Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
19-07-2021 05:05
Static task
static1
Behavioral task
behavioral1
Sample
DDCD2BE64212B10C3CF84496A879B098.exe
Resource
win7v20210408
General
-
Target
DDCD2BE64212B10C3CF84496A879B098.exe
-
Size
28.9MB
-
MD5
ddcd2be64212b10c3cf84496a879b098
-
SHA1
08e50a11be5d12fb97bff058ee94fe59423058c0
-
SHA256
b013074d220d71877112b61e16927abbbb98ad29aa40609aca1b936332fbe4b7
-
SHA512
ac424ac69d0fc9561e11eaa8744b86ab7a6912637dc154e53c418b420d6f04ea65d55e04987e28ad1b10c011bd3aa8bd3cd1f86dd429aa2d2e7a4cf5ea6bd0c7
Malware Config
Extracted
Protocol: ftp- Host:
79.174.12.59 - Port:
21 - Username:
gFUhfuFUTfTFu6tr&6yfgvHd - Password:
GHhgJHg%Uk@ghgvbcg5jhv67ujhv
Extracted
Protocol: ftp- Host:
79.174.12.59 - Port:
21 - Username:
xvcbfsc4er2efdfxbse - Password:
AdaDsfefwefvwe4werf
Extracted
redline
002
62.109.1.213:26078
Extracted
darkcomet
Guest1
83.136.232.97:1660
DC_MUTEX-F54S21D
-
gencode
QwM3dECHz21k
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1400-195-0x0000000004DB0000-0x0000000004DCB000-memory.dmp family_redline behavioral2/memory/1400-197-0x00000000050A0000-0x00000000050B9000-memory.dmp family_redline -
Registers COM server for autorun 1 TTPs
-
Blocklisted process makes network request 8 IoCs
Processes:
msiexec.exeflow pid process 71 4640 msiexec.exe 73 4640 msiexec.exe 75 4640 msiexec.exe 77 4640 msiexec.exe 82 4640 msiexec.exe 84 4640 msiexec.exe 85 4640 msiexec.exe 86 4640 msiexec.exe -
Downloads MZ/PE file
-
Executes dropped EXE 12 IoCs
Processes:
Python36.exePython36.exepython-3.6.2.exepython.exepythonw.exepythonw.exepythonw.exepythonw.exepythonw.exepythonw.exepythonw.exeReestr.exepid process 4312 Python36.exe 4352 Python36.exe 4544 python-3.6.2.exe 724 python.exe 5040 pythonw.exe 752 pythonw.exe 4368 pythonw.exe 4784 pythonw.exe 4524 pythonw.exe 3772 pythonw.exe 2648 pythonw.exe 4544 Reestr.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Package Cache\{69E3E4A6-2A0F-4A32-9C2D-591EEC107289}v3.6.2150.0\dev.msi office_xlm_macros C:\Users\Admin\AppData\Local\Package Cache\{348C0EFF-60B1-4E68-88B8-33D7DF70DFCF}v3.6.2150.0\exe.msi office_xlm_macros C:\Users\Admin\AppData\Local\Package Cache\{9B79DE7E-E864-4758-8DFC-85DA43B19671}v3.6.2150.0\tools.msi office_xlm_macros C:\Users\Admin\AppData\Local\Package Cache\{6B2D61BA-C42D-4324-B23F-1D7B5A2808EF}v3.6.2150.0\pip.msi office_xlm_macros -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
DDCD2BE64212B10C3CF84496A879B098.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation DDCD2BE64212B10C3CF84496A879B098.exe -
Loads dropped DLL 64 IoCs
Processes:
Python36.exeMsiExec.exepython.exepythonw.exepythonw.exepythonw.exepythonw.exepythonw.exepythonw.exepid process 4352 Python36.exe 1428 MsiExec.exe 724 python.exe 724 python.exe 724 python.exe 724 python.exe 724 python.exe 724 python.exe 724 python.exe 724 python.exe 724 python.exe 724 python.exe 724 python.exe 724 python.exe 724 python.exe 724 python.exe 5040 pythonw.exe 5040 pythonw.exe 5040 pythonw.exe 5040 pythonw.exe 5040 pythonw.exe 5040 pythonw.exe 5040 pythonw.exe 5040 pythonw.exe 752 pythonw.exe 752 pythonw.exe 752 pythonw.exe 752 pythonw.exe 752 pythonw.exe 752 pythonw.exe 752 pythonw.exe 752 pythonw.exe 4368 pythonw.exe 4368 pythonw.exe 4368 pythonw.exe 4368 pythonw.exe 4368 pythonw.exe 4368 pythonw.exe 4368 pythonw.exe 4368 pythonw.exe 4784 pythonw.exe 4784 pythonw.exe 4784 pythonw.exe 4784 pythonw.exe 4784 pythonw.exe 4784 pythonw.exe 4784 pythonw.exe 4784 pythonw.exe 4524 pythonw.exe 4524 pythonw.exe 4524 pythonw.exe 4524 pythonw.exe 4524 pythonw.exe 4524 pythonw.exe 4524 pythonw.exe 4524 pythonw.exe 3772 pythonw.exe 3772 pythonw.exe 3772 pythonw.exe 3772 pythonw.exe 3772 pythonw.exe 3772 pythonw.exe 3772 pythonw.exe 3772 pythonw.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
Python36.exeReestr.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\{8388fa07-1617-4b8d-8ad8-6a940ad8052c} = "\"C:\\Users\\Admin\\AppData\\Local\\Package Cache\\{8388fa07-1617-4b8d-8ad8-6a940ad8052c}\\python-3.6.2.exe\" /burn.runonce" Python36.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run Reestr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\Googl = "C:\\Users\\Admin\\AppData\\Local\\Programs\\Python\\Python36-32\\pythonw.exe C:\\Users\\Admin\\AppData\\Roaming\\1660.py" Reestr.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Python36.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exedescription ioc process File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
pythonw.exepythonw.exepythonw.exepythonw.exepythonw.exedescription pid process target process PID 5040 set thread context of 1400 5040 pythonw.exe svchost.exe PID 752 set thread context of 4100 752 pythonw.exe svchost.exe PID 4784 set thread context of 4592 4784 pythonw.exe iexplore.exe PID 4524 set thread context of 4400 4524 pythonw.exe iexplore.exe PID 2648 set thread context of 4492 2648 pythonw.exe svchost.exe -
Drops file in Windows directory 60 IoCs
Processes:
msiexec.exeMicrosoftEdge.exedescription ioc process File created C:\Windows\Installer\f746875.msi msiexec.exe File opened for modification C:\Windows\Installer\f746875.msi msiexec.exe File created C:\Windows\pyw.exe msiexec.exe File created C:\Windows\Installer\f746855.msi msiexec.exe File created C:\Windows\Installer\f746859.msi msiexec.exe File opened for modification C:\Windows\Installer\f746869.msi msiexec.exe File opened for modification C:\Windows\Installer\f74686d.msi msiexec.exe File created C:\Windows\Installer\SourceHash{9B79DE7E-E864-4758-8DFC-85DA43B19671} msiexec.exe File opened for modification C:\Windows\Installer\f746871.msi msiexec.exe File created C:\Windows\pyshellext.amd64.dll msiexec.exe File created C:\Windows\Installer\{2636F1E4-2BC5-4B19-BFFD-A08F72598309}\ARPIcon msiexec.exe File created C:\Windows\Installer\f746858.msi msiexec.exe File opened for modification C:\Windows\Installer\f746859.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI7B24.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAB26.tmp msiexec.exe File created C:\Windows\Installer\f746871.msi msiexec.exe File created C:\Windows\Installer\SourceHash{DF24AFFD-23AB-4A7D-A0E0-6410CE3B6B9D} msiexec.exe File created C:\Windows\Installer\f746879.msi msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\f746861.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI21C.tmp msiexec.exe File created C:\Windows\Installer\f746878.msi msiexec.exe File created C:\Windows\Installer\f746860.msi msiexec.exe File opened for modification C:\Windows\Installer\f746865.msi msiexec.exe File created C:\Windows\Installer\f746869.msi msiexec.exe File opened for modification C:\Windows\Installer\{2636F1E4-2BC5-4B19-BFFD-A08F72598309}\ARPIcon msiexec.exe File created C:\Windows\Installer\f74685d.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI8B28.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDA6D.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{4542573C-6216-4584-BA90-72BAF7954404} msiexec.exe File created C:\Windows\Installer\SourceHash{79B4337D-166F-4BC0-B67A-F73806CC730E} msiexec.exe File created C:\Windows\Installer\f746870.msi msiexec.exe File created C:\Windows\Installer\SourceHash{2636F1E4-2BC5-4B19-BFFD-A08F72598309} msiexec.exe File created C:\Windows\py.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI609.tmp msiexec.exe File opened for modification C:\Windows\Installer\f746855.msi msiexec.exe File opened for modification C:\Windows\Installer\f74685d.msi msiexec.exe File created C:\Windows\Installer\f746874.msi msiexec.exe File created C:\Windows\Installer\f746868.msi msiexec.exe File created C:\Windows\Installer\SourceHash{796410A7-1669-4FE4-8332-F684B61269E2} msiexec.exe File opened for modification C:\Windows\Installer\f746879.msi msiexec.exe File created C:\Windows\Installer\f746864.msi msiexec.exe File created C:\Windows\Installer\f74686c.msi msiexec.exe File created C:\Windows\Installer\SourceHash{6B2D61BA-C42D-4324-B23F-1D7B5A2808EF} msiexec.exe File created C:\Windows\Installer\SourceHash{348C0EFF-60B1-4E68-88B8-33D7DF70DFCF} msiexec.exe File opened for modification C:\Windows\Installer\MSI8132.tmp msiexec.exe File created C:\Windows\Installer\f746861.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{69E3E4A6-2A0F-4A32-9C2D-591EEC107289} msiexec.exe File created C:\Windows\Installer\f746865.msi msiexec.exe File created C:\Windows\Installer\f74687c.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSICF5E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI55B.tmp msiexec.exe File created C:\Windows\Installer\f74685c.msi msiexec.exe File created C:\Windows\Installer\SourceHash{433FD2E2-839C-4211-88B7-45C90F738842} msiexec.exe File created C:\Windows\Installer\f74686d.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI7881.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICB25.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1780 4492 WerFault.exe svchost.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\CompatibleIDs svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\CompatibleIDs svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe -
Processes:
MicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
msiexec.exesvchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\16\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16 msiexec.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exemsiexec.exePython36.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Python.CompiledFile\ = "Compiled Python File" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Installer\Dependencies\{4542573C-6216-4584-BA90-72BAF7954404}\ = "{4542573C-6216-4584-BA90-72BAF7954404}" Python36.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Python.File\shell msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Python.CompiledFile\DefaultIcon\ = "\"C:\\Windows\\py.exe\",2" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\FileVersion = "2016061511" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url4 = "https://login.live.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Installer\Dependencies\{69E3E4A6-2A0F-4A32-9C2D-591EEC107289}\DisplayName = "Python 3.6.2 Development Libraries (32-bit)" Python36.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Installer\Dependencies\{79B4337D-166F-4BC0-B67A-F73806CC730E} Python36.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Python.NoConFile\Shell\editwithidle\MUIVerb = "&Edit with IDLE" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Python.Extension msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = aa084d315b7cd701 MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.pyz\Content Type = "application/x-zip-compressed" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Installer\Dependencies\{433FD2E2-839C-4211-88B7-45C90F738842}\ = "{433FD2E2-839C-4211-88B7-45C90F738842}" Python36.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Python.NoConArchiveFile\shell\open\command\ = "\"C:\\Windows\\pyw.exe\" \"%L\" %*" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\4E1F63625CB291B4FBDF0AF827953890 msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B72164C = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Installer\Dependencies\{4542573C-6216-4584-BA90-72BAF7954404} Python36.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Installer\Dependencies\{348C0EFF-60B1-4E68-88B8-33D7DF70DFCF}\Dependents\{8388fa07-1617-4b8d-8ad8-6a940ad8052c} Python36.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing\NewTabPage\ProcessingFlag = 20075f465b7cd701 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Installer\Dependencies\{796410A7-1669-4FE4-8332-F684B61269E2}\DisplayName = "Python 3.6.2 Documentation (32-bit)" Python36.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = e6490a315b7cd701 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Installer\Dependencies\CPython-3.6-32\Version = "3.6.2150.0" Python36.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\Software\Classes\Python.ArchiveFile\DefaultIcon msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Python.File\Shell\editwithidle\shell\edit36-32 msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4E1F63625CB291B4FBDF0AF827953890\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Python.File\Shell\editwithidle\shell\edit36-32\MUIVerb = "Edit with IDLE 3.6 (32-bit)" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersion = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\CRLs MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\NextUpdateDate = "333452480" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\Software\Classes\Python.CompiledFile msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\DatastoreSchemaVersion = "8" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Installer\Dependencies\{348C0EFF-60B1-4E68-88B8-33D7DF70DFCF}\Version = "3.6.2150.0" Python36.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\Certificates MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 64f3874b5b7cd701 MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Python.ArchiveFile\shell\open\command msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PageSetup MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
Processes:
msiexec.exesvchost.exesvchost.exeiexplore.exeWerFault.exepid process 4640 msiexec.exe 4640 msiexec.exe 4640 msiexec.exe 4640 msiexec.exe 4640 msiexec.exe 4640 msiexec.exe 4640 msiexec.exe 4640 msiexec.exe 4640 msiexec.exe 4640 msiexec.exe 4640 msiexec.exe 4640 msiexec.exe 4640 msiexec.exe 4640 msiexec.exe 4640 msiexec.exe 4640 msiexec.exe 4640 msiexec.exe 4640 msiexec.exe 4640 msiexec.exe 4640 msiexec.exe 1400 svchost.exe 1400 svchost.exe 1400 svchost.exe 4100 svchost.exe 4100 svchost.exe 4100 svchost.exe 4592 iexplore.exe 4592 iexplore.exe 4592 iexplore.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
MicrosoftEdgeCP.exepid process 1800 MicrosoftEdgeCP.exe 1800 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exevssvc.exeMicrosoftEdgeCP.exePython36.exemsiexec.exesrtasks.exedescription pid process Token: SeDebugPrivilege 1940 MicrosoftEdge.exe Token: SeDebugPrivilege 1940 MicrosoftEdge.exe Token: SeDebugPrivilege 1940 MicrosoftEdge.exe Token: SeDebugPrivilege 1940 MicrosoftEdge.exe Token: SeDebugPrivilege 4120 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4120 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4120 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4120 MicrosoftEdgeCP.exe Token: SeBackupPrivilege 4644 vssvc.exe Token: SeRestorePrivilege 4644 vssvc.exe Token: SeAuditPrivilege 4644 vssvc.exe Token: SeDebugPrivilege 4868 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4868 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 4352 Python36.exe Token: SeIncreaseQuotaPrivilege 4352 Python36.exe Token: SeSecurityPrivilege 4640 msiexec.exe Token: SeCreateTokenPrivilege 4352 Python36.exe Token: SeAssignPrimaryTokenPrivilege 4352 Python36.exe Token: SeLockMemoryPrivilege 4352 Python36.exe Token: SeIncreaseQuotaPrivilege 4352 Python36.exe Token: SeMachineAccountPrivilege 4352 Python36.exe Token: SeTcbPrivilege 4352 Python36.exe Token: SeSecurityPrivilege 4352 Python36.exe Token: SeTakeOwnershipPrivilege 4352 Python36.exe Token: SeLoadDriverPrivilege 4352 Python36.exe Token: SeSystemProfilePrivilege 4352 Python36.exe Token: SeSystemtimePrivilege 4352 Python36.exe Token: SeProfSingleProcessPrivilege 4352 Python36.exe Token: SeIncBasePriorityPrivilege 4352 Python36.exe Token: SeCreatePagefilePrivilege 4352 Python36.exe Token: SeCreatePermanentPrivilege 4352 Python36.exe Token: SeBackupPrivilege 4352 Python36.exe Token: SeRestorePrivilege 4352 Python36.exe Token: SeShutdownPrivilege 4352 Python36.exe Token: SeDebugPrivilege 4352 Python36.exe Token: SeAuditPrivilege 4352 Python36.exe Token: SeSystemEnvironmentPrivilege 4352 Python36.exe Token: SeChangeNotifyPrivilege 4352 Python36.exe Token: SeRemoteShutdownPrivilege 4352 Python36.exe Token: SeUndockPrivilege 4352 Python36.exe Token: SeSyncAgentPrivilege 4352 Python36.exe Token: SeEnableDelegationPrivilege 4352 Python36.exe Token: SeManageVolumePrivilege 4352 Python36.exe Token: SeImpersonatePrivilege 4352 Python36.exe Token: SeCreateGlobalPrivilege 4352 Python36.exe Token: SeRestorePrivilege 4640 msiexec.exe Token: SeTakeOwnershipPrivilege 4640 msiexec.exe Token: SeBackupPrivilege 3608 srtasks.exe Token: SeRestorePrivilege 3608 srtasks.exe Token: SeSecurityPrivilege 3608 srtasks.exe Token: SeTakeOwnershipPrivilege 3608 srtasks.exe Token: SeBackupPrivilege 3608 srtasks.exe Token: SeRestorePrivilege 3608 srtasks.exe Token: SeSecurityPrivilege 3608 srtasks.exe Token: SeTakeOwnershipPrivilege 3608 srtasks.exe Token: SeRestorePrivilege 4640 msiexec.exe Token: SeTakeOwnershipPrivilege 4640 msiexec.exe Token: SeRestorePrivilege 4640 msiexec.exe Token: SeTakeOwnershipPrivilege 4640 msiexec.exe Token: SeRestorePrivilege 4640 msiexec.exe Token: SeTakeOwnershipPrivilege 4640 msiexec.exe Token: SeRestorePrivilege 4640 msiexec.exe Token: SeTakeOwnershipPrivilege 4640 msiexec.exe Token: SeRestorePrivilege 4640 msiexec.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeiexplore.exepid process 1940 MicrosoftEdge.exe 1800 MicrosoftEdgeCP.exe 1800 MicrosoftEdgeCP.exe 4400 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
DDCD2BE64212B10C3CF84496A879B098.exePython36.exeMicrosoftEdgeCP.exePython36.exemsiexec.exeMsiExec.exepythonw.exepythonw.exepythonw.exepythonw.exedescription pid process target process PID 3188 wrote to memory of 4312 3188 DDCD2BE64212B10C3CF84496A879B098.exe Python36.exe PID 3188 wrote to memory of 4312 3188 DDCD2BE64212B10C3CF84496A879B098.exe Python36.exe PID 3188 wrote to memory of 4312 3188 DDCD2BE64212B10C3CF84496A879B098.exe Python36.exe PID 4312 wrote to memory of 4352 4312 Python36.exe Python36.exe PID 4312 wrote to memory of 4352 4312 Python36.exe Python36.exe PID 4312 wrote to memory of 4352 4312 Python36.exe Python36.exe PID 1800 wrote to memory of 4120 1800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1800 wrote to memory of 4120 1800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1800 wrote to memory of 4120 1800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4352 wrote to memory of 4544 4352 Python36.exe python-3.6.2.exe PID 4352 wrote to memory of 4544 4352 Python36.exe python-3.6.2.exe PID 4352 wrote to memory of 4544 4352 Python36.exe python-3.6.2.exe PID 1800 wrote to memory of 4120 1800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1800 wrote to memory of 4120 1800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1800 wrote to memory of 4120 1800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1800 wrote to memory of 4120 1800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1800 wrote to memory of 4120 1800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1800 wrote to memory of 4120 1800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1800 wrote to memory of 4120 1800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4640 wrote to memory of 1428 4640 msiexec.exe MsiExec.exe PID 4640 wrote to memory of 1428 4640 msiexec.exe MsiExec.exe PID 4640 wrote to memory of 1428 4640 msiexec.exe MsiExec.exe PID 1428 wrote to memory of 724 1428 MsiExec.exe python.exe PID 1428 wrote to memory of 724 1428 MsiExec.exe python.exe PID 1428 wrote to memory of 724 1428 MsiExec.exe python.exe PID 3188 wrote to memory of 5040 3188 DDCD2BE64212B10C3CF84496A879B098.exe pythonw.exe PID 3188 wrote to memory of 5040 3188 DDCD2BE64212B10C3CF84496A879B098.exe pythonw.exe PID 3188 wrote to memory of 5040 3188 DDCD2BE64212B10C3CF84496A879B098.exe pythonw.exe PID 5040 wrote to memory of 2340 5040 pythonw.exe svchost.exe PID 5040 wrote to memory of 2340 5040 pythonw.exe svchost.exe PID 5040 wrote to memory of 2340 5040 pythonw.exe svchost.exe PID 5040 wrote to memory of 1400 5040 pythonw.exe svchost.exe PID 5040 wrote to memory of 1400 5040 pythonw.exe svchost.exe PID 5040 wrote to memory of 1400 5040 pythonw.exe svchost.exe PID 5040 wrote to memory of 1400 5040 pythonw.exe svchost.exe PID 5040 wrote to memory of 1400 5040 pythonw.exe svchost.exe PID 5040 wrote to memory of 1400 5040 pythonw.exe svchost.exe PID 5040 wrote to memory of 1400 5040 pythonw.exe svchost.exe PID 5040 wrote to memory of 1400 5040 pythonw.exe svchost.exe PID 5040 wrote to memory of 1400 5040 pythonw.exe svchost.exe PID 3188 wrote to memory of 752 3188 DDCD2BE64212B10C3CF84496A879B098.exe pythonw.exe PID 3188 wrote to memory of 752 3188 DDCD2BE64212B10C3CF84496A879B098.exe pythonw.exe PID 3188 wrote to memory of 752 3188 DDCD2BE64212B10C3CF84496A879B098.exe pythonw.exe PID 752 wrote to memory of 4100 752 pythonw.exe svchost.exe PID 752 wrote to memory of 4100 752 pythonw.exe svchost.exe PID 752 wrote to memory of 4100 752 pythonw.exe svchost.exe PID 752 wrote to memory of 4100 752 pythonw.exe svchost.exe PID 752 wrote to memory of 4100 752 pythonw.exe svchost.exe PID 752 wrote to memory of 4100 752 pythonw.exe svchost.exe PID 752 wrote to memory of 4100 752 pythonw.exe svchost.exe PID 752 wrote to memory of 4100 752 pythonw.exe svchost.exe PID 752 wrote to memory of 4100 752 pythonw.exe svchost.exe PID 3188 wrote to memory of 4368 3188 DDCD2BE64212B10C3CF84496A879B098.exe pythonw.exe PID 3188 wrote to memory of 4368 3188 DDCD2BE64212B10C3CF84496A879B098.exe pythonw.exe PID 3188 wrote to memory of 4368 3188 DDCD2BE64212B10C3CF84496A879B098.exe pythonw.exe PID 4368 wrote to memory of 1972 4368 pythonw.exe iexplore.exe PID 4368 wrote to memory of 1972 4368 pythonw.exe iexplore.exe PID 4368 wrote to memory of 1972 4368 pythonw.exe iexplore.exe PID 3188 wrote to memory of 4784 3188 DDCD2BE64212B10C3CF84496A879B098.exe pythonw.exe PID 3188 wrote to memory of 4784 3188 DDCD2BE64212B10C3CF84496A879B098.exe pythonw.exe PID 3188 wrote to memory of 4784 3188 DDCD2BE64212B10C3CF84496A879B098.exe pythonw.exe PID 4784 wrote to memory of 4592 4784 pythonw.exe iexplore.exe PID 4784 wrote to memory of 4592 4784 pythonw.exe iexplore.exe PID 4784 wrote to memory of 4592 4784 pythonw.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DDCD2BE64212B10C3CF84496A879B098.exe"C:\Users\Admin\AppData\Local\Temp\DDCD2BE64212B10C3CF84496A879B098.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Python36.exe"C:\Users\Admin\AppData\Roaming\Python36.exe" -s2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\{59A723B9-A2B9-443F-AF57-0C28A431A8A9}\.cr\Python36.exe"C:\Users\Admin\AppData\Local\Temp\{59A723B9-A2B9-443F-AF57-0C28A431A8A9}\.cr\Python36.exe" -burn.clean.room="C:\Users\Admin\AppData\Roaming\Python36.exe" -burn.filehandle.attached=516 -burn.filehandle.self=548 -s3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\{674F4B1A-C5FD-4049-BDEF-7249D8B7CF1F}\.be\python-3.6.2.exe"C:\Users\Admin\AppData\Local\Temp\{674F4B1A-C5FD-4049-BDEF-7249D8B7CF1F}\.be\python-3.6.2.exe" -q -burn.elevated BurnPipe.{080798A4-11CE-476D-A1BC-0FD6DD4BC46C} {578D39EB-90FE-427A-991E-6112F413CEB8} 43524⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\pythonw.exe"C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\pythonw.exe" "C:\Users\Admin\AppData\Roaming\run.py"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"3⤵
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\pythonw.exe"C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\pythonw.exe" "C:\Users\Admin\AppData\Roaming\run.py"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\pythonw.exe"C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\pythonw.exe" "C:\Users\Admin\AppData\Roaming\runIE.py"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\pythonw.exe"C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\pythonw.exe" "C:\Users\Admin\AppData\Roaming\runIE.py"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\pythonw.exe"C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\pythonw.exe" "C:\Users\Admin\AppData\Roaming\1660.py"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\pythonw.exe"C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\pythonw.exe" "C:\Users\Admin\AppData\Roaming\1660.py"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\pythonw.exe"C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\pythonw.exe" "C:\Users\Admin\AppData\Roaming\runBUI.py"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 12084⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\Reestr.exe"C:\Users\Admin\AppData\Roaming\Reestr.exe" -s2⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding AC2F3023CCD30975D573AD26DF23BC2A2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\python.exe"C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\python.exe" -E -s -m ensurepip -U --default-pip3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Package Cache\{348C0EFF-60B1-4E68-88B8-33D7DF70DFCF}v3.6.2150.0\exe.msiMD5
72cf4ae3e2a35e556fa95d96055eb651
SHA131bdd135cdea1b47c397a03809e59f960bf24dcb
SHA2565c8a378e6cdfd34c2c5b77abc8e32accefc2b7c078fae9f501dc69a0d7f5c4e8
SHA512d476894e9b493f9374f22f343d180235d5b697d5fa9d488c48553116c794edf5c653cb5bc3791b202f9582e02e91d88e9d9a23013da9ad97bc8fa64129198a62
-
C:\Users\Admin\AppData\Local\Package Cache\{433FD2E2-839C-4211-88B7-45C90F738842}v3.6.2150.0\test.msiMD5
d78ab96a4db9193bf340590a07de68ad
SHA13a7296346b7b79baac565debbda2df4255e11c8b
SHA256bb832f331b4b67b0c94715581efe3b765f3c28609c3e99f91d787233d4773b5e
SHA512883ffdd9606e9f90967d538d92ec7179e98accf199d27c49bc18f11bcce413f878d67cf5b9b302f6e575fddc68b1ab8c7f430fdea982a31737af259e74dba59f
-
C:\Users\Admin\AppData\Local\Package Cache\{4542573C-6216-4584-BA90-72BAF7954404}v3.6.2150.0\core.msiMD5
e7f4b02206820ab931b90cb8059de3e1
SHA1785c16c735d5db0a18966fc48e30eae212dc5b2e
SHA25657e3989c60f4cb55ad9e1a5aa06788fcdf8bc16f7a1dbcacf9f4b3359bb46af9
SHA512f36fcbb80e31d81a3217cbced35acf7eba27aefc39456d141684cc9fe4df073ff700625b624d8a9734ced339f06f1ad06e3c5ade54dc0dd7eae1d1c5446fc2c1
-
C:\Users\Admin\AppData\Local\Package Cache\{69E3E4A6-2A0F-4A32-9C2D-591EEC107289}v3.6.2150.0\dev.msiMD5
51ae15cc26f89afd8bd90dd837eecf30
SHA1ab34da159c601126e5c180e79ff5699571deef94
SHA25695f384abb300df8572ab40e54de3e40b675a126357111120de9a3d44f9da5697
SHA512778f3775fef3a7b7d5fe202a6bc67d5a8dca47246a536b5710b37609572cfe704015f2d6320a1472f17c7381ca0360853dfdca57ea456a7663e6fef27dd609a0
-
C:\Users\Admin\AppData\Local\Package Cache\{6B2D61BA-C42D-4324-B23F-1D7B5A2808EF}v3.6.2150.0\pip.msiMD5
3ebcd9dae04be0372ce63f5756bd6dd0
SHA1dbe6212c27f6b748459c61e052fe294453cc1fce
SHA256d1e898c23a7bac6d8060e0deea2f1e395ba990890d0b38144f02c632315c8f04
SHA512eec8d3b7fbe35a1f7c63e88ffcd1cf2e83d343cf1924d55b48a75217436a028d161d3fd3e76e9fcdc1d061cf20a753ce5c3872de718cad98bfc41022e89a58cc
-
C:\Users\Admin\AppData\Local\Package Cache\{796410A7-1669-4FE4-8332-F684B61269E2}v3.6.2150.0\doc.msiMD5
ef8c2a40773e8da1d677d6eb250730be
SHA1bfb49bc4d12dd759d7bbb073c45b958e06bc3a05
SHA256a937e94eb4b859023c6d417ace84e99855eb12aac4a1e094e0508fc87b9c83af
SHA5124f87fbba962ce7d800d7ed67810fc13bc5f92fd5be281fd4a1c5e43252f7435808138fccca6e69a95e19b29499318566f7b898ffda54843c188df4a6c71bda3b
-
C:\Users\Admin\AppData\Local\Package Cache\{79B4337D-166F-4BC0-B67A-F73806CC730E}v3.6.2150.0\lib.msiMD5
de1043e3deab00b273aad4a8f44ab19a
SHA1c94e0a1f0310fbb8a1ea78dda0d0a3478f73b4d2
SHA256b1125ba5e80e1bb3c850ea10a9fa9497e92f5a485fa3fb71276ab7f9e2aa9465
SHA51267147fbbe6bcd90ce7d3fc230dc288da64a9ac56e4b20455b4fa6359af16e02d9ecb8217613700cedc88d1d7d02e55c04fd353e4b161aed6cafad11bc7acaa8a
-
C:\Users\Admin\AppData\Local\Package Cache\{9B79DE7E-E864-4758-8DFC-85DA43B19671}v3.6.2150.0\tools.msiMD5
e377ace3558625f0d70322883c8ef9d6
SHA11ed06da291d01bdb5e907ba6698993609923ef1a
SHA2563b379f6e1dde90e5016035a353ad5d25843bcb98ed61cd4a57fee0a91c748106
SHA512e41cb944f719db22d4e2b0c885f4da161439e7ebce3205c88a84901bdb3c0256727ca28ef5f158b8bc1ed4bd1c794a6b86838fd273347dcf5841415b15f81546
-
C:\Users\Admin\AppData\Local\Package Cache\{DF24AFFD-23AB-4A7D-A0E0-6410CE3B6B9D}v3.6.2150.0\tcltk.msiMD5
74ff324c037405455cbb3b198c5047d8
SHA1fa8730214eae4f58178e081fcacdcf4297b19df6
SHA256ba91c891b49ffe6a8e9d3ff11fac4e09e04e80989ccb8198314910b5a0325340
SHA512288897d22058df16f4c7bf62967e8c38433957afa7bf84880f232953fb76645ab2c79232fddb6a682910e27d14dc6496387fa75eda9ab003c832108d475e292e
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\VCRUNTIME140.dllMD5
a2523ea6950e248cbdf18c9ea1a844f6
SHA1549c8c2a96605f90d79a872be73efb5d40965444
SHA2566823b98c3e922490a2f97f54862d32193900077e49f0360522b19e06e6da24b4
SHA5122141c041b6bdbee9ec10088b9d47df02bf72143eb3619e8652296d617efd77697f4dc8727d11998695768843b4e94a47b1aed2c6fb9f097ffc8a42ca7aaaf66a
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\_bootlocale.pyMD5
dd8b620ced4d19c5849717882ff5540c
SHA1c95d0d78358fc712fd2981decc1b2098f954ce28
SHA25655ac3372e4f9e816767fa1c7dad265948a3d36de9b21a119ee880dddc0acdfca
SHA5125d0cd08de74bbf0e69e546754552d440865bf181d6ee7b8170f0589838a311123cdf975b5eacabeccca81f22a3b187868a56b13495fc031b19a5bee60c37d0b9
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\_collections_abc.pyMD5
17d5ea8104911fde75326371daeb7a7b
SHA1de3a7695a68987a3c6ae3881149fc8a649c6cbac
SHA2562a1265dfb33caec0ffd0310b2e47004d1c575b03eecd82fa875ec372f9780fea
SHA51255d0453367e63c79ae2800f87df22e8f620c797b41a5d550bad0894995aa008eb5ce5ea3c58f43dbe3d5666fd1a3ce8204a1c20d8f812780a00b6c4b173d5dc6
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\_sitebuiltins.pyMD5
385fa756146827f7cf8d0cd67db9f4e8
SHA111121d9dc26c3524d54d061054fa2eeafd87a6f4
SHA256f7d3f4f4fa0290e861b2eaeb2643ffaf65b18ab7e953143eafa18b7ec68dbf59
SHA51223369ba61863f1ebe7be138f6666619eaabd67bb055c7f199b40a3511afe28758096b1297a14c84f5635178a309b9f467a644c096951cb0961466c629bf9e77c
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\_weakrefset.pyMD5
6d2a56cc44a5d8104235f1c2722f4b12
SHA182daf81c3f035e3d985112fe05807ee83bacaeb0
SHA256009bc5599d77a9546ab3e7672d47fd4dc3f41efb569be6037f3467a702a3de7c
SHA5124aab6ece0a26642ba05089d5fc3d8bac225aef0dc63257e8b6c6f95207b1ba350090386d46464e01dd9fc8129b8cdb17fdae29ae1c1b835db5c977a0e2a96191
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\abc.pyMD5
2f0a65a49186014e0468abe8dde65925
SHA1ded422abb29c350c080b70a67b87f2aa78ad0750
SHA256f0e0189c87dce0261ce2e38c31d07ea10dc2144841e8c451d0e6e1348f20c782
SHA5124df5650b03b078650839333e55a7102a138b244a78ded282480d5c7c27bdff9f8eecf53643959dd0387b2d50ae0132221a905bf23d67347b6164e05896be8d3e
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\codecs.pyMD5
3c435394ea2edc461e24d171e1374763
SHA18dcefb59bc701b0cf6f3b568700425d82d11e971
SHA25617cfeec9cd1fc661634da5c8a1576622f6adb95dcb9388b594351b840b1d5910
SHA5125e536d281a163d9e5f97606d9ff0aee67b6c8339957acc3e56d71801c8b5335da2b22ac8029331c8fef95180cb0bb7c7291a5dfb9de1e14181794c01ee1e230f
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\collections\__init__.pyMD5
eca035076b08a319cad5087f9abdd019
SHA1273e9a5d0fbee5e376a960585da060e3d1e581aa
SHA2562d1204eb8bdb487a0ba0008341cbd98ceafa1721acb9080d05b9642920d96a3c
SHA5122fc3a6f4780f998c963e141265c07023e038027731e4e2c483b7f038436e6c492f07c699998cfd9b7ad7f8095adece63b1f02f08bad97cd44b5a37bd71f50daf
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\collections\abc.pyMD5
d2ce426d398d733c0a197c1d846fa1b4
SHA1ee614fc3620309f2b262e2f2dfd4b8d486627980
SHA256cc6056f06c8ddcf59f142fcba8b2f8fd45fd4e56c3de4f705b96b15d3482d1dd
SHA5129058e80053fac97dd85a8a4835caaf9a8aa0ed29f6d3bbe20d92f44145ba1a92de2dc494b7de763caabc9af4015619e873520cf8f2e83ad9cef193fc2abb1fe1
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\encodings\__init__.pyMD5
7a6c41984175ab100ef29c88740a0146
SHA12b3c70a730c25960dd1eaeb25579fe906e969638
SHA256d6d5ae8089e16e77bb00f37d923db680483842c524614415cfe02ef2101d87e4
SHA51287750d6d0654bbbd2ac0840e2c4107897f58f5ad7f1a27293fca219dbeee29ca2e6f63d4fd5a407f0a14a60d0f4fc860a7231b3097974dcd6ab5501d703b6f62
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\encodings\aliases.pyMD5
794677da57c541836ef8c0be93415219
SHA167956cb212acc2b5dc578cff48d1fe189e5274e4
SHA2569ed4517a5778b2efbd76704f841738c12441ff649eed83b2ea033b3843c9b3d5
SHA51233c3fa687ea494029ff6f250557eaaa24647f847255628b9198a8a33859db0a716d5a3c54743d58b796a46102f2a57da3445935ca0fef1245164523ff4294088
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\encodings\cp1252.pyMD5
52084150c6d8fc16c8956388cdbe0868
SHA1368f060285ea704a9dc552f2fc88f7338e8017f2
SHA2567acb7b80c29d9ffda0fe79540509439537216df3a259973d54e1fb23c34e7519
SHA51277e7921f48c9a361a67bae80b9eec4790b8df51e6aff5c13704035a2a7f33316f119478ac526c2fdebb9ef30c0d7898aea878e3dba65f386d6e2c67fe61845b4
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\encodings\latin_1.pyMD5
92c4d5e13fe5abece119aa4d0c4be6c5
SHA179e464e63e3f1728efe318688fe2052811801e23
SHA2566d5a6c46fe6675543ea3d04d9b27ccce8e04d6dfeb376691381b62d806a5d016
SHA512c95f5344128993e9e6c2bf590ce7f2cffa9f3c384400a44c0bc3aca71d666ed182c040ec495ea3af83abbd9053c705334e5f4c3f7c07f65e7031e95fdfb7a561
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\encodings\utf_8.pyMD5
f932d95afcaea5fdc12e72d25565f948
SHA12685d94ba1536b7870b7172c06fe72cf749b4d29
SHA2569c54c7db8ce0722ca4ddb5f45d4e170357e37991afb3fcdc091721bf6c09257e
SHA512a10035ae10b963d2183d31c72ff681a21ed9e255dda22624cbaf8dbed5afbde7be05bb719b07573de9275d8b4793d2f4aef0c0c8346203eea606bb818a02cab6
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\functools.pyMD5
2448c40ecf354ce00dba12b77f17830a
SHA1364a55311c5e94ed00a2df2ee23cd827a3e6c8ec
SHA256f3b3f854aa3e149d1370b2bb274eaa811d6a4f3892c8802516a53c4520ef3043
SHA512a2116d220d3cd4baa28140df290b1cf6ddfebbdba8ffc72c8aa7bb0850f1931549096fa90b5ab30d2aca86a21c816fd82ba9f3faf13e0fab26bfe88288ab510c
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\genericpath.pyMD5
030f6a942a40e56c3431e7b32327502f
SHA15bc5a144f77099f5cdac2f8ea7c1ea9afb222cd0
SHA256e3a2455f322ee591758f26b63f872d58c905ad49a07230e68d8f893bf96b557c
SHA51259de303d4408452abbd2209f3c12a43c842bf5dbb29d52b7305b33b0c07a302c580ff66555c27bae01938c613d0f1b0e6672baeb1abedb5d9392d3fe34c117fa
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\heapq.pyMD5
606aec8ea01afc0ae93bd3c374f8c5bb
SHA17fa8caf5fac2be5f0af1558a48425fef4b8a9c03
SHA2566ded0ca67750d356886f70881a00beacd81cc1b618d5852d7ac416471cadbd02
SHA512c403418ebf52e6cc46f207dcfbc7a4c0a1406740131bcfa6bc1937152159025790e111fb6b1e0d5b396e913023924e36b61430d26a9684d1933c26a8100627f3
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\importlib\__init__.pyMD5
6a97dea7ce5d0dc7d6aea214d47b5801
SHA1375e560a2a8f8dfb99c0560a17482cce091a637c
SHA256d4693cfd422e9d74d8a460557418f3af001fcfdf38adef1d245604ad0a4e8c1f
SHA512d3ba3f6075dd7499e84bebf780fe6833eee1c256d078ac1b209d07ad9006e3fdfdb3d0adbc5125164cab5486453bdc4b75be8fabff4869ccff47016aeaeec478
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\io.pyMD5
2c098fb1d1a4c0a183da506daa34a786
SHA155fb1833342ad13c35c6d3cb5fda819327773b21
SHA256f89251a16945f7c125554cc91c7e7ed1560b366396c3153a4cadfb7a7133cd03
SHA512375903e7bf79cf6c8e7c4decff482f4b59594aaaef62e01f1f45d0f9e26f9e864690d79cdfbdcf46cd83562cc465ef419cac32739d35bcb9fe6124682a997918
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\keyword.pyMD5
ba20543669e5b82bc574877e9ea43c83
SHA180703fceca518d9b3e4b6fbd081a77d19bd6af95
SHA25649e8f1719c53c0159ba6ce5479558b59e960c18d00bc8466506b3aca5f8cc3fc
SHA51275ab67eef24e85b50e72b3be4457c449788dde8164c400b33366b4a127a116ca0f7575f6bec95f6f6b470ab5a5fa7e3c6dbf7a12d34d9cc44a933b80192ff98d
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\ntpath.pyMD5
7a968d35a55a99817714c3e9a0aabdb3
SHA12b16cfa13559dec884950fc7b75ed3c390e28565
SHA256de0d261033f561cd73e37074e6206c2b2b1cba60ac3caa0ceb4b1643524da796
SHA5123e8a17d3c7ee71d826863ccaf1ea452a2318ba77829a90726f835b4c7aeea853acb24f87d0b198ec01cdcbfa5745e6e8725ccfe24ae6c491a4a15d1e09fbbea7
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\operator.pyMD5
78e116343d01c521fb24e2659c0a9d83
SHA1c301ed122b80577f1d205aa4df351d437c5921d1
SHA256bbb2c2bacda61b6285aa7cf5d01fac5cca923da1e74e5a639a64e6d0c390374f
SHA51202b7fff93e9d3034b1c79a97b600cef861f13a3994738db9f80de6a00474502c53f783b05c4a90e99d5c398dd03e763876236c1c4e531b9f6d82b901018cd3d6
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\os.pyMD5
387575e4f688de42552cd975561bb332
SHA1219283dfadb08bc8dab340bb0e6964bb865a233a
SHA256f66b4495e2809db0866da5e004c651aedd3630ec6a69a455d76847377a00f124
SHA51269ca5450d8e99b473f21caad934e24f480fa90041d96bd37676a33be5ba6f9b2856a5f8553ca2dd33aef968e9a6b12355933b352747a4c66ffcaf841cae330d9
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\reprlib.pyMD5
4968d766b698a3c44efcff7777c8a227
SHA1a2e4e55028812457cc706ec17d7b6c8c993eef42
SHA2565222f717534084dfb31f178c3b7bf6f5c5423979ec3f8d6a179a20fe2d09c3ae
SHA5127f7baf780153d1663573d7e2b66407bc1d2c74a36d9b7e07bef7304a72e6d915b8303305e00864418852975fcfd3e08735202b4c27a0e960f8191fcd250ec8b9
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\runpy.pyMD5
f3ec1e554f6d59ce2a3d0bb879e4cca9
SHA19fd8d389a44e28c2e028d56a4f685c4b9b60e5a7
SHA256dfa6db4039f18fbeef1f4237cb59419f65bd927fb1eb60ba578127895cff7c00
SHA51245ab887d02acfd2083d599fa053c1d035edafa12a5dbaff3f0907c2ffd817a3a68e8c82aeb0b487c9a8f3f342f748247441029791a82164fb450ef8400ee4dde
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\site.pyMD5
d716a0bf6198799718e66bb2bc898322
SHA1844d9825701bf2faee5f8b7e82189b0ee01b42c5
SHA256aef7fa2dfd06386e532a025ea9a36271b612ff313c39fe07653cca4da08dac4d
SHA512bfe4fba84fc9dd4d9592274d092d2ddf5f441323aa5681a1db77cf9d681920391c8ae7c56a36f54495d8ae35e09ef2eff19a99012b4f2870ad96aa81c0c745b6
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\stat.pyMD5
c82139b5ae45bb46243eced2ba195d27
SHA15cdeeaec9e08954f755ef0395ad274a84518f777
SHA256cc2ee9076ddf61bdda1bf23d46fb510417f4d976bdc84b7beb7740577c356708
SHA512706c09c256052f84ddff1886ccbdbcde2a16c0b902a3f145bdc9a4cc108e030f156a0cac1ac99ea27e14acabe08b733f32bbf17749fb79c9590cd534253dcbb1
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\sysconfig.pyMD5
82dc74db6cd827e1f7319fd4a5f9c714
SHA19edb2af57e7d39d0a1c71004ea8fb8861a61c9b4
SHA2562be9f5bb2104ad87ee05962540da9bf109b0f1e8f44de439d564442af311386c
SHA51225963a0ede3c8715c9ee20823a62235e737ba8c8c06395d6b8020c7cd5f9f3e768475ff143cba1d6bdb7a68bdd87b572ba239fc91bdd0a7bdf2846f784eb652d
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\types.pyMD5
4550a669f84b5347ea80a87d2f1ad746
SHA15f17dd7c2cf41aff0ecd8c79503a1421dc509425
SHA2563fefe60a0b6cb707bb9c5afc5533605f779128b57ebc6a757f75ce6bb4866fbf
SHA5122f12c3aa8b8762a55877f2000dbc645d9eaca0a210cac3f8fa697651dc04adcea2c21d53970e389f2b4c3a891866a7b9e22e5f684354a801dba6a1bb197e4b15
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\warnings.pyMD5
466f7fcfe94209bef0cddfcda4e6c5fa
SHA1500673c1c60a44f0176cf3e359f773533445e935
SHA256fbc80d63a2ee3f63b63338a45232b6f696510c5341b183b6a0f8259992603e09
SHA512e42f6eb7889b9e2996216f496692d879940c8e667a691d9c6f6c8194d709fb6b154f36200eaaa46c54b2e91a42db86cba0a2a1441f3d4de112f3d30f6b2266db
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\lib\weakref.pyMD5
4e399f5c0217b4306191fc33804b529d
SHA1bb01b30bc255a726fb7bbb3b23a2965878c8751a
SHA25625256607e29c7ec45c94b0498e4ccbcd3d44e206a41b71df3c8b0009048cb568
SHA512d0b6a8340f93c36be5d8f4d785f699fba9a3f743bcdbba7ab2aeda1e872640d37104e68a93b0339e7043351187e6c3dd11a022d25b5f119cd780b0eba14afa6a
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\python.exeMD5
4d4fff42fde1576d31a7ef82b0f76e88
SHA190d2aa98e8da6ac969fce1d33a13f9477dfedc6a
SHA25685259a4f35690f8b4fc723c5bf81092d7feac4471a1f79d7c9a5b880589acb3f
SHA512e598689688b2d644ec321e639b4c959554b0192d8d59ddeaf5fb934c222e17b7956ec4044d2c04a829582baacc06da7fa8942987a52564e27e8225e9df5786e2
-
C:\Users\Admin\AppData\Local\Programs\Python\Python36-32\python36.dllMD5
e4313b13d3b2a0cebdcc417f5f7b7644
SHA18c31a8986bf0c1f5e573109a22056036620c8fdd
SHA2561005847cbd6771df9dd81e6cd5a40686cd6454bd644fc93347e3e56e668a464b
SHA5126f123627e4ab2fcf46098794b6254aab10185102b5133576cb3b02cc18161afea8889b6b2fbdb5a9207189d21aa5cde1fe8ee454bff01ea6dabf042943ab4833
-
C:\Users\Admin\AppData\Local\Temp\Python 3.6.2 (32-bit)_20210719050156_000_core_JustForMe.logMD5
34b751c17f6b8700c8e4bcfa911fbff6
SHA18d6d890821bdde70a6778f072cd730dc2cb5fe28
SHA2566028c1560b5329c30554688a298967450a33ecec7bc566aa22174acbd46c1258
SHA512994b2bb9ec2b7692add7e82d8ab724280867441b9c415747ad637fc55d3e9af32fb2afe6a8d077b01dbdbb90e532f45b01ce15145682087e7f74ed3fe3fa0b22
-
C:\Users\Admin\AppData\Local\Temp\Python 3.6.2 (32-bit)_20210719050156_001_dev_JustForMe.logMD5
4108e9a25daccd4907d2b7dbbae35ec6
SHA1f614ddf37f16becabd75aa16b0a6e9cde7decbd9
SHA2566ccfbf5304579d3549242c176bf9335f0fac63194e0cdc9c6e4ee66359b7c903
SHA5124a78ecd66bedf05797328b0a0e4b8ea90506619c4ef735a95d53e1a9f02715c5700befa2afa02be8de49f071c83b6f53e52b2d06129acc67d069dac70be5050e
-
C:\Users\Admin\AppData\Local\Temp\Python 3.6.2 (32-bit)_20210719050156_002_exe_JustForMe.logMD5
6e8a84cefd5d898edc64a1502c52ec76
SHA1ae6b4bbc6700fb29532fff71fa772e699d06d19d
SHA256632a532dfeb5439807a3d32e5ab0e595c6715467e1f4d28bd579fbc4717f17d8
SHA51278e2d63f019ea69654b48569113a8e19fa1dd230ace88af491c0ff447dd60a84b8045a27dcfbba008b6cf944c4e64f14252a6356c618346b42033abb82216109
-
C:\Users\Admin\AppData\Local\Temp\Python 3.6.2 (32-bit)_20210719050156_003_lib_JustForMe.logMD5
d6c6b30b40e24e3f4c02b69d24f6015e
SHA1497f725e6d9b08f6faf9c7b16d643f78b438827f
SHA2563572b3f343a33be3b14377b01984feb6f4205ea833069a4b65b5cd7cbf16b697
SHA512821856a98ccad071dab2b9d3bbd8a9369cf7ed8f6e9151f7295c900dbc24d6427956c356b0a8c4d56400b6ee75a43449aeb55c3b624058c70b27c614c8ede8fb
-
C:\Users\Admin\AppData\Local\Temp\Python 3.6.2 (32-bit)_20210719050156_004_test_JustForMe.logMD5
3321018e93ab4ff3e4f06b1da9db0b63
SHA14646343ab436a8a3730c868ab966bd70a89b8a46
SHA256080e4e01008330cf08ececdf36627ce5c3292b308f71f508a512e8f69681b65d
SHA512fca0fe57831e4ce13ceffe22af6af6bfdb268e306cf4d9b290e122e972fd5c8455564a555e7a0d3f34bdd5dce002e5918ecae0d2004a42bc06eefaea767f55dc
-
C:\Users\Admin\AppData\Local\Temp\Python 3.6.2 (32-bit)_20210719050156_005_doc_JustForMe.logMD5
b0014b47379eb18cb00606ca403dca09
SHA1125b670c3638c74c3e877443aafd7165b975429e
SHA256fd508597b0ddd6ca5ff13914ef8bfd151bf1dbec29d9044e8c7d91604457167d
SHA5127c4f7acb82960222ec616709a6f07f0aba76923efcdacddae55830d9fad23541bf796b0848bdc01a059b020a40e9b1ee9d3636ce6f23760f68d69dfdfef044f6
-
C:\Users\Admin\AppData\Local\Temp\Python 3.6.2 (32-bit)_20210719050156_006_tools_JustForMe.logMD5
24c125dfc917ae0a0ba36fd43e13b7ce
SHA13bd0b27a1ca757c93b19cdd8dcbb3c9085785685
SHA2565000a9304f86f82e3b0f954691e92387646d86beafcb42084194515c3242b32b
SHA51229c52bd502ebe327d525a18d1a41a031c14c220a426f576f083aeea3497aaa7304d81ab3f2a7b32805f5eaff7f102436b4ece156415e367211f7ee9779f9d692
-
C:\Users\Admin\AppData\Local\Temp\Python 3.6.2 (32-bit)_20210719050156_007_tcltk_JustForMe.logMD5
bc2486025e776c1546ad164417eaa780
SHA14fb74d798d968f3d61a34f68f4de1cf676e955d5
SHA256da9833410a29ea143fd889759fb09e98d4701aed08d9e9a3923e3bf50bc3ded0
SHA5129b91bf35bb8fa4574e3c1790142d079d74a9a5663963040a5762b298489417c4caaf32a74d21bc6bfc171bd6e61738055290b6545c075eec451cc1041249967e
-
C:\Users\Admin\AppData\Local\Temp\Python 3.6.2 (32-bit)_20210719050156_008_launcher_AllUsers.logMD5
bed3d9bd0c98b98d57b46a577e9ac331
SHA1bd8b660a94656bb3037b9767cfe12a3c9c44348c
SHA256cb375d20036576fec1a7fb77cb1cc511bae5bd86ebd511adc06e0d8ec919fdc0
SHA51224408f8124a6e6f888f0c85bbd8679a0c6ba42e6dac97337f079bc91f1b47aada1b75be21d21be18b0a979d85f64e492259eb12d33ca6785f8f0bfbdfa9e4783
-
C:\Users\Admin\AppData\Local\Temp\Python 3.6.2 (32-bit)_20210719050156_009_pip_JustForMe.logMD5
aeb05332813df50dbdc170e399195bc1
SHA1f1eeed4e311055567a8fe5b7c2e156ea60117ee4
SHA256ec73bde3be27d83921e02d7fe6c251f7250cd8843d3695293de26ddb9268b8a0
SHA51289f9249333714b06e903e59bfe3d916236c840337ea770f5e077bdb95aeb76956c0df6779389ba918e2cc56e5a015f0e8a1733497a912cf916ed7e898186a064
-
C:\Users\Admin\AppData\Local\Temp\{59A723B9-A2B9-443F-AF57-0C28A431A8A9}\.cr\Python36.exeMD5
2d13b705faf7270b2860105a04a87d65
SHA1b5fde184a3198619190740cec0be79fba0f14fb1
SHA256118cea1828eeb67e93ce0d30588b9280eef609d3d498d3c2d56a44cc30c3d156
SHA5129c6a238f9e820add15b7fbb56f01eb3a2597739ddea20e927a669e0aa2e7e2fc8d90a0c779ee4c6d8048fc08948a37cf3042fc5d577a153e2a344255aa5656ad
-
C:\Users\Admin\AppData\Local\Temp\{59A723B9-A2B9-443F-AF57-0C28A431A8A9}\.cr\Python36.exeMD5
2d13b705faf7270b2860105a04a87d65
SHA1b5fde184a3198619190740cec0be79fba0f14fb1
SHA256118cea1828eeb67e93ce0d30588b9280eef609d3d498d3c2d56a44cc30c3d156
SHA5129c6a238f9e820add15b7fbb56f01eb3a2597739ddea20e927a669e0aa2e7e2fc8d90a0c779ee4c6d8048fc08948a37cf3042fc5d577a153e2a344255aa5656ad
-
C:\Users\Admin\AppData\Local\Temp\{674F4B1A-C5FD-4049-BDEF-7249D8B7CF1F}\.be\python-3.6.2.exeMD5
2d13b705faf7270b2860105a04a87d65
SHA1b5fde184a3198619190740cec0be79fba0f14fb1
SHA256118cea1828eeb67e93ce0d30588b9280eef609d3d498d3c2d56a44cc30c3d156
SHA5129c6a238f9e820add15b7fbb56f01eb3a2597739ddea20e927a669e0aa2e7e2fc8d90a0c779ee4c6d8048fc08948a37cf3042fc5d577a153e2a344255aa5656ad
-
C:\Users\Admin\AppData\Local\Temp\{674F4B1A-C5FD-4049-BDEF-7249D8B7CF1F}\.be\python-3.6.2.exeMD5
2d13b705faf7270b2860105a04a87d65
SHA1b5fde184a3198619190740cec0be79fba0f14fb1
SHA256118cea1828eeb67e93ce0d30588b9280eef609d3d498d3c2d56a44cc30c3d156
SHA5129c6a238f9e820add15b7fbb56f01eb3a2597739ddea20e927a669e0aa2e7e2fc8d90a0c779ee4c6d8048fc08948a37cf3042fc5d577a153e2a344255aa5656ad
-
C:\Users\Admin\AppData\Local\Temp\{674F4B1A-C5FD-4049-BDEF-7249D8B7CF1F}\launcher_AllUsersMD5
88ed76d42643b02ece388109120a3254
SHA172ebec4b3351fca74a8060ab804fb1c6558d6a72
SHA25625a330a00ff50cb12742cfc544391f0f8e5e66a6d09ae6b5dda3163507f32c16
SHA5127e718b92b4f910e5585b50fdcf7bdd0b84d73ac2436d37760cfa82926f9e2513d453874fdf3bcc303dd09b272a8a8cc4501290beee40607e7780e2ac171a042c
-
C:\Users\Admin\AppData\Roaming\Python36.exeMD5
8d8e1711ef9a4b3d3d0ce21e4155c0f5
SHA1cd9744b142eca832f9534390676e6cfb84bf655d
SHA25613725db4df084dcc1600716cb8cd150300f4420aaf48a2f21ce14b7aad0a2c13
SHA5122eb6284f56eba41a2e701089610354aa1f1f08b154a1612314e67f3b28ec40f4d541bfb20bd34f2895a4d4916ee2adc2261e7f0727e66c2b150477fc3924cc81
-
C:\Users\Admin\AppData\Roaming\python36.exeMD5
8d8e1711ef9a4b3d3d0ce21e4155c0f5
SHA1cd9744b142eca832f9534390676e6cfb84bf655d
SHA25613725db4df084dcc1600716cb8cd150300f4420aaf48a2f21ce14b7aad0a2c13
SHA5122eb6284f56eba41a2e701089610354aa1f1f08b154a1612314e67f3b28ec40f4d541bfb20bd34f2895a4d4916ee2adc2261e7f0727e66c2b150477fc3924cc81
-
C:\Windows\Installer\MSI609.tmpMD5
3a4e61909500d677745ef2ab508f3f3b
SHA1ee398e1a153ca96c2592816eb8e8b2b7bb845e1e
SHA256fb7a6eb19d1d1042d3bd8b3add9271116b8b6db3714dfcc0b6fee8e088d4a2cc
SHA512feba07bba5007a20e0a1e2ca8c9050ae8624e8fbb0f24aada5dc7c2bde3be561b844453a573cab2a24c3769a8dba401db4eeef0d22ef86e2109b67e54392ee45
-
\Users\Admin\AppData\Local\Programs\Python\Python36-32\python36.dllMD5
e4313b13d3b2a0cebdcc417f5f7b7644
SHA18c31a8986bf0c1f5e573109a22056036620c8fdd
SHA2561005847cbd6771df9dd81e6cd5a40686cd6454bd644fc93347e3e56e668a464b
SHA5126f123627e4ab2fcf46098794b6254aab10185102b5133576cb3b02cc18161afea8889b6b2fbdb5a9207189d21aa5cde1fe8ee454bff01ea6dabf042943ab4833
-
\Users\Admin\AppData\Local\Programs\Python\Python36-32\vcruntime140.dllMD5
a2523ea6950e248cbdf18c9ea1a844f6
SHA1549c8c2a96605f90d79a872be73efb5d40965444
SHA2566823b98c3e922490a2f97f54862d32193900077e49f0360522b19e06e6da24b4
SHA5122141c041b6bdbee9ec10088b9d47df02bf72143eb3619e8652296d617efd77697f4dc8727d11998695768843b4e94a47b1aed2c6fb9f097ffc8a42ca7aaaf66a
-
\Users\Admin\AppData\Local\Temp\{674F4B1A-C5FD-4049-BDEF-7249D8B7CF1F}\.ba\PythonBA.dllMD5
cf68168f96345851e641a6cd2840aeb3
SHA13f8bb6bd19645fb10e1bbb985a5d629011ed7227
SHA256dae80265cba9a41709c80aadbad6c81ea13c4f498af54c3e510f604fcb567074
SHA5126a4bdce0a4d2dfcbbcefadf1fa7957d2867282b91631fc7adbe0930e5f30b30afc652ce76797dfc8c5588d7641b046f2de1f448fbd75282f4b1b830c01244c4f
-
\Windows\Installer\MSI609.tmpMD5
3a4e61909500d677745ef2ab508f3f3b
SHA1ee398e1a153ca96c2592816eb8e8b2b7bb845e1e
SHA256fb7a6eb19d1d1042d3bd8b3add9271116b8b6db3714dfcc0b6fee8e088d4a2cc
SHA512feba07bba5007a20e0a1e2ca8c9050ae8624e8fbb0f24aada5dc7c2bde3be561b844453a573cab2a24c3769a8dba401db4eeef0d22ef86e2109b67e54392ee45
-
memory/724-152-0x0000000000000000-mapping.dmp
-
memory/752-193-0x0000000000000000-mapping.dmp
-
memory/1400-203-0x0000000007701000-0x0000000007702000-memory.dmpFilesize
4KB
-
memory/1400-197-0x00000000050A0000-0x00000000050B9000-memory.dmpFilesize
100KB
-
memory/1400-269-0x0000000009500000-0x0000000009501000-memory.dmpFilesize
4KB
-
memory/1400-267-0x00000000091C0000-0x00000000091C1000-memory.dmpFilesize
4KB
-
memory/1400-190-0x000000000040CD2F-mapping.dmp
-
memory/1400-189-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/1400-263-0x0000000008FF0000-0x0000000008FF1000-memory.dmpFilesize
4KB
-
memory/1400-195-0x0000000004DB0000-0x0000000004DCB000-memory.dmpFilesize
108KB
-
memory/1400-196-0x0000000007D00000-0x0000000007D01000-memory.dmpFilesize
4KB
-
memory/1400-202-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/1400-198-0x0000000008810000-0x0000000008811000-memory.dmpFilesize
4KB
-
memory/1400-199-0x00000000075D0000-0x00000000075D1000-memory.dmpFilesize
4KB
-
memory/1400-200-0x0000000007640000-0x0000000007641000-memory.dmpFilesize
4KB
-
memory/1400-221-0x00000000079E0000-0x00000000079E1000-memory.dmpFilesize
4KB
-
memory/1400-204-0x0000000007680000-0x0000000007681000-memory.dmpFilesize
4KB
-
memory/1400-206-0x0000000007704000-0x0000000007705000-memory.dmpFilesize
4KB
-
memory/1400-205-0x0000000007703000-0x0000000007704000-memory.dmpFilesize
4KB
-
memory/1400-207-0x0000000007705000-0x0000000007706000-memory.dmpFilesize
4KB
-
memory/1428-147-0x0000000000000000-mapping.dmp
-
memory/2648-262-0x0000000000000000-mapping.dmp
-
memory/3772-261-0x0000000000000000-mapping.dmp
-
memory/4100-209-0x000000000040CD2F-mapping.dmp
-
memory/4100-231-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/4100-233-0x0000000007503000-0x0000000007504000-memory.dmpFilesize
4KB
-
memory/4100-232-0x0000000007501000-0x0000000007502000-memory.dmpFilesize
4KB
-
memory/4100-234-0x0000000007504000-0x0000000007505000-memory.dmpFilesize
4KB
-
memory/4100-235-0x0000000007505000-0x0000000007506000-memory.dmpFilesize
4KB
-
memory/4100-265-0x00000000094F0000-0x00000000094F1000-memory.dmpFilesize
4KB
-
memory/4312-115-0x0000000000000000-mapping.dmp
-
memory/4352-118-0x0000000000000000-mapping.dmp
-
memory/4368-213-0x0000000000000000-mapping.dmp
-
memory/4368-237-0x0000000001230000-0x0000000001231000-memory.dmpFilesize
4KB
-
memory/4400-257-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/4400-258-0x000000000048F888-mapping.dmp
-
memory/4492-683-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/4492-684-0x0000000000412271-mapping.dmp
-
memory/4492-692-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/4524-242-0x0000000000000000-mapping.dmp
-
memory/4544-122-0x0000000000000000-mapping.dmp
-
memory/4544-687-0x0000000000000000-mapping.dmp
-
memory/4592-239-0x000000000040CD2F-mapping.dmp
-
memory/4784-256-0x0000000000550000-0x00000000005FE000-memory.dmpFilesize
696KB
-
memory/4784-236-0x0000000000000000-mapping.dmp
-
memory/5040-201-0x0000000002D00000-0x0000000002D01000-memory.dmpFilesize
4KB
-
memory/5040-188-0x0000000000000000-mapping.dmp