e57ac5ba10560a377393875192b22df8a7103fe4a22795b8d81b8b0ae14ce7646262f87cb609b9e2590a93169e
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\_lzma.pydMD5
493c33ddf375b394b648c4283b326481
SHA159c87ee582ba550f064429cb26ad79622c594f08
SHA2566384ded31408788d35a89dc3f7705ea2928f6bbdeb8b627f0d1b2d7b1ea13e16
SHA512a4a83f04c7fc321796ce6a932d572dca1ad6ecefd31002320aeaa2453701ed49ef9f0d9ba91c969737565a6512b94fbb0311aee53d355345a03e98f43e6f98b2
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\_pytransform.dllMD5
1b61d4d35d73580ba01c85f87cb41bf6
SHA1fa6de7550892884270c4a1cc1b27aeeac9f8f4d9
SHA256fea87a0fd4f645e3d4821bc5e9164092881c6c3e6b54a5bfd9ebd1a1c5939167
SHA512fd1dccaac6cb354aaaadff54192bc719e273fa386e789d520fe2e8d442dfebbec0a1a26f32ed73616d2c49c31ba1ed5972120bf3e8acff9165ba4fca2a9a0ea1
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\_queue.pydMD5
103a38f7fbf0da48b8611af309188011
SHA11db9e2cb2a92243da12efdca617499eb93ddcbf8
SHA2563bc50ac551635b9ce6fbcddea5d3d621c1216e49e9958fa24546ab8f6f2d111a
SHA5122e6c4b9786034cbf6a6d94761ed31807657ee10edd679147c838a2e6e97a0c13acd6e59bc6e69edf1ca725f12e0f972a0de0ae4b331da46dccd687c59096a250
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\_socket.pydMD5
fd1cfe0f0023c5780247f11d8d2802c9
SHA15b29a3b4c6edb6fa176077e1f1432e3b0178f2bc
SHA256258a5f0b4d362b2fed80b24eeabcb3cdd1602e32ff79d87225da6d15106b17a6
SHA512b304a2e56829a557ec401c6fdda78d6d05b7495a610c1ed793d6b25fc5af891cb2a1581addb27ab5e2a6cb0be24d9678f67b97828015161bc875df9b7b5055ae
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\_sqlite3.pydMD5
2a4c480b645b43290492c004176af8ac
SHA1cf200a3d20ab35ded86aa2838d280e2f02d52271
SHA256317f2bf28414358bbe33519cb36b68f83ce4e4cd8baf2f17460ff554ef2e91dc
SHA5122dd3ee0488c31b7fd643b1b984995d362ba3c1e59dac733f88ac79766141036a3b3a29379c1708dc13c099bde93862d336f856a840bd6b603c5b44f990397036
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\_ssl.pydMD5
34b1d4db44fc3b29e8a85dd01432535f
SHA13189c207370622c97c7c049c97262d59c6487983
SHA256e4aa33b312cec5aa5a0b064557576844879e0dccc40047c9d0a769a1d03f03f6
SHA512f5f3dcd48d01aa56bd0a11eee02c21546440a59791ced2f85cdac81da1848ef367a93ef4f10fa52331ee2edea93cbcc95a0f94c0ccefa5d19e04ae5013563aee
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\base_library.zipMD5
dc1b529c08922e4812f714899d15b570
SHA14aae3300cb3556033e22cdb47b65d1518c4dd888
SHA256faca55ba76983313bc00e8044be99332c13b58398c377c09108999d6bf339a6a
SHA5122aed265d4723a8e97ac2fbed6bae1475605631f67f7987ca464b7c582b45d4cabb82ae0928396c0f756257e2c09c9b583b08bf36622f7a7694ea856101fb825c
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\libcrypto-1_1.dllMD5
89511df61678befa2f62f5025c8c8448
SHA1df3961f833b4964f70fcf1c002d9fd7309f53ef8
SHA256296426e7ce11bc3d1cfa9f2aeb42f60c974da4af3b3efbeb0ba40e92e5299fdf
SHA5129af069ea13551a4672fdd4635d3242e017837b76ab2815788148dd4c44b4cf3a650d43ac79cd2122e1e51e01fb5164e71ff81a829395bdb8e50bb50a33f0a668
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\libffi-7.dllMD5
eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\libssl-1_1.dllMD5
50bcfb04328fec1a22c31c0e39286470
SHA13a1b78faf34125c7b8d684419fa715c367db3daa
SHA256fddd0da02dcd41786e9aa04ba17ba391ce39dae6b1f54cfa1e2bb55bc753fce9
SHA512370e6dfd318d905b79baf1808efbf6da58590f00006513bdaaed0c313f6fa6c36f634ea3b05f916cee59f4db25a23dd9e6f64caf3c04a200e78c193027f57685
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\lz4\_version.cp39-win_amd64.pydMD5
4338122868cb02694fcb3212b5ac5a8d
SHA11d94e4fd3aff7097e8dfd71b322d36c1e48052ce
SHA256a575c09fee7858867754b1cfb1ee00f197b5062415e72f337f8471ee949692d6
SHA51271c2fc89cfbb7128b99c52b0d2dd34e910388837742f07ed47a81fe4ed4be49be815e44f3c53efecf2458f7d2202122248b3ad1ff24debcca12fb3bd2c682d7e
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\pyexpat.pydMD5
96d55e550eb6f991783ece2bca53583d
SHA17b46eaae4e499a1f6604d3c81a85a0b827cc0b9e
SHA256f5d8188c6674cbd814abd1e0dd4e5a8bfadb28e31b5088ae6c4346473b03d17e
SHA512254b926690a565bc31cae88183745397c99d00b5d5417ab517a8762c8874dff8fcc30a59bda1cd41b0e19e2d807ac417293a3a001005996a5d4db43b9b14d5eb
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\python3.DLLMD5
e438f5470c5c1cb5ddbe02b59e13ad2c
SHA1ec58741bf0be7f97525f4b867869a3b536e68589
SHA2561dc81d8066d44480163233f249468039d3de97e91937965e7a369ae1499013da
SHA512bd8012b167dd37bd5b57521ca91ad2c9891a61866558f2cc8e80bb029d6f7d73c758fb5be7a181562640011e8b4b54afa3a12434ba00f445c1a87b52552429d3
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\python39.dllMD5
5cd203d356a77646856341a0c9135fc6
SHA1a1f4ac5cc2f5ecb075b3d0129e620784814a48f7
SHA256a56afcf5f3a72769c77c3bc43c9b84197180a8b3380b6258073223bfd72ed47a
SHA512390008d57fa711d7c88b77937bf16fdb230e7c1e7182faea6d7c206e9f65ced6f2e835f9da9befb941e80624abe45875602e0e7ad485d9a009d2450a2a0e0f1f
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\pythoncom39.dllMD5
26ebff360b70ca5de0a81fccbae0b02c
SHA12415d8c46eb188648225f55a26bd19a9fb225749
SHA2564077005b6ae8272d82892d183cbc972780e3aa80f848c447626761a6c244d3a3
SHA51209645c61421f245df7a2f62683bc90b5e3d51607b5dd9b1e7af9d54d93bccad132d6ff8aa4ba7d083da443f2b6220302178f9a120fecce661876cbab6d90a3df
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\pywintypes39.dllMD5
d658ffb571a541e9e21a6b859a67e112
SHA1d9e7f54eb92ce32ff4d02fedd5c9b738dabbfbdb
SHA2560cc26e2acaa1933647f885b47ac6da6625be7a4cd93fae220fb172906ff22091
SHA5120040b19841d2d19ab5506cefc3186813cc92f57144b7b3f0bfec45638eebc053ddb8a40f2843cafe5d0ae5c6dc7f5db646a6441d34e02d749eb9563edbe5c7b9
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\select.pydMD5
0e3cf5d792a3f543be8bbc186b97a27a
SHA150f4c70fce31504c6b746a2c8d9754a16ebc8d5e
SHA256c7ffae6dc927cf10ac5da08614912bb3ad8fc52aa0ef9bc376d831e72dd74460
SHA512224b42e05b4dbdf7275ee7c5d3eb190024fc55e22e38bd189c1685efee2a3dd527c6dfcb2feeec525b8d6dc35aded1eac2423ed62bb2599bb6a9ea34e842c340
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\sqlite3.dllMD5
231fb59b9f78d8b4f3e4eb8faa0c596b
SHA14aacaefef28ad0fee7eda5ca9e256458dc890e4b
SHA2567baa0951b90fe284d738060f80e4cb4a7358a4ddcf8174e870b3958dc9b18483
SHA512bba7b87d206a96129632e8b2e7f4e4e94ca2c618801e16243869ad418705f6b690dfe54a68535b3829d21469e13a474e16452898b67f85c4004d92999fb6dfa7
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\unicodedata.pydMD5
7af51031368619638cca688a7275db14
SHA164e2cc5ac5afe8a65af690047dc03858157e964c
SHA2567f02a99a23cc3ff63ecb10ba6006e2da7bf685530bad43882ebf90d042b9eeb6
SHA512fbde24501288ff9b06fc96faff5e7a1849765df239e816774c04a4a6ef54a0c641adf4325bfb116952082d3234baef12288174ad8c18b62407109f29aa5ab326
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\win32api.pydMD5
8ccfec535f312418015bcd067fe32208
SHA179aa4bc6d681972afadfa4b2bae230ce06570a56
SHA2569157829433f0bd8a12b1a1cf2fb90301e20ecf43802eb0ac85525ebcc53d0e30
SHA512698b3a57338ffa47e2afecf9e8f8f709061e5cb56d82d8e10e48c6d4c8d26d2e0a21f2dcedc599a1b605ee2026dc2af7bd79d9f8b035c5c6fd9bd9fc817673b8
-
C:\Users\Admin\AppData\Local\Temp\_MEI29242\win32crypt.pydMD5
69fa92932743edb9cdc05077fae6ebde
SHA187103a91d8810bf6ad243189650ca9d81a4c8cf7
SHA25643fd57f9631dfa2a25588b30dc904422c91cf3a960aa45cfadbdce11150b0d44
SHA51228b37a9ee7e93a8ab3f18db1cef5eb8759a7a0eece4c9bbd061e83fd777f638bf784195d5e9dca0d2f643a1a8ce27b95b48dc1e71d725419ae253fbfa169e095
-
\Users\Admin\AppData\Local\Temp\_MEI26242\VCRUNTIME140.dllMD5
87dd91c56be82866bf96ef1666f30a99
SHA13b78cb150110166ded8ea51fbde8ea506f72aeaf
SHA25649b0fd1751342c253cac588dda82ec08e4ef43cebc5a9d80deb7928109b90c4f
SHA51258c3ec6761624d14c7c897d8d0842dbeab200d445b4339905dac8a3635d174cdfb7b237d338d2829bc6c602c47503120af5be0c7de6abf2e71c81726285e44d6
-
\Users\Admin\AppData\Local\Temp\_MEI26242\python39.dllMD5
7d1adb0020f8741ee1f868f89a5baaa6
SHA1ccd754886df8d40dd21214ca4c0a16166f03b0ea
SHA256185fdf02a835008b741751a3bf67d51f306f6ede2a5ba8bbb6edfeeb646fa232
SHA512cda07ab982e2fc2347f6efbf6ee0d9e11006cd9d96058bb743b2c7b86a7ee3337485220e486bf885214fff362080dfbe12cc129911818fbe9aa46e1e8e81b9e5
-
\Users\Admin\AppData\Local\Temp\_MEI29242\PIL\_imaging.cp39-win_amd64.pydMD5
35f50141e5098b5c4f07d665974667fd
SHA1d06651f3964ac9558270742d2fe2e374c7ae0c36
SHA2567a080c64f55abca2c577da08a370802aff9ee7803edca775ee18aaa6b3dd3c82
SHA512b992fb66f258a80d35c1052f5c38498ec602e16e7ff2ee5d1cdbfa8494ed7d9481135e4404799e37af5e6adda647c1a5bd95dcd269e0a967ac59c6b7898ada5d
-
\Users\Admin\AppData\Local\Temp\_MEI29242\VCRUNTIME140.dllMD5
4a365ffdbde27954e768358f4a4ce82e
SHA1a1b31102eee1d2a4ed1290da2038b7b9f6a104a3
SHA2566a0850419432735a98e56857d5cfce97e9d58a947a9863ca6afadd1c7bcab27c
SHA51254e4b6287c4d5a165509047262873085f50953af63ca0dcb7649c22aba5b439ab117a7e0d6e7f0a3e51a23e28a255ffd1ca1ddce4b2ea7f87bca1c9b0dbe2722
-
\Users\Admin\AppData\Local\Temp\_MEI29242\_bz2.pydMD5
e91b4f8e1592da26bacaceb542a220a8
SHA15459d4c2147fa6db75211c3ec6166b869738bd38
SHA25620895fa331712701ebfdbb9ab87e394309e910f1d782929fd65b59ed76d9c90f
SHA512cb797fa758c65358e5b0fef739181f6b39e0629758a6f8d5c4bd7dc6422001769a19df0c746724fb2567a58708b18bbd098327bfbdf3378426049b113eb848e9
-
\Users\Admin\AppData\Local\Temp\_MEI29242\_ctypes.pydMD5
6fe3827e6704443e588c2701568b5f89
SHA1ac9325fd29dead82ccd30be3ee7ee91c3aaeb967
SHA25673acf2e0e28040cd696255abd53caaa811470b17a07c7b4d5a94f346b7474391
SHA512be2502c006a615df30e61bea138bd1afca30640f39522d18db94df293c71df0a86c88df5fd5d8407daf1ccea6fac012d086212a3b80b8c32ede33b937881533a
-
\Users\Admin\AppData\Local\Temp\_MEI29242\_elementtree.pydMD5
37ce940391c061734bbb44f51725c502
SHA105f9ef31382524504a41b06ab1b14c94eb4acedb
SHA25646e3e9e4dee333231d12381de9c0a7d44f877c0f8c0c48d49c78005f5aa237a6
SHA5129e7d36da259acb56e03b6f4ca108b47ca0588b3333fba14f32e99cc1678f025a72b7729de0c09be22f5064303e2185a7477636786cbc7541000e6a6470947143
-
\Users\Admin\AppData\Local\Temp\_MEI29242\_hashlib.pydMD5
7c69cb3cb3182a97e3e9a30d2241ebed
SHA11b8754ff57a14c32bcadc330d4880382c7fffc93
SHA25612a84bacb071b1948a9f751ac8d0653ba71a8f6b217a69fe062608e532065c20
SHA51296dbabbc6b98d473cbe06dcd296f6c6004c485e57ac5ba10560a377393875192b22df8a7103fe4a22795b8d81b8b0ae14ce7646262f87cb609b9e2590a93169e
-
\Users\Admin\AppData\Local\Temp\_MEI29242\_lzma.pydMD5
493c33ddf375b394b648c4283b326481
SHA159c87ee582ba550f064429cb26ad79622c594f08
SHA2566384ded31408788d35a89dc3f7705ea2928f6bbdeb8b627f0d1b2d7b1ea13e16
SHA512a4a83f04c7fc321796ce6a932d572dca1ad6ecefd31002320aeaa2453701ed49ef9f0d9ba91c969737565a6512b94fbb0311aee53d355345a03e98f43e6f98b2
-
\Users\Admin\AppData\Local\Temp\_MEI29242\_pytransform.dllMD5
1b61d4d35d73580ba01c85f87cb41bf6
SHA1fa6de7550892884270c4a1cc1b27aeeac9f8f4d9
SHA256fea87a0fd4f645e3d4821bc5e9164092881c6c3e6b54a5bfd9ebd1a1c5939167
SHA512fd1dccaac6cb354aaaadff54192bc719e273fa386e789d520fe2e8d442dfebbec0a1a26f32ed73616d2c49c31ba1ed5972120bf3e8acff9165ba4fca2a9a0ea1
-
\Users\Admin\AppData\Local\Temp\_MEI29242\_queue.pydMD5
103a38f7fbf0da48b8611af309188011
SHA11db9e2cb2a92243da12efdca617499eb93ddcbf8
SHA2563bc50ac551635b9ce6fbcddea5d3d621c1216e49e9958fa24546ab8f6f2d111a
SHA5122e6c4b9786034cbf6a6d94761ed31807657ee10edd679147c838a2e6e97a0c13acd6e59bc6e69edf1ca725f12e0f972a0de0ae4b331da46dccd687c59096a250
-
\Users\Admin\AppData\Local\Temp\_MEI29242\_socket.pydMD5
fd1cfe0f0023c5780247f11d8d2802c9
SHA15b29a3b4c6edb6fa176077e1f1432e3b0178f2bc
SHA256258a5f0b4d362b2fed80b24eeabcb3cdd1602e32ff79d87225da6d15106b17a6
SHA512b304a2e56829a557ec401c6fdda78d6d05b7495a610c1ed793d6b25fc5af891cb2a1581addb27ab5e2a6cb0be24d9678f67b97828015161bc875df9b7b5055ae
-
\Users\Admin\AppData\Local\Temp\_MEI29242\_sqlite3.pydMD5
2a4c480b645b43290492c004176af8ac
SHA1cf200a3d20ab35ded86aa2838d280e2f02d52271
SHA256317f2bf28414358bbe33519cb36b68f83ce4e4cd8baf2f17460ff554ef2e91dc
SHA5122dd3ee0488c31b7fd643b1b984995d362ba3c1e59dac733f88ac79766141036a3b3a29379c1708dc13c099bde93862d336f856a840bd6b603c5b44f990397036
-
\Users\Admin\AppData\Local\Temp\_MEI29242\_ssl.pydMD5
34b1d4db44fc3b29e8a85dd01432535f
SHA13189c207370622c97c7c049c97262d59c6487983
SHA256e4aa33b312cec5aa5a0b064557576844879e0dccc40047c9d0a769a1d03f03f6
SHA512f5f3dcd48d01aa56bd0a11eee02c21546440a59791ced2f85cdac81da1848ef367a93ef4f10fa52331ee2edea93cbcc95a0f94c0ccefa5d19e04ae5013563aee
-
\Users\Admin\AppData\Local\Temp\_MEI29242\libcrypto-1_1.dllMD5
89511df61678befa2f62f5025c8c8448
SHA1df3961f833b4964f70fcf1c002d9fd7309f53ef8
SHA256296426e7ce11bc3d1cfa9f2aeb42f60c974da4af3b3efbeb0ba40e92e5299fdf
SHA5129af069ea13551a4672fdd4635d3242e017837b76ab2815788148dd4c44b4cf3a650d43ac79cd2122e1e51e01fb5164e71ff81a829395bdb8e50bb50a33f0a668
-
\Users\Admin\AppData\Local\Temp\_MEI29242\libcrypto-1_1.dllMD5
89511df61678befa2f62f5025c8c8448
SHA1df3961f833b4964f70fcf1c002d9fd7309f53ef8
SHA256296426e7ce11bc3d1cfa9f2aeb42f60c974da4af3b3efbeb0ba40e92e5299fdf
SHA5129af069ea13551a4672fdd4635d3242e017837b76ab2815788148dd4c44b4cf3a650d43ac79cd2122e1e51e01fb5164e71ff81a829395bdb8e50bb50a33f0a668
-
\Users\Admin\AppData\Local\Temp\_MEI29242\libffi-7.dllMD5
eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
\Users\Admin\AppData\Local\Temp\_MEI29242\libssl-1_1.dllMD5
50bcfb04328fec1a22c31c0e39286470
SHA13a1b78faf34125c7b8d684419fa715c367db3daa
SHA256fddd0da02dcd41786e9aa04ba17ba391ce39dae6b1f54cfa1e2bb55bc753fce9
SHA512370e6dfd318d905b79baf1808efbf6da58590f00006513bdaaed0c313f6fa6c36f634ea3b05f916cee59f4db25a23dd9e6f64caf3c04a200e78c193027f57685
-
\Users\Admin\AppData\Local\Temp\_MEI29242\pyexpat.pydMD5
96d55e550eb6f991783ece2bca53583d
SHA17b46eaae4e499a1f6604d3c81a85a0b827cc0b9e
SHA256f5d8188c6674cbd814abd1e0dd4e5a8bfadb28e31b5088ae6c4346473b03d17e
SHA512254b926690a565bc31cae88183745397c99d00b5d5417ab517a8762c8874dff8fcc30a59bda1cd41b0e19e2d807ac417293a3a001005996a5d4db43b9b14d5eb
-
\Users\Admin\AppData\Local\Temp\_MEI29242\python3.dllMD5
e438f5470c5c1cb5ddbe02b59e13ad2c
SHA1ec58741bf0be7f97525f4b867869a3b536e68589
SHA2561dc81d8066d44480163233f249468039d3de97e91937965e7a369ae1499013da
SHA512bd8012b167dd37bd5b57521ca91ad2c9891a61866558f2cc8e80bb029d6f7d73c758fb5be7a181562640011e8b4b54afa3a12434ba00f445c1a87b52552429d3
-
\Users\Admin\AppData\Local\Temp\_MEI29242\python39.dllMD5
5cd203d356a77646856341a0c9135fc6
SHA1a1f4ac5cc2f5ecb075b3d0129e620784814a48f7
SHA256a56afcf5f3a72769c77c3bc43c9b84197180a8b3380b6258073223bfd72ed47a
SHA512390008d57fa711d7c88b77937bf16fdb230e7c1e7182faea6d7c206e9f65ced6f2e835f9da9befb941e80624abe45875602e0e7ad485d9a009d2450a2a0e0f1f
-
\Users\Admin\AppData\Local\Temp\_MEI29242\pythoncom39.dllMD5
26ebff360b70ca5de0a81fccbae0b02c
SHA12415d8c46eb188648225f55a26bd19a9fb225749
SHA2564077005b6ae8272d82892d183cbc972780e3aa80f848c447626761a6c244d3a3
SHA51209645c61421f245df7a2f62683bc90b5e3d51607b5dd9b1e7af9d54d93bccad132d6ff8aa4ba7d083da443f2b6220302178f9a120fecce661876cbab6d90a3df
-
\Users\Admin\AppData\Local\Temp\_MEI29242\pywintypes39.dllMD5
d658ffb571a541e9e21a6b859a67e112
SHA1d9e7f54eb92ce32ff4d02fedd5c9b738dabbfbdb
SHA2560cc26e2acaa1933647f885b47ac6da6625be7a4cd93fae220fb172906ff22091
SHA5120040b19841d2d19ab5506cefc3186813cc92f57144b7b3f0bfec45638eebc053ddb8a40f2843cafe5d0ae5c6dc7f5db646a6441d34e02d749eb9563edbe5c7b9
-
\Users\Admin\AppData\Local\Temp\_MEI29242\select.pydMD5
0e3cf5d792a3f543be8bbc186b97a27a
SHA150f4c70fce31504c6b746a2c8d9754a16ebc8d5e
SHA256c7ffae6dc927cf10ac5da08614912bb3ad8fc52aa0ef9bc376d831e72dd74460
SHA512224b42e05b4dbdf7275ee7c5d3eb190024fc55e22e38bd189c1685efee2a3dd527c6dfcb2feeec525b8d6dc35aded1eac2423ed62bb2599bb6a9ea34e842c340
-
\Users\Admin\AppData\Local\Temp\_MEI29242\sqlite3.dllMD5
231fb59b9f78d8b4f3e4eb8faa0c596b
SHA14aacaefef28ad0fee7eda5ca9e256458dc890e4b
SHA2567baa0951b90fe284d738060f80e4cb4a7358a4ddcf8174e870b3958dc9b18483
SHA512bba7b87d206a96129632e8b2e7f4e4e94ca2c618801e16243869ad418705f6b690dfe54a68535b3829d21469e13a474e16452898b67f85c4004d92999fb6dfa7
-
\Users\Admin\AppData\Local\Temp\_MEI29242\unicodedata.pydMD5
7af51031368619638cca688a7275db14
SHA164e2cc5ac5afe8a65af690047dc03858157e964c
SHA2567f02a99a23cc3ff63ecb10ba6006e2da7bf685530bad43882ebf90d042b9eeb6
SHA512fbde24501288ff9b06fc96faff5e7a1849765df239e816774c04a4a6ef54a0c641adf4325bfb116952082d3234baef12288174ad8c18b62407109f29aa5ab326
-
\Users\Admin\AppData\Local\Temp\_MEI29242\win32api.pydMD5
8ccfec535f312418015bcd067fe32208
SHA179aa4bc6d681972afadfa4b2bae230ce06570a56
SHA2569157829433f0bd8a12b1a1cf2fb90301e20ecf43802eb0ac85525ebcc53d0e30
SHA512698b3a57338ffa47e2afecf9e8f8f709061e5cb56d82d8e10e48c6d4c8d26d2e0a21f2dcedc599a1b605ee2026dc2af7bd79d9f8b035c5c6fd9bd9fc817673b8
-
\Users\Admin\AppData\Local\Temp\_MEI29242\win32crypt.pydMD5
69fa92932743edb9cdc05077fae6ebde
SHA187103a91d8810bf6ad243189650ca9d81a4c8cf7
SHA25643fd57f9631dfa2a25588b30dc904422c91cf3a960aa45cfadbdce11150b0d44
SHA51228b37a9ee7e93a8ab3f18db1cef5eb8759a7a0eece4c9bbd061e83fd777f638bf784195d5e9dca0d2f643a1a8ce27b95b48dc1e71d725419ae253fbfa169e095
-
memory/192-122-0x0000000000000000-mapping.dmp
-
memory/1856-166-0x0000000000000000-mapping.dmp
-
memory/2624-120-0x0000000000000000-mapping.dmp
-
memory/2700-114-0x0000000000000000-mapping.dmp
-
memory/2924-118-0x0000000000000000-mapping.dmp