Analysis
-
max time kernel
162s -
max time network
166s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
29-08-2021 02:16
Static task
static1
Behavioral task
behavioral1
Sample
5b9805d7b48c07d06c115c68f6453126.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
5b9805d7b48c07d06c115c68f6453126.exe
Resource
win10v20210408
General
-
Target
5b9805d7b48c07d06c115c68f6453126.exe
-
Size
142KB
-
MD5
5b9805d7b48c07d06c115c68f6453126
-
SHA1
5d9fd16789e50eeb8dde5cfe06562328ae1620e2
-
SHA256
5739ea70dbe1a9d014b42300149b2ccbcf628cf08af00053708003caf3bbc14d
-
SHA512
2e19f2979ebea298e526586cd858f1da2ba19ef0a3903244f6dcd930cc478b5034014fb4d9df3f568eb04fdb8a6329847609834ec330002728ea1858fd7528c2
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Extracted
redline
WORD1
94.26.249.88:1902
Extracted
redline
Sergey
51.254.68.139:15009
Extracted
raccoon
20d9c80657d1d0fda9625cbd629ba419b8a34404
-
url4cnc
https://telete.in/hfuimoneymake
Extracted
raccoon
d02c5d65069fc7ce1993e7c52edf0c9c4c195c81
-
url4cnc
https://telete.in/open3entershift
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 31 IoCs
Processes:
resource yara_rule behavioral2/memory/1184-136-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral2/memory/1184-137-0x000000000041A68E-mapping.dmp family_redline behavioral2/memory/1308-138-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral2/memory/1308-139-0x000000000041C5E2-mapping.dmp family_redline behavioral2/memory/3956-170-0x000000000041C5E2-mapping.dmp family_redline behavioral2/memory/1252-184-0x000000000041C5E2-mapping.dmp family_redline behavioral2/memory/2832-223-0x000000000041C5E2-mapping.dmp family_redline behavioral2/memory/3180-250-0x000000000041C5E2-mapping.dmp family_redline behavioral2/memory/4604-271-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/4408-289-0x000000000041C5E2-mapping.dmp family_redline behavioral2/memory/5000-339-0x000000000041C5E2-mapping.dmp family_redline behavioral2/memory/4400-364-0x000000000041C5E2-mapping.dmp family_redline behavioral2/memory/416-393-0x000000000041C5E2-mapping.dmp family_redline behavioral2/memory/4988-454-0x000000000041C5E2-mapping.dmp family_redline behavioral2/memory/4988-478-0x0000000005310000-0x0000000005916000-memory.dmp family_redline behavioral2/memory/4792-531-0x000000000041C5E2-mapping.dmp family_redline behavioral2/memory/4508-668-0x000000000041C5E2-mapping.dmp family_redline behavioral2/memory/4508-694-0x0000000004D40000-0x0000000005346000-memory.dmp family_redline behavioral2/memory/5688-767-0x000000000041C5E2-mapping.dmp family_redline behavioral2/memory/5116-859-0x000000000041C5E2-mapping.dmp family_redline behavioral2/memory/5948-943-0x000000000041C5E2-mapping.dmp family_redline behavioral2/memory/5808-969-0x000000000041C5E2-mapping.dmp family_redline behavioral2/memory/6100-979-0x000000000041C5E2-mapping.dmp family_redline behavioral2/memory/5400-989-0x000000000041C5E2-mapping.dmp family_redline behavioral2/memory/5716-999-0x000000000041C5E2-mapping.dmp family_redline behavioral2/memory/4208-1009-0x000000000041C5E2-mapping.dmp family_redline behavioral2/memory/4616-1019-0x000000000041C5E2-mapping.dmp family_redline behavioral2/memory/5440-1029-0x000000000041C5E2-mapping.dmp family_redline behavioral2/memory/4600-1039-0x000000000041C5E2-mapping.dmp family_redline behavioral2/memory/4736-1049-0x000000000041C5E2-mapping.dmp family_redline behavioral2/memory/4456-1059-0x000000000041C5E2-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid Process procid_target PID 4748 created 3140 4748 WerFault.exe 82 -
Turns off Windows Defender SpyNet reporting 2 TTPs
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Nirsoft 3 IoCs
Processes:
resource yara_rule behavioral2/files/0x000100000001ab61-220.dat Nirsoft behavioral2/files/0x000100000001ab61-227.dat Nirsoft behavioral2/files/0x000100000001ab61-234.dat Nirsoft -
Downloads MZ/PE file
-
Executes dropped EXE 45 IoCs
Processes:
BF7.exe1407.exe14A4.exeBF7.exe1C85.exeBF7.exe3434.exeBF7.exe36D5.exe3E48.exeMicrosoftEdge.exeBF7.exeAdvancedRun.exe4416.exeBF7.exeBF7.exesmss.exeBF7.exeBF7.exeBF7.exeBF7.exeBF7.exeBF7.exeBF7.exeBF7.exeBF7.exesmss.exeBF7.exeBF7.exeBF7.exeBF7.exeBF7.exeBF7.exeBF7.exeBF7.exeBF7.exeBF7.exeBF7.exeBF7.exeBF7.exeBF7.exeBF7.exeBF7.exeBF7.exeBF7.exepid Process 2300 BF7.exe 3140 1407.exe 392 14A4.exe 1308 BF7.exe 8 1C85.exe 3956 BF7.exe 188 3434.exe 1252 BF7.exe 1216 36D5.exe 1284 3E48.exe 3036 MicrosoftEdge.exe 2832 BF7.exe 3932 AdvancedRun.exe 4100 4416.exe 3180 BF7.exe 4408 BF7.exe 5084 smss.exe 5000 BF7.exe 4400 BF7.exe 416 BF7.exe 4988 BF7.exe 4792 BF7.exe 1404 BF7.exe 4508 BF7.exe 5688 BF7.exe 5116 BF7.exe 4800 smss.exe 5948 BF7.exe 5936 BF7.exe 5808 BF7.exe 5908 BF7.exe 6100 BF7.exe 5196 BF7.exe 5400 BF7.exe 5716 BF7.exe 5964 BF7.exe 6028 BF7.exe 4208 BF7.exe 4616 BF7.exe 5440 BF7.exe 5356 BF7.exe 4600 BF7.exe 4736 BF7.exe 4456 BF7.exe 5696 BF7.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
1C85.exe3434.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1C85.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1C85.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3434.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3434.exe -
Deletes itself 1 IoCs
Processes:
pid Process 2536 -
Loads dropped DLL 1 IoCs
Processes:
1407.exepid Process 3140 1407.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/files/0x000200000001ab57-149.dat themida behavioral2/files/0x000200000001ab57-156.dat themida behavioral2/memory/8-161-0x0000000001230000-0x0000000001231000-memory.dmp themida behavioral2/files/0x000200000001ab58-182.dat themida behavioral2/files/0x000200000001ab58-196.dat themida behavioral2/memory/188-207-0x0000000000B50000-0x0000000000B51000-memory.dmp themida -
Processes:
36D5.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 36D5.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths 36D5.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions 36D5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\36D5.exe = "0" 36D5.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 36D5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" 36D5.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection 36D5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 36D5.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet 36D5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" 36D5.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3E48.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run 3E48.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\smss.exe\" -start" 3E48.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
1C85.exe3434.exe36D5.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1C85.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3434.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 36D5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 36D5.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
smss.exedescription ioc Process File opened (read-only) \??\W: smss.exe File opened (read-only) \??\U: smss.exe File opened (read-only) \??\O: smss.exe File opened (read-only) \??\H: smss.exe File opened (read-only) \??\E: smss.exe File opened (read-only) \??\X: smss.exe File opened (read-only) \??\Q: smss.exe File opened (read-only) \??\K: smss.exe File opened (read-only) \??\G: smss.exe File opened (read-only) \??\F: smss.exe File opened (read-only) \??\V: smss.exe File opened (read-only) \??\Y: smss.exe File opened (read-only) \??\T: smss.exe File opened (read-only) \??\S: smss.exe File opened (read-only) \??\R: smss.exe File opened (read-only) \??\I: smss.exe File opened (read-only) \??\B: smss.exe File opened (read-only) \??\A: smss.exe File opened (read-only) \??\Z: smss.exe File opened (read-only) \??\N: smss.exe File opened (read-only) \??\M: smss.exe File opened (read-only) \??\L: smss.exe File opened (read-only) \??\J: smss.exe File opened (read-only) \??\P: smss.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 38 geoiptool.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
1C85.exe3434.exepid Process 8 1C85.exe 188 3434.exe -
Suspicious use of SetThreadContext 28 IoCs
Processes:
5b9805d7b48c07d06c115c68f6453126.exe14A4.exeBF7.exe36D5.exedescription pid Process procid_target PID 764 set thread context of 68 764 5b9805d7b48c07d06c115c68f6453126.exe 75 PID 392 set thread context of 1184 392 14A4.exe 84 PID 2300 set thread context of 1308 2300 BF7.exe 81 PID 2300 set thread context of 3956 2300 BF7.exe 86 PID 2300 set thread context of 1252 2300 BF7.exe 89 PID 2300 set thread context of 2832 2300 BF7.exe 92 PID 2300 set thread context of 3180 2300 BF7.exe 100 PID 1216 set thread context of 4604 1216 36D5.exe 116 PID 2300 set thread context of 4408 2300 BF7.exe 110 PID 2300 set thread context of 5000 2300 BF7.exe 121 PID 2300 set thread context of 4400 2300 BF7.exe 131 PID 2300 set thread context of 416 2300 BF7.exe 135 PID 2300 set thread context of 4988 2300 BF7.exe 139 PID 2300 set thread context of 4792 2300 BF7.exe 140 PID 2300 set thread context of 4508 2300 BF7.exe 144 PID 2300 set thread context of 5688 2300 BF7.exe 146 PID 2300 set thread context of 5116 2300 BF7.exe 147 PID 2300 set thread context of 5948 2300 BF7.exe 151 PID 2300 set thread context of 5808 2300 BF7.exe 171 PID 2300 set thread context of 6100 2300 BF7.exe 174 PID 2300 set thread context of 5400 2300 BF7.exe 176 PID 2300 set thread context of 5716 2300 BF7.exe 177 PID 2300 set thread context of 4208 2300 BF7.exe 180 PID 2300 set thread context of 4616 2300 BF7.exe 181 PID 2300 set thread context of 5440 2300 BF7.exe 182 PID 2300 set thread context of 4600 2300 BF7.exe 184 PID 2300 set thread context of 4736 2300 BF7.exe 185 PID 2300 set thread context of 4456 2300 BF7.exe 186 -
Drops file in Program Files directory 64 IoCs
Processes:
smss.exedescription ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-print_zh_CN.jar.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-nodes_zh_CN.jar smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Red.xml smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial5-ul-oob.xrm-ms.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019R_Grace-ul-oob.xrm-ms smss.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.services_1.1.0.v20140328-1925.jar.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_default_gtk.css smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019R_Retail-ul-phn.xrm-ms smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Standard2019VL_MAK_AE-ul-phn.xrm-ms.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\MSQRY32.CHM.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019MSDNR_Retail-pl.xrm-ms smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProXC2RVL_MAKC2R-ul-oob.xrm-ms.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OFFSYMXL.TTF.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\AccessBridgeCalls.c smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\orbd.exe smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessR_Retail-pl.xrm-ms smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessEntryR_PrepidBypass-ul-oob.xrm-ms.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Word2019R_Retail-pl.xrm-ms.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\THIRDPARTYLICENSEREADME.txt.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Retrospect.thmx smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Retail-ul-phn.xrm-ms smss.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\sound.properties.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019VL_MAK_AE-ppd.xrm-ms.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardR_Trial-pl.xrm-ms.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.net_1.2.200.v20140124-2013.jar.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-options_zh_CN.jar smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-selector-ui_zh_CN.jar.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Blue.xml.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelVL_MAK-ul-phn.xrm-ms smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_Trial-pl.xrm-ms smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_SubTrial-pl.xrm-ms smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusE5R_Subscription-pl.xrm-ms smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\ECLIPSE_.RSA.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\lib\locale\jfluid-server_zh_CN.jar smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-heapwalker_ja.jar smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\NAMECONTROLSERVER.EXE smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_Retail-pl.xrm-ms smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProCO365R_Subscription-pl.xrm-ms smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardR_Grace-ul-oob.xrm-ms smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.net.nl_zh_4.4.0.v20140623020002.jar smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_OEM_Perp-ul-oob.xrm-ms smss.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.SF smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.jarprocessor_1.0.300.v20131211-1531.jar.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPOlive.png.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_OEM_Perp-ul-oob.xrm-ms smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial3-pl.xrm-ms.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.extensionlocation_1.2.100.v20131119-0908.jar.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ui.sdk.scheduler.nl_ja_4.4.0.v20140623020002.jar.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\booklist.gif smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\GRAPH.ICO smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\ECLIPSE_.SF smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Grunge Texture.eftx smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365EduCloudEDUR_SubTrial-ppd.xrm-ms smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp4-ul-oob.xrm-ms.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\EXCEL_COL.HXT smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.simpleconfigurator.nl_ja_4.4.0.v20140623020002.jar smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-core-windows_ja.jar smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp4-ul-phn.xrm-ms.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_O16EnterpriseVL_Bypass30-ppd.xrm-ms.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365BusinessR_SubTest-ppd.xrm-ms.payfast290.8F6-B18-765 smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-lib-uihandler.xml smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-application-views_zh_CN.jar smss.exe -
Drops file in Windows directory 1 IoCs
Processes:
MicrosoftEdge.exedescription ioc Process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 15 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 2164 3140 WerFault.exe 82 1008 3140 WerFault.exe 82 1664 3140 WerFault.exe 82 2792 3140 WerFault.exe 82 4160 3140 WerFault.exe 82 4304 3140 WerFault.exe 82 4480 3140 WerFault.exe 82 4712 3140 WerFault.exe 82 5036 3140 WerFault.exe 82 4248 3140 WerFault.exe 82 4664 3140 WerFault.exe 82 5028 3140 WerFault.exe 82 4336 3140 WerFault.exe 82 4748 3140 WerFault.exe 82 5788 5428 WerFault.exe 148 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
5b9805d7b48c07d06c115c68f6453126.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5b9805d7b48c07d06c115c68f6453126.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5b9805d7b48c07d06c115c68f6453126.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5b9805d7b48c07d06c115c68f6453126.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid Process 6092 vssadmin.exe 6044 vssadmin.exe -
Processes:
MicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 54a37b618c9cd701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming\ChangeUnitGenerationNeeded = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\TypedUrlsComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows\AllowInPrivate MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Zoom MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\DatabaseComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\ManagerHistoryComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGLockdown\00000000 = 102b4a638c9cd701 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\SplashScreen Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url3 = "https://signin.ebay.com/ws/ebayisapi.dll" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\FlipAheadCompletedVersion = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = 1d24df8b702cd701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\FontSize = "3" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = c3bb12618c9cd701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersi = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode MicrosoftEdge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5b9805d7b48c07d06c115c68f6453126.exepid Process 68 5b9805d7b48c07d06c115c68f6453126.exe 68 5b9805d7b48c07d06c115c68f6453126.exe 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid Process 2536 -
Suspicious behavior: MapViewOfSection 47 IoCs
Processes:
5b9805d7b48c07d06c115c68f6453126.exeexplorer.exeexplorer.exeexplorer.exeMicrosoftEdgeCP.exepid Process 68 5b9805d7b48c07d06c115c68f6453126.exe 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 4376 explorer.exe 4376 explorer.exe 4976 explorer.exe 4976 explorer.exe 4580 explorer.exe 4580 explorer.exe 4580 explorer.exe 4580 explorer.exe 4376 explorer.exe 4376 explorer.exe 4976 explorer.exe 4976 explorer.exe 4580 explorer.exe 4580 explorer.exe 4376 explorer.exe 4376 explorer.exe 4976 explorer.exe 4976 explorer.exe 4580 explorer.exe 4580 explorer.exe 4376 explorer.exe 4376 explorer.exe 4976 explorer.exe 4976 explorer.exe 2924 MicrosoftEdgeCP.exe 2924 MicrosoftEdgeCP.exe 2924 MicrosoftEdgeCP.exe 2924 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
14A4.exeWerFault.exeWerFault.exeMicrosoftEdge.exeWerFault.exe1C85.exeAdvancedRun.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exe36D5.exe3434.exeWerFault.exepowershell.exepowershell.exe3E48.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid Process Token: SeShutdownPrivilege 2536 Token: SeCreatePagefilePrivilege 2536 Token: SeShutdownPrivilege 2536 Token: SeCreatePagefilePrivilege 2536 Token: SeShutdownPrivilege 2536 Token: SeCreatePagefilePrivilege 2536 Token: SeShutdownPrivilege 2536 Token: SeCreatePagefilePrivilege 2536 Token: SeDebugPrivilege 392 14A4.exe Token: SeShutdownPrivilege 2536 Token: SeCreatePagefilePrivilege 2536 Token: SeShutdownPrivilege 2536 Token: SeCreatePagefilePrivilege 2536 Token: SeShutdownPrivilege 2536 Token: SeCreatePagefilePrivilege 2536 Token: SeShutdownPrivilege 2536 Token: SeCreatePagefilePrivilege 2536 Token: SeShutdownPrivilege 2536 Token: SeCreatePagefilePrivilege 2536 Token: SeRestorePrivilege 2164 WerFault.exe Token: SeBackupPrivilege 2164 WerFault.exe Token: SeDebugPrivilege 2164 WerFault.exe Token: SeShutdownPrivilege 2536 Token: SeCreatePagefilePrivilege 2536 Token: SeDebugPrivilege 1008 WerFault.exe Token: SeDebugPrivilege 3036 MicrosoftEdge.exe Token: SeImpersonatePrivilege 3036 MicrosoftEdge.exe Token: SeDebugPrivilege 1664 WerFault.exe Token: SeDebugPrivilege 8 1C85.exe Token: SeDebugPrivilege 3932 AdvancedRun.exe Token: SeImpersonatePrivilege 3932 AdvancedRun.exe Token: SeDebugPrivilege 2792 WerFault.exe Token: SeDebugPrivilege 4160 WerFault.exe Token: SeDebugPrivilege 4304 WerFault.exe Token: SeDebugPrivilege 4480 WerFault.exe Token: SeDebugPrivilege 1216 36D5.exe Token: SeDebugPrivilege 188 3434.exe Token: SeDebugPrivilege 4712 WerFault.exe Token: SeShutdownPrivilege 2536 Token: SeCreatePagefilePrivilege 2536 Token: SeShutdownPrivilege 2536 Token: SeCreatePagefilePrivilege 2536 Token: SeDebugPrivilege 4528 powershell.exe Token: SeDebugPrivilege 4556 powershell.exe Token: SeShutdownPrivilege 2536 Token: SeCreatePagefilePrivilege 2536 Token: SeShutdownPrivilege 2536 Token: SeCreatePagefilePrivilege 2536 Token: SeShutdownPrivilege 2536 Token: SeCreatePagefilePrivilege 2536 Token: SeShutdownPrivilege 2536 Token: SeCreatePagefilePrivilege 2536 Token: SeShutdownPrivilege 2536 Token: SeCreatePagefilePrivilege 2536 Token: SeShutdownPrivilege 2536 Token: SeCreatePagefilePrivilege 2536 Token: SeDebugPrivilege 1284 3E48.exe Token: SeDebugPrivilege 1284 3E48.exe Token: SeDebugPrivilege 5036 WerFault.exe Token: SeDebugPrivilege 4248 WerFault.exe Token: SeDebugPrivilege 4664 WerFault.exe Token: SeShutdownPrivilege 2536 Token: SeCreatePagefilePrivilege 2536 Token: SeDebugPrivilege 5028 WerFault.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exepid Process 2536 3036 MicrosoftEdge.exe 2924 MicrosoftEdgeCP.exe 2924 MicrosoftEdgeCP.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 2536 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5b9805d7b48c07d06c115c68f6453126.exeBF7.exe14A4.exe36D5.exedescription pid Process procid_target PID 764 wrote to memory of 68 764 5b9805d7b48c07d06c115c68f6453126.exe 75 PID 764 wrote to memory of 68 764 5b9805d7b48c07d06c115c68f6453126.exe 75 PID 764 wrote to memory of 68 764 5b9805d7b48c07d06c115c68f6453126.exe 75 PID 764 wrote to memory of 68 764 5b9805d7b48c07d06c115c68f6453126.exe 75 PID 764 wrote to memory of 68 764 5b9805d7b48c07d06c115c68f6453126.exe 75 PID 764 wrote to memory of 68 764 5b9805d7b48c07d06c115c68f6453126.exe 75 PID 2536 wrote to memory of 2300 2536 79 PID 2536 wrote to memory of 2300 2536 79 PID 2536 wrote to memory of 2300 2536 79 PID 2300 wrote to memory of 1308 2300 BF7.exe 81 PID 2300 wrote to memory of 1308 2300 BF7.exe 81 PID 2300 wrote to memory of 1308 2300 BF7.exe 81 PID 2536 wrote to memory of 3140 2536 82 PID 2536 wrote to memory of 3140 2536 82 PID 2536 wrote to memory of 3140 2536 82 PID 2536 wrote to memory of 392 2536 83 PID 2536 wrote to memory of 392 2536 83 PID 2536 wrote to memory of 392 2536 83 PID 392 wrote to memory of 1184 392 14A4.exe 84 PID 392 wrote to memory of 1184 392 14A4.exe 84 PID 392 wrote to memory of 1184 392 14A4.exe 84 PID 392 wrote to memory of 1184 392 14A4.exe 84 PID 392 wrote to memory of 1184 392 14A4.exe 84 PID 392 wrote to memory of 1184 392 14A4.exe 84 PID 392 wrote to memory of 1184 392 14A4.exe 84 PID 392 wrote to memory of 1184 392 14A4.exe 84 PID 2300 wrote to memory of 1308 2300 BF7.exe 81 PID 2300 wrote to memory of 1308 2300 BF7.exe 81 PID 2300 wrote to memory of 1308 2300 BF7.exe 81 PID 2300 wrote to memory of 1308 2300 BF7.exe 81 PID 2300 wrote to memory of 1308 2300 BF7.exe 81 PID 2300 wrote to memory of 3956 2300 BF7.exe 86 PID 2300 wrote to memory of 3956 2300 BF7.exe 86 PID 2300 wrote to memory of 3956 2300 BF7.exe 86 PID 2536 wrote to memory of 8 2536 87 PID 2536 wrote to memory of 8 2536 87 PID 2536 wrote to memory of 8 2536 87 PID 2300 wrote to memory of 3956 2300 BF7.exe 86 PID 2300 wrote to memory of 3956 2300 BF7.exe 86 PID 2300 wrote to memory of 3956 2300 BF7.exe 86 PID 2300 wrote to memory of 3956 2300 BF7.exe 86 PID 2300 wrote to memory of 3956 2300 BF7.exe 86 PID 2300 wrote to memory of 1252 2300 BF7.exe 89 PID 2300 wrote to memory of 1252 2300 BF7.exe 89 PID 2300 wrote to memory of 1252 2300 BF7.exe 89 PID 2536 wrote to memory of 188 2536 90 PID 2536 wrote to memory of 188 2536 90 PID 2536 wrote to memory of 188 2536 90 PID 2300 wrote to memory of 1252 2300 BF7.exe 89 PID 2300 wrote to memory of 1252 2300 BF7.exe 89 PID 2300 wrote to memory of 1252 2300 BF7.exe 89 PID 2300 wrote to memory of 1252 2300 BF7.exe 89 PID 2300 wrote to memory of 1252 2300 BF7.exe 89 PID 2300 wrote to memory of 2832 2300 BF7.exe 92 PID 2300 wrote to memory of 2832 2300 BF7.exe 92 PID 2300 wrote to memory of 2832 2300 BF7.exe 92 PID 2536 wrote to memory of 1216 2536 93 PID 2536 wrote to memory of 1216 2536 93 PID 2536 wrote to memory of 1216 2536 93 PID 2536 wrote to memory of 1284 2536 97 PID 2536 wrote to memory of 1284 2536 97 PID 2536 wrote to memory of 1284 2536 97 PID 1216 wrote to memory of 3036 1216 36D5.exe 134 PID 1216 wrote to memory of 3036 1216 36D5.exe 134 -
System policy modification 1 TTPs 1 IoCs
Processes:
36D5.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 36D5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b9805d7b48c07d06c115c68f6453126.exe"C:\Users\Admin\AppData\Local\Temp\5b9805d7b48c07d06c115c68f6453126.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\5b9805d7b48c07d06c115c68f6453126.exe"C:\Users\Admin\AppData\Local\Temp\5b9805d7b48c07d06c115c68f6453126.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:68
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:1308
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:3956
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:1252
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:3180
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:4408
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:5000
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:4400
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:416
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:4988
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:4792
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:1404
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:4508
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:5688
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:5116
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:5948
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:5936
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:5808
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:5908
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:6100
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:5196
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:5400
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:5716
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:5964
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:6028
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:4208
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:4616
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:5440
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:5356
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:4600
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:4736
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:4456
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵
- Executes dropped EXE
PID:5696
-
-
C:\Users\Admin\AppData\Local\Temp\BF7.exeC:\Users\Admin\AppData\Local\Temp\BF7.exe2⤵PID:4964
-
-
C:\Users\Admin\AppData\Local\Temp\1407.exeC:\Users\Admin\AppData\Local\Temp\1407.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 7362⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 7482⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 6722⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 8922⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 11842⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 12322⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 12762⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 11922⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 11722⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 11522⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 8242⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 13522⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 14202⤵
- Program crash
PID:4336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 14002⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:4748
-
-
C:\Users\Admin\AppData\Local\Temp\14A4.exeC:\Users\Admin\AppData\Local\Temp\14A4.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:1184
-
-
C:\Users\Admin\AppData\Local\Temp\1C85.exeC:\Users\Admin\AppData\Local\Temp\1C85.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:8
-
C:\Users\Admin\AppData\Local\Temp\3434.exeC:\Users\Admin\AppData\Local\Temp\3434.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:188
-
C:\Users\Admin\AppData\Local\Temp\36D5.exeC:\Users\Admin\AppData\Local\Temp\36D5.exe1⤵
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\4b483648-fc14-486e-b67c-643270f2c877\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\4b483648-fc14-486e-b67c-643270f2c877\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\4b483648-fc14-486e-b67c-643270f2c877\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\4b483648-fc14-486e-b67c-643270f2c877\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\4b483648-fc14-486e-b67c-643270f2c877\AdvancedRun.exe" /SpecialRun 4101d8 30363⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\36D5.exe" -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\36D5.exe" -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe2⤵PID:4604
-
-
C:\Users\Admin\AppData\Local\Temp\3E48.exeC:\Users\Admin\AppData\Local\Temp\3E48.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1284 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe" -start2⤵
- Executes dropped EXE
- Enumerates connected drives
PID:5084 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵PID:5396
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:5796
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵PID:5416
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:5436
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵PID:5616
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:6092
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe" -agent 03⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4800
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat3⤵PID:5724
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:5356
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:6044
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:5568
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵PID:5112
-
-
C:\Users\Admin\AppData\Local\Temp\4416.exeC:\Users\Admin\AppData\Local\Temp\4416.exe1⤵
- Executes dropped EXE
PID:4100
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4136
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4244
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4444
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:4580
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4780
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:4976
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1092
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:4376
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4500
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3036
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:3744
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:2924
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:1124
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5160
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5428 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5428 -s 13002⤵
- Program crash
PID:5788
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:6132
Network
MITRE ATT&CK Enterprise v6
Defense Evasion
Bypass User Account Control
1Disabling Security Tools
4File Deletion
2Modify Registry
7Virtualization/Sandbox Evasion
1Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
MD55703edef7cb0f99305a6b18845e0443e
SHA1fb6f022ebde210306e1a6575462d6451e98af454
SHA256e4ce02059eb175c30879041d610db7b8798cdf57a4c67afc83c125c2db36e883
SHA5124631853bda1498ff3cace6a348fd2d6770edd0fec166707c3afebff09644f34e29a7a6dd3e9cb167c40e8b5fa1fbbc80ba26d80b4d939daf56278c276b07ada4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
MD5888f7457c332ac5e1897316e159f58c1
SHA1a3047c6e978158dfae29b5735e8131ec1b30703d
SHA256c2c14652875bfeb1ed529202da6d45eb974acab193c005908cf90b8c5cf3dd41
SHA5120abdc5f78ade2f56b0f1954adc0479b5dcc88d401bfac95754e7dd80adefe7375a426fd89f81b657ebe9c113092524dcbd1e80c39a4bec51ccd93bc0bc3a5aff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD5939460925953ce88e1086341b8a11bda
SHA106249b891050a9fac128ccfee943aeb5bede1c7b
SHA256d4da3c5ff04a3b677eb77b1bfedc14e29ebd0d01c476d44a0b1a2366447ab016
SHA512a8dc3eb58a4a550cc2551463a3d813396caf3f2b65f5b13c8e339a4a32652895ee15c23eb5ba833eca4e7c22331a622657cf5bd64098f0c54e43b4e92fe65f30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
MD53cd37fb3e53677f5c500ff8c58a11139
SHA1f9c554d77d0ecf110709f423842f3772d5343a33
SHA256132f8fcd8328afbb5007bbe38e85706ca6c52afc8c9c05b3031c15768912faec
SHA5124d6180407b97c291f91eb4efda049c288c950e3b117235cd820865566c0b0d06534e32faf47354a65c899d88a1fc04729ef838c647c4992fa573127fc4a449d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
MD53c3335133555e57694453aff254c5a47
SHA187e860c8e36a737984976b60b385a986826b8a81
SHA25630ae84a28309c24a780a9f8740c34fadf73084d8435c5859fa1a115d3e794ca9
SHA512be62fc586e0037669d0f8edfc85b07883cb3c4cb6c3400ec93acea8ed41b7d645114f9e04486fcc71dae1d0002edd82b1a50c8ce7fb4b0323579989a44f348fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD584335a96b9fa0b1fa66670d4c2437712
SHA13913c1c67bde9f712e996501fe1b02582f68c19e
SHA256697e16ed03d85d1065c00570f41273b18d12c8ea6407340a29bde347e3d5342d
SHA5122e4ef49e1acf610f9c222715355d7e9ae9dc583a3a677a6228b0a001efd3a62f07dd587a61a51b7043a05d0637314341a1c36e77dce50c83c69a558e7fd6799e
-
MD5
b1cd7c031debba3a5c77b39b6791c1a7
SHA1e5d91e14e9c685b06f00e550d9e189deb2075f76
SHA25657ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa
SHA512d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\AN7EQHV8\ms.jsll-3.min[1].js
MD5ccae1a322614793101c4ef997ca5391d
SHA1b9ebf7a470e73abe4e084b1c92f63941776d7a36
SHA256a60a21679789c18261f76e71be70f3fa9690235e590b4b894fc571a4f620b4a8
SHA5121953efc5d167bed03316f00ba33a630cfddd87bc482827dcf7090f514077737fba75307ba96fce44fc1df05f342347b72ca23930e3c438a4d98b68c2cfaee1b2
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\R3VQ3FZK\jsll-4[1].js
MD5211e123b593464f3fef68f0b6e00127a
SHA10fae8254d06b487f09a003cb8f610f96a95465d1
SHA256589303ca15fba4fe95432dbb456ff614d0f2ad12d99f8671f0443a7f0cf48dff
SHA512dad54d7941a7588675ea9dd11275a60fb6290e1582d1c7a4acb50642af3c2a4aa35e32edd8fa9dd01ce7fd777247d2706d5672a201633bf918b525936e93b14b
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Z8XV31NT\SegoeUI-Roman-VF_web[1].woff2
MD5bca97218dca3cb15ce0284cbcb452890
SHA1635298cbbd72b74b1762acc7dad6c79de4b3670d
SHA25663c12051016796d92bcf4bc20b4881057475e6dfa4937c29c9e16054814ab47d
SHA5126e850842d1e353a5457262c5c78d20704e8bd24b532368ba5e5dfc7a4b63059d536296b597fd3ccbd541aa8f89083a79d50aaa1b5e65b4d23fc37bfd806f0545
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Z8XV31NT\latest[1].woff2
MD52835ee281b077ca8ac7285702007c894
SHA12e3d4d912aaf1c3f1f30d95c2c4fcea1b7bbc29a
SHA256e172a02b68f977a57a1690507df809db1e43130f0161961709a36dbd70b4d25f
SHA51280881c074df064795f9cc5aa187bea92f0e258bf9f6b970e61e9d50ee812913bf454cecbe7fd9e151bdaef700ce68253697f545ac56d4e7ef7ade7814a1dbc5a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\12B578593FDE07EC53D020B1D5DEBF3B_5D74C2DB556F94499BCD6D74A36958A3
MD54e686224c37a730a4aadb70db2804207
SHA16758bfdc1b2c681b6cf5ae5188d6d2d04b60c2b2
SHA25625f03a6809f350c7af0445ab24e344c67a7ad4f1eb50cea8c063c7f5770cd793
SHA51260163763ceda062f92c8e7df0426cee4bb45f4086a9e14024a5e51f0e0014796f02e4c90ca6870a905b8a1c3aac5080a307b88ec3899f4b0e8c417ace265308b
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\2A7611428D62805A3E4E5BC4103D82E4_D0FA13DADFB59BDF00C474952E166CC1
MD511ed211d0de6c53fb199f8f12c4bddb1
SHA149c109717b62c6d3cd41a74b13c98df827ad3df8
SHA2562aabb5032e558d1c592da8b5423ce04d048805e44dc6997efd3001775e0e684e
SHA51296fdbec6a16dc44f36b301238cc68bce2f6999ed8f20e564ff261773bf8632a3fa1e406963720b1581499b558c73f0b251e9041fd66e93058c892b90817fc82a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63
MD5d31b8c7e7e6b0b99d9a5eefedbb5311a
SHA1e9b21cb157adeb3c0604209708916793281e0bbd
SHA2568d0521db3fdc8a5926445be5ecc928f2798299b0552c18a8efd67ef92c9f9383
SHA5122530ba930a385ea14caab5396ddccfa46b741d9b438ce9b7c04f24be9f7c5a6b3e071db5b0207365394e801ac3565156d963cfd080ea8f1fdc368c2a873ff38f
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_AD319D6DA1A11BC83AC8B4E4D3638231
MD58bade12cb93fa677dc899f335efc59c8
SHA1016dfce32ae425c25196a16b2e94f6e7e2af85b5
SHA256e167fa475636227b2c2c040a8c55ed7ac9ae7a6e86dcc37bb1bc476b317f01a3
SHA5127d3b3b06c9b9addfeba924a641f4c12b254ed392e2cf84905355245799aa9efdde7fbb89f09fe4e207b253f37848a7c5764bcff830b499a53696c201feeabf2f
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868
MD53e7334346a21246edfd854e2acff4c1f
SHA168adcec50bc6dd6a31c3d0e353f53952174ce5b7
SHA25693b0076970a36b3e40727260215f442c884a897876fe0c3d122a103968e0f9b3
SHA51239d8d71104149b36f8e47275f75b67934ca2679f6b8d529e87bd44220c75f34b77ab15c44bba2f599e04a9c05ea64400b28a8c4e63d166abd2a3c353442e14c9
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
MD502b7af4ac16552d53edd324ffa85e773
SHA19a6415b20fcedb43efdf933813a1f20ad58471a9
SHA256f183f7a31d577496a91e25ff3a901e0da4a26c6fa6e2698b27fadf9ef5967fc5
SHA5123f031a915b30cae457af873c50a0ffc883b3e49a583168ff2dcefa068dbe27da2596781e104c8bd4f6fe95b563f2fa7a2dccf2edb7864aefc8fcaf008e6066a2
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\12B578593FDE07EC53D020B1D5DEBF3B_5D74C2DB556F94499BCD6D74A36958A3
MD53574083043d08048bf4c3d342e0c0370
SHA17d9171aff87f2c5805fcacc513c49b2a1431a66b
SHA256999e6a6c21cc2fed68d5a89ab1ec2e076784a1ffdadf2249a0b30b00a6912c51
SHA512f2c728ec1aadfbc9252b01731cc1937ecdd5ff71e8ecd896db9d1e1fb05d7485618e9cf495d63c579c5cf57eed08b554709cdd03914e98fe7a2e509c746bd75b
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\2A7611428D62805A3E4E5BC4103D82E4_D0FA13DADFB59BDF00C474952E166CC1
MD5253231884f0449366ba3904c22fbc775
SHA12e1bcb14333f3e8401799f29c9d651ba87a5a077
SHA256bb59227ac67c2ccebc373eb336e977e438a4561baa90dc25e27cb1bca2679e13
SHA5123e66db3ff4d38cd39a9c2fab71067c768d942bd57ebd2177a29b115d156c2d1d841450b3d46ad0741bf6dc3572bc62321797f378fc8129e18dd845696e90b8c9
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\2A7611428D62805A3E4E5BC4103D82E4_D0FA13DADFB59BDF00C474952E166CC1
MD52a64afb8935bd9df0b4335bec321e8a2
SHA173b6f21ea6922517da20340b3b001dc1a00bbdde
SHA25660128a0c96af458f51dc676ceb9ac51006b8d0ab9d2e3d67ae04532e7a15631a
SHA512333340a5540a5966604a2ba36928e3e21426b3c84674181f2768b4d0552396a737249f18edcae89cc22031d4118601c3a123e97c27c1e5b25ca7ddeec5e1a82b
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63
MD525e37cb34e5245f79ddd4036b507ced3
SHA1de0b077479ad99d3a1ae406df6e2a7ac9f81b6c7
SHA256797f1711f79e6f9459dfee60329b42b5663c8caf976b2b9bc4645ae3d011e94f
SHA512b891976a78d160084f62b00edee6024e420d1ccbe391ba61318d21d563e29d0599cd32ef3f991fb8671f33426287096fb29d189af3766b0994fafb21157312de
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63
MD525e37cb34e5245f79ddd4036b507ced3
SHA1de0b077479ad99d3a1ae406df6e2a7ac9f81b6c7
SHA256797f1711f79e6f9459dfee60329b42b5663c8caf976b2b9bc4645ae3d011e94f
SHA512b891976a78d160084f62b00edee6024e420d1ccbe391ba61318d21d563e29d0599cd32ef3f991fb8671f33426287096fb29d189af3766b0994fafb21157312de
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_AD319D6DA1A11BC83AC8B4E4D3638231
MD5aa78b8b30566f964eb8e3de7bd335174
SHA1dd303582a7a7b7e7f3a1ee8d39428d278e0320b7
SHA2563a1e4466e04b6e4a04e672afb0f7b26d2ea80b2ad78a7c1dfb19e10f427cee69
SHA512d90175657717909ac10fddb30efd08236d44bc1a1d04fff4e73aecb41811efdac892cd9d5229ec2dd3b7b0f70844a1ac6d5a6b8ae6208290f96fbfdd3de2ff99
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868
MD5666de185bca6ecc866c37892bd5f423a
SHA1c68cccbf6b27fc8b9558ef93894fd1b1540f11b4
SHA2569b47005a08ebba5304cb826d8cc2fa85a672eed8a5b3bfcf894fa360b15f1f7d
SHA512109f3b33b02676619f9756de309f8879a506446993a0064a0d83cce989050f97096438a2097b1189ce984ccd60bab059788915fbfcf88957fdcaabaf1c4697e3
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
MD50a310b15e892ab25f4c1dfbf40540b8a
SHA1305b0d335bcb3f64e18ca58237a200f6ecaa727b
SHA2564fd21d8800e9202e021e11c60123c3f14d1a11a75f28377b1862fdfc4437bab0
SHA5126f5844fbe4ff657bd7d2f22dd0d69589c96d8796b5d7160b7bd7ef4f4b6dae3506eba11e7f7b04a3350e040aac09ca9504a20dc3c0a787eb57a09fd90e10815f
-
MD5
e5509d55d22e60402457e60be6ed85ce
SHA1762d6334e098d9cbd028e7f2a83c0d77ff2c2086
SHA2560c054e57af039fad6d57bd187b0646c16f64bc5430087db8939a0c5fa75f72c9
SHA51221bab40514c678c4f6d38960cd25bf512d91c75f5900e8f679b31d4e34d0b638ff067194ca7ca1f5ccbbc5e137d636a1cd0cb85ffd19bd28301ef397534cefed
-
MD5
e5509d55d22e60402457e60be6ed85ce
SHA1762d6334e098d9cbd028e7f2a83c0d77ff2c2086
SHA2560c054e57af039fad6d57bd187b0646c16f64bc5430087db8939a0c5fa75f72c9
SHA51221bab40514c678c4f6d38960cd25bf512d91c75f5900e8f679b31d4e34d0b638ff067194ca7ca1f5ccbbc5e137d636a1cd0cb85ffd19bd28301ef397534cefed
-
MD5
af706e535a57ea4a789f311567870803
SHA13578e1893aee7f4e9cdd1dcf0f8d9292804b21ca
SHA256c30c4c74da8351ad23e8466a314a32243f7c1e82af117a89961eaaecb57b320b
SHA5125545a9ad07cce205ea755c6ac5307b961c25a4da73a6fc2c2af3620a44664ef5ea949144e750749cfcf7223497df3e662b96f5803d6b4a8559b749a01f97d333
-
MD5
af706e535a57ea4a789f311567870803
SHA13578e1893aee7f4e9cdd1dcf0f8d9292804b21ca
SHA256c30c4c74da8351ad23e8466a314a32243f7c1e82af117a89961eaaecb57b320b
SHA5125545a9ad07cce205ea755c6ac5307b961c25a4da73a6fc2c2af3620a44664ef5ea949144e750749cfcf7223497df3e662b96f5803d6b4a8559b749a01f97d333
-
MD5
067a8002b76c49e820a9421fa3029c86
SHA1fbf589bf5e44768d9ed07f6b361472e3b54bcb58
SHA2569fdf1b38392cacb2490a8093fc910e2af3817e92ab459304d721919a63cbfe64
SHA5124986054c30b069cc145dde03244589eb06513211723ca11cd97204c748b43c07b6f16bab7b9203c3d53a20176879eb467debf90bde43a5a66d23587243fed03a
-
MD5
067a8002b76c49e820a9421fa3029c86
SHA1fbf589bf5e44768d9ed07f6b361472e3b54bcb58
SHA2569fdf1b38392cacb2490a8093fc910e2af3817e92ab459304d721919a63cbfe64
SHA5124986054c30b069cc145dde03244589eb06513211723ca11cd97204c748b43c07b6f16bab7b9203c3d53a20176879eb467debf90bde43a5a66d23587243fed03a
-
MD5
f19e1f71dd14af5671f5550fba6c8998
SHA18ef9d670f6bafed77cd9720533dfb15b79982a40
SHA25649398cbf38dc71aca96c6726f9c914a04ee49a9350943896435fc776be640b60
SHA512095a90dfba1f0b175109ad1dfa2134c5488793ba80decd7a63ce3f0d3060b19d950e75d150c743a72d82b089cfad2ab31111aa7a82fd69f03d420686dda4a610
-
MD5
f19e1f71dd14af5671f5550fba6c8998
SHA18ef9d670f6bafed77cd9720533dfb15b79982a40
SHA25649398cbf38dc71aca96c6726f9c914a04ee49a9350943896435fc776be640b60
SHA512095a90dfba1f0b175109ad1dfa2134c5488793ba80decd7a63ce3f0d3060b19d950e75d150c743a72d82b089cfad2ab31111aa7a82fd69f03d420686dda4a610
-
MD5
6a2d7f7373c59ff8be992d223b17f97f
SHA1e4bfe1e9fdb7560968da08e1dfe6ed8005a97223
SHA2563b8cef83d5f3b667281c3c8512b2e21d06e34a3fe7952d171854a36f557f80a9
SHA512f8719c97f97ceb16ce63b832bd393edb3ef87d8d7aac1d975243cd4aac62e2775eae2b1fd2d0314348144c1b38d19b31222f70c33fdd3133a483e9392d2de0c6
-
MD5
6a2d7f7373c59ff8be992d223b17f97f
SHA1e4bfe1e9fdb7560968da08e1dfe6ed8005a97223
SHA2563b8cef83d5f3b667281c3c8512b2e21d06e34a3fe7952d171854a36f557f80a9
SHA512f8719c97f97ceb16ce63b832bd393edb3ef87d8d7aac1d975243cd4aac62e2775eae2b1fd2d0314348144c1b38d19b31222f70c33fdd3133a483e9392d2de0c6
-
MD5
bdfde890a781bf135e6eb4339ff9424f
SHA1a5bfca4601242d3ff52962432efb15ab9202217f
SHA256b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5
SHA5127af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b
-
MD5
bdfde890a781bf135e6eb4339ff9424f
SHA1a5bfca4601242d3ff52962432efb15ab9202217f
SHA256b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5
SHA5127af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b
-
MD5
e99afcbb149ba6dfbdd90c034b88fe73
SHA1be974111ad0a8f3870d09706ea07b5438f418798
SHA256924b9935b1f2be85aa36e0158f0a55c1200cdf9046077a5b491f1aeb034c2353
SHA512bf8b1f544ab9e689068f94b7ee5cfbe304b3756308d022be2e487216dd01aed0fcc2ac76e5d6b4c2f434a1125a88d5c71a2ecdafdb7bddd82447e77601c6b4a9
-
MD5
e99afcbb149ba6dfbdd90c034b88fe73
SHA1be974111ad0a8f3870d09706ea07b5438f418798
SHA256924b9935b1f2be85aa36e0158f0a55c1200cdf9046077a5b491f1aeb034c2353
SHA512bf8b1f544ab9e689068f94b7ee5cfbe304b3756308d022be2e487216dd01aed0fcc2ac76e5d6b4c2f434a1125a88d5c71a2ecdafdb7bddd82447e77601c6b4a9
-
MD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
MD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
MD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
MD5
b9d3baf6cab644ab4033810e111863be
SHA176993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7
SHA25630fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e
SHA512a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152
-
MD5
b9d3baf6cab644ab4033810e111863be
SHA176993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7
SHA25630fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e
SHA512a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152
-
MD5
b9d3baf6cab644ab4033810e111863be
SHA176993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7
SHA25630fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e
SHA512a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152
-
MD5
b9d3baf6cab644ab4033810e111863be
SHA176993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7
SHA25630fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e
SHA512a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152
-
MD5
b9d3baf6cab644ab4033810e111863be
SHA176993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7
SHA25630fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e
SHA512a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152
-
MD5
b9d3baf6cab644ab4033810e111863be
SHA176993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7
SHA25630fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e
SHA512a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152
-
MD5
b9d3baf6cab644ab4033810e111863be
SHA176993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7
SHA25630fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e
SHA512a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152
-
MD5
b9d3baf6cab644ab4033810e111863be
SHA176993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7
SHA25630fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e
SHA512a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152
-
MD5
b9d3baf6cab644ab4033810e111863be
SHA176993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7
SHA25630fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e
SHA512a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152
-
MD5
b9d3baf6cab644ab4033810e111863be
SHA176993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7
SHA25630fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e
SHA512a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152
-
MD5
b9d3baf6cab644ab4033810e111863be
SHA176993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7
SHA25630fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e
SHA512a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152
-
MD5
b9d3baf6cab644ab4033810e111863be
SHA176993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7
SHA25630fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e
SHA512a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152
-
MD5
b9d3baf6cab644ab4033810e111863be
SHA176993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7
SHA25630fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e
SHA512a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152
-
MD5
b9d3baf6cab644ab4033810e111863be
SHA176993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7
SHA25630fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e
SHA512a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152
-
MD5
b9d3baf6cab644ab4033810e111863be
SHA176993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7
SHA25630fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e
SHA512a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152
-
MD5
b9d3baf6cab644ab4033810e111863be
SHA176993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7
SHA25630fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e
SHA512a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152
-
MD5
b9d3baf6cab644ab4033810e111863be
SHA176993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7
SHA25630fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e
SHA512a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152
-
MD5
b9d3baf6cab644ab4033810e111863be
SHA176993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7
SHA25630fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e
SHA512a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152
-
MD5
bdfde890a781bf135e6eb4339ff9424f
SHA1a5bfca4601242d3ff52962432efb15ab9202217f
SHA256b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5
SHA5127af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b
-
MD5
bdfde890a781bf135e6eb4339ff9424f
SHA1a5bfca4601242d3ff52962432efb15ab9202217f
SHA256b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5
SHA5127af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b
-
MD5
bdfde890a781bf135e6eb4339ff9424f
SHA1a5bfca4601242d3ff52962432efb15ab9202217f
SHA256b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5
SHA5127af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b
-
MD5
f964811b68f9f1487c2b41e1aef576ce
SHA1b423959793f14b1416bc3b7051bed58a1034025f
SHA25683bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7
SHA512565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4