Analysis
-
max time kernel
152s -
max time network
160s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
23-02-2022 11:45
Static task
static1
Behavioral task
behavioral1
Sample
emissorNFe-4_0_1-homologacao.jnlp
Resource
win10-en-20211208
General
-
Target
emissorNFe-4_0_1-homologacao.jnlp
-
Size
5KB
-
MD5
2ebf995cb469c94a513859241e1da199
-
SHA1
9481f062253280e47bbcb7cdabba1d134a97d3f2
-
SHA256
ae2667448077b7b49183d1340ca301fba6b7b606829a34ab4b1401a01db9439b
-
SHA512
80be73ca92c54dfe090e111b9be3f86480a0265463b8ccb982b4d3805ba26d4b3fe69f2488487f94b5c470a15338dfb8de0aeecef3b282e4b6808938798e4791
Malware Config
Signatures
-
BazarBackdoor
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
-
Bazar/Team9 Backdoor payload 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\OQLGLTT1\jre-8u321-windows-x64[1].exe BazarBackdoorVar3 C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\jre-8u321-windows-x64.exe.ws1sn3x.partial BazarBackdoorVar3 C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\jre-8u321-windows-x64.exe BazarBackdoorVar3 C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\jre-8u321-windows-x64.exe BazarBackdoorVar3 C:\Users\Admin\AppData\Local\Temp\jds314765.tmp\jre-8u321-windows-x64.exe BazarBackdoorVar3 C:\Users\Admin\AppData\Local\Temp\jds314765.tmp\jre-8u321-windows-x64.exe BazarBackdoorVar3 -
Blocklisted process makes network request 1 IoCs
Processes:
msiexec.exeflow pid process 91 4104 msiexec.exe -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
jre-8u321-windows-x64.exejre-8u321-windows-x64.exepid process 4736 jre-8u321-windows-x64.exe 4828 jre-8u321-windows-x64.exe -
Loads dropped DLL 2 IoCs
Processes:
MsiExec.exepid process 3340 MsiExec.exe 3340 MsiExec.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exedescription ioc process File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe -
Drops file in Windows directory 12 IoCs
Processes:
msiexec.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process File opened for modification C:\Windows\Installer\MSI5E73.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{26A24AE4-039D-4CA4-87B4-2F64180321F0} msiexec.exe File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\54a10.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI61EF.tmp msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdgeCP.exe File created C:\Windows\Installer\54a10.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3800 4828 WerFault.exe jre-8u321-windows-x64.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
msiexec.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msiexec.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msiexec.exe -
Processes:
MicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exebrowser_broker.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\DetectPhoneNumberComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DomainSuggestion\FileNames\ MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\NextUpdateDate = "352440475" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar\WebBrowser MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "268435456" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating\Next Rating Prompt = 209cae1e2829d801 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\SharedCookie_MRACMigrationDone = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\PersistedStorageItemTable browser_broker.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\Certificates\4EEF7FAF0062D34AB MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\trustarc.com\ = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "209" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing\NewTabPage\ProcessingFlag = d022b88ab328d801 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Root MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DomainSuggestion\NextUpdateDate = "352415783" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$blogger MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\java.com\NumberOfSubdomains = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\ImageStoreRandomFolder = "qvj0yin" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\consent.trustarc.com\ = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPublisher\CRLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\NextBrowserDataLogTime = 20f395d7e528d801 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating\NextPromptBuild = "15063" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url2 = "https://login.aliexpress.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Zoom MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\consent.trustarc.com MicrosoftEdgeCP.exe -
NTFS ADS 1 IoCs
Processes:
browser_broker.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\jre-8u321-windows-x64.exe.ws1sn3x.partial:Zone.Identifier browser_broker.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
WerFault.exepid process 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
MicrosoftEdgeCP.exepid process 1016 MicrosoftEdgeCP.exe 1016 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exejre-8u321-windows-x64.exemsiexec.exeWerFault.exedescription pid process Token: SeDebugPrivilege 3536 MicrosoftEdge.exe Token: SeDebugPrivilege 3536 MicrosoftEdge.exe Token: SeDebugPrivilege 3536 MicrosoftEdge.exe Token: SeDebugPrivilege 3536 MicrosoftEdge.exe Token: SeDebugPrivilege 2592 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2592 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2592 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2592 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4136 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4136 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3536 MicrosoftEdge.exe Token: SeShutdownPrivilege 4828 jre-8u321-windows-x64.exe Token: SeIncreaseQuotaPrivilege 4828 jre-8u321-windows-x64.exe Token: SeSecurityPrivilege 4104 msiexec.exe Token: SeCreateTokenPrivilege 4828 jre-8u321-windows-x64.exe Token: SeAssignPrimaryTokenPrivilege 4828 jre-8u321-windows-x64.exe Token: SeLockMemoryPrivilege 4828 jre-8u321-windows-x64.exe Token: SeIncreaseQuotaPrivilege 4828 jre-8u321-windows-x64.exe Token: SeMachineAccountPrivilege 4828 jre-8u321-windows-x64.exe Token: SeTcbPrivilege 4828 jre-8u321-windows-x64.exe Token: SeSecurityPrivilege 4828 jre-8u321-windows-x64.exe Token: SeTakeOwnershipPrivilege 4828 jre-8u321-windows-x64.exe Token: SeLoadDriverPrivilege 4828 jre-8u321-windows-x64.exe Token: SeSystemProfilePrivilege 4828 jre-8u321-windows-x64.exe Token: SeSystemtimePrivilege 4828 jre-8u321-windows-x64.exe Token: SeProfSingleProcessPrivilege 4828 jre-8u321-windows-x64.exe Token: SeIncBasePriorityPrivilege 4828 jre-8u321-windows-x64.exe Token: SeCreatePagefilePrivilege 4828 jre-8u321-windows-x64.exe Token: SeCreatePermanentPrivilege 4828 jre-8u321-windows-x64.exe Token: SeBackupPrivilege 4828 jre-8u321-windows-x64.exe Token: SeRestorePrivilege 4828 jre-8u321-windows-x64.exe Token: SeShutdownPrivilege 4828 jre-8u321-windows-x64.exe Token: SeDebugPrivilege 4828 jre-8u321-windows-x64.exe Token: SeAuditPrivilege 4828 jre-8u321-windows-x64.exe Token: SeSystemEnvironmentPrivilege 4828 jre-8u321-windows-x64.exe Token: SeChangeNotifyPrivilege 4828 jre-8u321-windows-x64.exe Token: SeRemoteShutdownPrivilege 4828 jre-8u321-windows-x64.exe Token: SeUndockPrivilege 4828 jre-8u321-windows-x64.exe Token: SeSyncAgentPrivilege 4828 jre-8u321-windows-x64.exe Token: SeEnableDelegationPrivilege 4828 jre-8u321-windows-x64.exe Token: SeManageVolumePrivilege 4828 jre-8u321-windows-x64.exe Token: SeImpersonatePrivilege 4828 jre-8u321-windows-x64.exe Token: SeCreateGlobalPrivilege 4828 jre-8u321-windows-x64.exe Token: SeRestorePrivilege 4104 msiexec.exe Token: SeTakeOwnershipPrivilege 4104 msiexec.exe Token: SeRestorePrivilege 4104 msiexec.exe Token: SeTakeOwnershipPrivilege 4104 msiexec.exe Token: SeRestorePrivilege 4104 msiexec.exe Token: SeTakeOwnershipPrivilege 4104 msiexec.exe Token: SeDebugPrivilege 3800 WerFault.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exejre-8u321-windows-x64.exepid process 3536 MicrosoftEdge.exe 1016 MicrosoftEdgeCP.exe 1016 MicrosoftEdgeCP.exe 4828 jre-8u321-windows-x64.exe 4828 jre-8u321-windows-x64.exe 4828 jre-8u321-windows-x64.exe 4828 jre-8u321-windows-x64.exe 4828 jre-8u321-windows-x64.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
javaws.exeMicrosoftEdgeCP.exebrowser_broker.exejre-8u321-windows-x64.exemsiexec.exedescription pid process target process PID 1800 wrote to memory of 2156 1800 javaws.exe javaw.exe PID 1800 wrote to memory of 2156 1800 javaws.exe javaw.exe PID 1800 wrote to memory of 3488 1800 javaws.exe javaw.exe PID 1800 wrote to memory of 3488 1800 javaws.exe javaw.exe PID 1800 wrote to memory of 2804 1800 javaws.exe javaw.exe PID 1800 wrote to memory of 2804 1800 javaws.exe javaw.exe PID 1016 wrote to memory of 2592 1016 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1016 wrote to memory of 2592 1016 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1016 wrote to memory of 2592 1016 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1016 wrote to memory of 2592 1016 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1016 wrote to memory of 2592 1016 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1016 wrote to memory of 2592 1016 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1016 wrote to memory of 2592 1016 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1016 wrote to memory of 2592 1016 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1016 wrote to memory of 2592 1016 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1016 wrote to memory of 2592 1016 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1016 wrote to memory of 2592 1016 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1016 wrote to memory of 2592 1016 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 508 wrote to memory of 4736 508 browser_broker.exe jre-8u321-windows-x64.exe PID 508 wrote to memory of 4736 508 browser_broker.exe jre-8u321-windows-x64.exe PID 4736 wrote to memory of 4828 4736 jre-8u321-windows-x64.exe jre-8u321-windows-x64.exe PID 4736 wrote to memory of 4828 4736 jre-8u321-windows-x64.exe jre-8u321-windows-x64.exe PID 4104 wrote to memory of 3340 4104 msiexec.exe MsiExec.exe PID 4104 wrote to memory of 3340 4104 msiexec.exe MsiExec.exe
Processes
-
C:\Program Files\Java\jre1.8.0_66\bin\javaws.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaws.exe" "C:\Users\Admin\AppData\Local\Temp\emissorNFe-4_0_1-homologacao.jnlp"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -cp "C:\PROGRA~1\Java\JRE18~1.0_6\lib\deploy.jar" com.sun.deploy.panel.ControlPanel -userConfig "deployment.expiration.decision.11.66.2" "update"2⤵
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -cp "C:\PROGRA~1\Java\JRE18~1.0_6\lib\deploy.jar" com.sun.deploy.panel.ControlPanel -userConfig "deployment.expiration.decision.timestamp.11.66.2" "1645620410"2⤵
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -cp "C:\PROGRA~1\Java\JRE18~1.0_6\lib\deploy.jar" com.sun.deploy.panel.ControlPanel -userConfig "deployment.expiration.decision.suppression.11.66.2" "false"2⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- NTFS ADS
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\jre-8u321-windows-x64.exe"C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\jre-8u321-windows-x64.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\jds314765.tmp\jre-8u321-windows-x64.exe"C:\Users\Admin\AppData\Local\Temp\jds314765.tmp\jre-8u321-windows-x64.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4828 -s 27164⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 62B3EBBB0699F1A23ADE05D820055C292⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\.oracle_jre_usage\90737d32e3aba4b.timestampMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\.oracle_jre_usage\90737d32e3aba4b.timestampMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_321_x64\jre1.8.0_32164.msiMD5
a8c681eea00bffb3dbbbffd28f07779f
SHA1ae26387f00eff1d1fcaf29162e818bb7b0e241be
SHA256ea03882940b2c48c219d318b37d2b01531d27ee2c86ad26a26dd4b71a5a515af
SHA5123b2a840d357deba2d86ade10ed41ff8861e621ee3a323d5c3e72064e3930d5f6f61f5ad27a7753fee0c5e751f90994f5e435a24387402fa87afd4926a4e699a4
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\deployment.propertiesMD5
29ed5246fb07cc52d93ce719eeade87c
SHA15c665d80050ba2261c530684a0ae7505c70af7f3
SHA256e04d3826c0024ea838e690c7d509145f334a913618a49d30122fad8de8a2ee7c
SHA512411168a74335da6f83204d34853d2187d11a5acaf8d9bb6b3fe94de4da1487285d4fa7e921089ec34f62677276f65953fd26e24d7af7602d9606ff30f376c1ea
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\deployment.propertiesMD5
c2a3ab794396e5bbb951f17582d3d6f6
SHA1b28d5d36019c5e0dbe5b1d86e49631415f96b928
SHA256af4afb86b11bc9665e0f5f6c6b7c38d34fad473037a969c074dee0aabd6d2a13
SHA512061c2be9b2525c54655fe451ee9099d256a4badd9bf9d72cfb9f1f8820b6b185cd75f4b79cb21ef8a0d8350780c152b7831ea779214b080f642912e2b0fbea11
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\jre-8u321-windows-x64.exeMD5
5c4de2813b42c80a2d77983624512e7a
SHA10e645b1e56de38a5859d187d71c792ea7cb5735a
SHA256273fe2b92f8c123f28340660bf9a7dee6f3bf2c88f4299c31c302f9c674d921d
SHA512263b008f849b036be046c545b9944f230ac5153899bd689c44d9d2f6d5ce848454136daab54401c4e79a40c9a1c017c33eb6df16b1a010a0d43ef051aefb5688
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\jre-8u321-windows-x64.exeMD5
5c4de2813b42c80a2d77983624512e7a
SHA10e645b1e56de38a5859d187d71c792ea7cb5735a
SHA256273fe2b92f8c123f28340660bf9a7dee6f3bf2c88f4299c31c302f9c674d921d
SHA512263b008f849b036be046c545b9944f230ac5153899bd689c44d9d2f6d5ce848454136daab54401c4e79a40c9a1c017c33eb6df16b1a010a0d43ef051aefb5688
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\jre-8u321-windows-x64.exe.ws1sn3x.partialMD5
5c4de2813b42c80a2d77983624512e7a
SHA10e645b1e56de38a5859d187d71c792ea7cb5735a
SHA256273fe2b92f8c123f28340660bf9a7dee6f3bf2c88f4299c31c302f9c674d921d
SHA512263b008f849b036be046c545b9944f230ac5153899bd689c44d9d2f6d5ce848454136daab54401c4e79a40c9a1c017c33eb6df16b1a010a0d43ef051aefb5688
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\OQLGLTT1\jre-8u321-windows-x64[1].exeMD5
8fd9d7b907f52b5d8775ff5867076dc5
SHA1f2d4ea18311f90c35539c92b096fda2525e9dca1
SHA2568657a266a77f3216f87edd6b93ff5bbb1dc3823549128a897bd6ead1a281c18e
SHA512c756f2e125996140888807141545d9772c053e3f7aff01e01a705c4d04119ae1c57a2885f33454712af56bb890cafd3c0b33b523c54d900af69af6a6956b5d93
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6MD5
7934a34dbd42c01cce870075fccccf89
SHA13cef9f0a927c225985ae27c08c65c081ea58065b
SHA256287a403432124eb98d591dd53f76f21337414517d363d5558647d3cf0433eb7d
SHA512817b016b7bb1b1c0d7b27132eb0f1c9b148adb168d0f8ad85e6820b05ea82bf4eba8055c056cb3a6c6da771db9065e310f75a9e8fa4852b22effa89957afac9a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6MD5
d9337a6d010bff1cafe4c20bea1e80d1
SHA148c671c9cf7a9ae10a8c58dc59362d0c04db0133
SHA256dafcc530bfde6a98d876572d976a06204e650523aa6120283fe9c508482c1cb4
SHA51231b8d1498826ba376afc8b5ec4aa80fa49816db7c88947bd2f0b2dc726290fca5eff0ed5f771225def978a310cd60d35970183be1958394d22a88f0c9d1822f8
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\Windows\3720402701\1659841449.priMD5
6dfa43a584ed243390dc943abac397c0
SHA1665637e060c9da24288944b90b377a309da6d533
SHA2564f31fe4baa7a557ed5fc2ccf57b2861946ecea6222200aca124796e251a524ad
SHA5129561a2867cf1e73578d0206d4c73e576e2b8c7497ec1db8a69df6a35ca78e84bf01060089e45ec32e5afde6d3b1de26afcd0e411a25b615042ce5bdd575cb6b0
-
C:\Users\Admin\AppData\Local\Temp\jds314765.tmp\jre-8u321-windows-x64.exeMD5
80afab5be48bacf44155212c817f4e31
SHA15a8b12509bdecdb2024a8d00395ca5f24dec63dc
SHA256fb02ebdbbd9c7f27c49eef2d743293f100a614aa95151e2d28828db84baf6657
SHA512a6602aacfc6334a9e1f05874cebe34519808d10cfcc7d3254e8639d1645758a680fe4dbcd30bcf41e9d90b47126259348e6a6cf83b5f3eeeb006110070b60304
-
C:\Users\Admin\AppData\Local\Temp\jds314765.tmp\jre-8u321-windows-x64.exeMD5
80afab5be48bacf44155212c817f4e31
SHA15a8b12509bdecdb2024a8d00395ca5f24dec63dc
SHA256fb02ebdbbd9c7f27c49eef2d743293f100a614aa95151e2d28828db84baf6657
SHA512a6602aacfc6334a9e1f05874cebe34519808d10cfcc7d3254e8639d1645758a680fe4dbcd30bcf41e9d90b47126259348e6a6cf83b5f3eeeb006110070b60304
-
C:\Users\Admin\AppData\Local\Temp\jusched.logMD5
2fc9cb208952c1d6d9d395be01443f06
SHA1c1d7505f819d5ab0dfd81a61459e7a6cf7263cc8
SHA2565a2d7735c2d03d216a5dc32994cce67fa3e4531617931cdd74f60f5004ac621b
SHA5126bff6f512d9ae8e8a5eb06a37ab34caeec90453de898d749a94c945b3ee13324ba74c80762c18ba61a7812f2a640e2a2b0f19cbaacbededc9cae7347f59eb70f
-
C:\Users\Admin\AppData\Local\Temp\jusched.logMD5
3a22f57142be1499bf9a03e55780f173
SHA1acf0cfe61620f165cc90a18b7183f52776cb6065
SHA256e77058434b69aed0d60069501181ac1398d301f7a562416de745b86b9cf90c75
SHA5126ec5d623d1737aca5034989b64a0535ce99f41f9bfac4428132b88114b71dc0ad5da52a66da9b1ba9f9f93e966103f260d9fcd5b8222d79b8f55f055ef463f6c
-
C:\Windows\Installer\MSI5E73.tmpMD5
da4598360ae218325c6b96b91a90dd19
SHA1d773cc0953aaad2069467ad1a51e0fd7aa75e5c4
SHA2564a8fb4e1fc0202da504de4259742943433040bf67d1f35397f428042b5dd4ef4
SHA512129ec79a7ad644d9dc0682f83740329bdf31d48a6a51160212fdbf236c1f9c98259b36e94755bc146756b472fbda8a727af66860c89a9bc53c61a03e30942ea4
-
C:\Windows\Installer\MSI61EF.tmpMD5
da4598360ae218325c6b96b91a90dd19
SHA1d773cc0953aaad2069467ad1a51e0fd7aa75e5c4
SHA2564a8fb4e1fc0202da504de4259742943433040bf67d1f35397f428042b5dd4ef4
SHA512129ec79a7ad644d9dc0682f83740329bdf31d48a6a51160212fdbf236c1f9c98259b36e94755bc146756b472fbda8a727af66860c89a9bc53c61a03e30942ea4
-
\Windows\Installer\MSI5E73.tmpMD5
da4598360ae218325c6b96b91a90dd19
SHA1d773cc0953aaad2069467ad1a51e0fd7aa75e5c4
SHA2564a8fb4e1fc0202da504de4259742943433040bf67d1f35397f428042b5dd4ef4
SHA512129ec79a7ad644d9dc0682f83740329bdf31d48a6a51160212fdbf236c1f9c98259b36e94755bc146756b472fbda8a727af66860c89a9bc53c61a03e30942ea4
-
\Windows\Installer\MSI61EF.tmpMD5
da4598360ae218325c6b96b91a90dd19
SHA1d773cc0953aaad2069467ad1a51e0fd7aa75e5c4
SHA2564a8fb4e1fc0202da504de4259742943433040bf67d1f35397f428042b5dd4ef4
SHA512129ec79a7ad644d9dc0682f83740329bdf31d48a6a51160212fdbf236c1f9c98259b36e94755bc146756b472fbda8a727af66860c89a9bc53c61a03e30942ea4
-
memory/2156-116-0x00000000024E0000-0x0000000002750000-memory.dmpFilesize
2.4MB
-
memory/2156-121-0x0000000002330000-0x0000000002331000-memory.dmpFilesize
4KB
-
memory/2156-117-0x0000000002330000-0x0000000002331000-memory.dmpFilesize
4KB
-
memory/2804-131-0x00000000013D0000-0x00000000013D1000-memory.dmpFilesize
4KB
-
memory/2804-132-0x00000000031C0000-0x0000000003430000-memory.dmpFilesize
2.4MB
-
memory/3488-127-0x0000000002C50000-0x0000000002EC0000-memory.dmpFilesize
2.4MB
-
memory/3488-126-0x0000000001170000-0x0000000001171000-memory.dmpFilesize
4KB