Overview
overview
10Static
static
VirusShare...93.exe
windows7_x64
10VirusShare...93.exe
windows10_x64
10VirusShare...93.exe
windows10-2004_x64
10VirusShare...93.exe
windows11_x64
VirusShare...93.exe
macos_amd64
1VirusShare...93.exe
linux_armhf
VirusShare...93.exe
linux_mips
VirusShare...93.exe
linux_mipsel
VirusShare...93.exe
linux_amd64
Analysis
-
max time kernel
1749s -
max time network
1711s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
07-04-2022 19:28
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe
Resource
win10-20220331-en
Behavioral task
behavioral3
Sample
VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe
Resource
win10v2004-20220331-en
Behavioral task
behavioral4
Sample
VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe
Resource
win11-20220223-en
Behavioral task
behavioral5
Sample
VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe
Resource
macos
Behavioral task
behavioral6
Sample
VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral7
Sample
VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral8
Sample
VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe
Resource
debian9-mipsel-en-20211208
Behavioral task
behavioral9
Sample
VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe
Resource
ubuntu1804-amd64-en-20211208
General
-
Target
VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe
-
Size
392KB
-
MD5
6653ef20d2a3a6ef656d9c886ebabd93
-
SHA1
bb0cc0b05bb70a3d347faa94fb36a35c771b0692
-
SHA256
48ff838a7fe98ec2c5bb59a8a76100047abcfa6db824f4982b8e7fdf2110f05d
-
SHA512
b68b37147ce0d1389d62f5f72ebb616edc7d2ed2aaa484e85f6dc4b6070c9ce973a523e11e311686dc0efb0757fe52dcfa430afb1f48f98ecfdc257c6f3cc360
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\# DECRYPT MY FILES #.html
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.xlfp45.win/AE92-45E4-74AF-0291-9041
http://cerberhhyed5frqa.slr849.win/AE92-45E4-74AF-0291-9041
http://cerberhhyed5frqa.ret5kr.win/AE92-45E4-74AF-0291-9041
http://cerberhhyed5frqa.zgf48j.win/AE92-45E4-74AF-0291-9041
http://cerberhhyed5frqa.xltnet.win/AE92-45E4-74AF-0291-9041
http://cerberhhyed5frqa.onion/AE92-45E4-74AF-0291-9041
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://cerberhhyed5frqa.xlfp45.win/AE92-45E4-74AF-0291-9041
http://cerberhhyed5frqa.slr849.win/AE92-45E4-74AF-0291-9041
http://cerberhhyed5frqa.ret5kr.win/AE92-45E4-74AF-0291-9041
http://cerberhhyed5frqa.zgf48j.win/AE92-45E4-74AF-0291-9041
http://cerberhhyed5frqa.xltnet.win/AE92-45E4-74AF-0291-9041
http://cerberhhyed5frqa.onion/AE92-45E4-74AF-0291-9041
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16430) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{6B045A80-4FC8-BA51-EC84-FDB59219BC98}\\icacls.exe\"" VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe Set value (str) \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{6B045A80-4FC8-BA51-EC84-FDB59219BC98}\\icacls.exe\"" icacls.exe -
Executes dropped EXE 1 IoCs
pid Process 4964 icacls.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\MoveBackup.tiff icacls.exe File opened for modification C:\Users\Admin\Pictures\TestExpand.tiff icacls.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\Control Panel\International\Geo\Nation icacls.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\icacls.lnk VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\icacls.lnk icacls.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4964 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\Software\Microsoft\Windows\CurrentVersion\Run VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe Key created \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe Set value (str) \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\icacls = "\"C:\\Users\\Admin\\AppData\\Roaming\\{6B045A80-4FC8-BA51-EC84-FDB59219BC98}\\icacls.exe\"" VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe Set value (str) \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\icacls = "\"C:\\Users\\Admin\\AppData\\Roaming\\{6B045A80-4FC8-BA51-EC84-FDB59219BC98}\\icacls.exe\"" icacls.exe Key created \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce icacls.exe Set value (str) \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\icacls = "\"C:\\Users\\Admin\\AppData\\Roaming\\{6B045A80-4FC8-BA51-EC84-FDB59219BC98}\\icacls.exe\"" icacls.exe Key created \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\icacls = "\"C:\\Users\\Admin\\AppData\\Roaming\\{6B045A80-4FC8-BA51-EC84-FDB59219BC98}\\icacls.exe\"" VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe Key created \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\Software\Microsoft\Windows\CurrentVersion\Run icacls.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp2E35.bmp" icacls.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\1f7beff9-ddf7-4588-b371-4668118b7be4.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220407213328.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4516 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 3184 taskkill.exe 2276 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\Control Panel\Desktop VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe Set value (str) \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{6B045A80-4FC8-BA51-EC84-FDB59219BC98}\\icacls.exe\"" VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe Key created \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\Control Panel\Desktop icacls.exe Set value (str) \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{6B045A80-4FC8-BA51-EC84-FDB59219BC98}\\icacls.exe\"" icacls.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000_Classes\Local Settings icacls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1316 PING.EXE 384 PING.EXE -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 4964 icacls.exe 3940 msedge.exe 3940 msedge.exe 3944 msedge.exe 3944 msedge.exe 2032 msedge.exe 2032 msedge.exe 3544 identity_helper.exe 3544 identity_helper.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 4748 VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe Token: SeDebugPrivilege 4964 icacls.exe Token: SeDebugPrivilege 3184 taskkill.exe Token: SeBackupPrivilege 4000 vssvc.exe Token: SeRestorePrivilege 4000 vssvc.exe Token: SeAuditPrivilege 4000 vssvc.exe Token: SeIncreaseQuotaPrivilege 2512 wmic.exe Token: SeSecurityPrivilege 2512 wmic.exe Token: SeTakeOwnershipPrivilege 2512 wmic.exe Token: SeLoadDriverPrivilege 2512 wmic.exe Token: SeSystemProfilePrivilege 2512 wmic.exe Token: SeSystemtimePrivilege 2512 wmic.exe Token: SeProfSingleProcessPrivilege 2512 wmic.exe Token: SeIncBasePriorityPrivilege 2512 wmic.exe Token: SeCreatePagefilePrivilege 2512 wmic.exe Token: SeBackupPrivilege 2512 wmic.exe Token: SeRestorePrivilege 2512 wmic.exe Token: SeShutdownPrivilege 2512 wmic.exe Token: SeDebugPrivilege 2512 wmic.exe Token: SeSystemEnvironmentPrivilege 2512 wmic.exe Token: SeRemoteShutdownPrivilege 2512 wmic.exe Token: SeUndockPrivilege 2512 wmic.exe Token: SeManageVolumePrivilege 2512 wmic.exe Token: 33 2512 wmic.exe Token: 34 2512 wmic.exe Token: 35 2512 wmic.exe Token: 36 2512 wmic.exe Token: SeIncreaseQuotaPrivilege 2512 wmic.exe Token: SeSecurityPrivilege 2512 wmic.exe Token: SeTakeOwnershipPrivilege 2512 wmic.exe Token: SeLoadDriverPrivilege 2512 wmic.exe Token: SeSystemProfilePrivilege 2512 wmic.exe Token: SeSystemtimePrivilege 2512 wmic.exe Token: SeProfSingleProcessPrivilege 2512 wmic.exe Token: SeIncBasePriorityPrivilege 2512 wmic.exe Token: SeCreatePagefilePrivilege 2512 wmic.exe Token: SeBackupPrivilege 2512 wmic.exe Token: SeRestorePrivilege 2512 wmic.exe Token: SeShutdownPrivilege 2512 wmic.exe Token: SeDebugPrivilege 2512 wmic.exe Token: SeSystemEnvironmentPrivilege 2512 wmic.exe Token: SeRemoteShutdownPrivilege 2512 wmic.exe Token: SeUndockPrivilege 2512 wmic.exe Token: SeManageVolumePrivilege 2512 wmic.exe Token: 33 2512 wmic.exe Token: 34 2512 wmic.exe Token: 35 2512 wmic.exe Token: 36 2512 wmic.exe Token: 33 684 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 684 AUDIODG.EXE Token: SeDebugPrivilege 2276 taskkill.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2032 msedge.exe 2032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4748 wrote to memory of 4964 4748 VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe 81 PID 4748 wrote to memory of 4964 4748 VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe 81 PID 4748 wrote to memory of 4964 4748 VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe 81 PID 4748 wrote to memory of 4088 4748 VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe 82 PID 4748 wrote to memory of 4088 4748 VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe 82 PID 4748 wrote to memory of 4088 4748 VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe 82 PID 4088 wrote to memory of 3184 4088 cmd.exe 84 PID 4088 wrote to memory of 3184 4088 cmd.exe 84 PID 4088 wrote to memory of 3184 4088 cmd.exe 84 PID 4088 wrote to memory of 1316 4088 cmd.exe 85 PID 4088 wrote to memory of 1316 4088 cmd.exe 85 PID 4088 wrote to memory of 1316 4088 cmd.exe 85 PID 4964 wrote to memory of 4516 4964 icacls.exe 86 PID 4964 wrote to memory of 4516 4964 icacls.exe 86 PID 4964 wrote to memory of 2512 4964 icacls.exe 90 PID 4964 wrote to memory of 2512 4964 icacls.exe 90 PID 4964 wrote to memory of 3372 4964 icacls.exe 113 PID 4964 wrote to memory of 3372 4964 icacls.exe 113 PID 4964 wrote to memory of 268 4964 icacls.exe 114 PID 4964 wrote to memory of 268 4964 icacls.exe 114 PID 3372 wrote to memory of 292 3372 msedge.exe 115 PID 3372 wrote to memory of 292 3372 msedge.exe 115 PID 4964 wrote to memory of 2032 4964 icacls.exe 117 PID 4964 wrote to memory of 2032 4964 icacls.exe 117 PID 2032 wrote to memory of 3580 2032 msedge.exe 118 PID 2032 wrote to memory of 3580 2032 msedge.exe 118 PID 4964 wrote to memory of 2364 4964 icacls.exe 119 PID 4964 wrote to memory of 2364 4964 icacls.exe 119 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 2032 wrote to memory of 4488 2032 msedge.exe 120 PID 3372 wrote to memory of 5072 3372 msedge.exe 121 PID 3372 wrote to memory of 5072 3372 msedge.exe 121 PID 3372 wrote to memory of 5072 3372 msedge.exe 121 PID 3372 wrote to memory of 5072 3372 msedge.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Roaming\{6B045A80-4FC8-BA51-EC84-FDB59219BC98}\icacls.exe"C:\Users\Admin\AppData\Roaming\{6B045A80-4FC8-BA51-EC84-FDB59219BC98}\icacls.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Modifies extensions of user files
- Checks computer location settings
- Drops startup file
- Modifies file permissions
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:4516
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe97bd46f8,0x7ffe97bd4708,0x7ffe97bd47184⤵PID:292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,6482357792074679359,4106993546385732318,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:24⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,6482357792074679359,4106993546385732318,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:3940
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.xlfp45.win/AE92-45E4-74AF-0291-90413⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe97bd46f8,0x7ffe97bd4708,0x7ffe97bd47184⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,3682752625771048989,14844378160230172082,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:24⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,3682752625771048989,14844378160230172082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,3682752625771048989,14844378160230172082,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:84⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3682752625771048989,14844378160230172082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3604 /prefetch:14⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3682752625771048989,14844378160230172082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3596 /prefetch:14⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3682752625771048989,14844378160230172082,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:14⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3682752625771048989,14844378160230172082,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:14⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2152,3682752625771048989,14844378160230172082,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5788 /prefetch:84⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2152,3682752625771048989,14844378160230172082,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6060 /prefetch:84⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3682752625771048989,14844378160230172082,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:14⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3682752625771048989,14844378160230172082,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:14⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,3682752625771048989,14844378160230172082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4148 /prefetch:84⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings4⤵
- Drops file in Program Files directory
PID:4244 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff7f01c5460,0x7ff7f01c5470,0x7ff7f01c54805⤵PID:4468
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,3682752625771048989,14844378160230172082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4148 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2152,3682752625771048989,14844378160230172082,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3212 /prefetch:84⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2152,3682752625771048989,14844378160230172082,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3280 /prefetch:84⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,3682752625771048989,14844378160230172082,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2152,3682752625771048989,14844378160230172082,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3000 /prefetch:84⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2152,3682752625771048989,14844378160230172082,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4100 /prefetch:84⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2152,3682752625771048989,14844378160230172082,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6344 /prefetch:84⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2152,3682752625771048989,14844378160230172082,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6332 /prefetch:84⤵PID:796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2152,3682752625771048989,14844378160230172082,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:84⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2152,3682752625771048989,14844378160230172082,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6228 /prefetch:84⤵PID:1412
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:2364
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "icacls.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{6B045A80-4FC8-BA51-EC84-FDB59219BC98}\icacls.exe" > NUL3⤵PID:2320
-
C:\Windows\system32\taskkill.exetaskkill /t /f /im "icacls.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:384
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe" > NUL2⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3184
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:1316
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2544
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4c8 0x2941⤵
- Suspicious use of AdjustPrivilegeToken
PID:684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:4252
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fa0f335aed03f37d107743b53054938f
SHA192e70323951fadecbf01b0083ff1f8467aeb2267
SHA2568ed2ab6926b7c652ab59ef69acdd13e08031e7c24c59e19ed2de299a69dae743
SHA5127538bac51ee819c886f987d627d9535cd835475a16f4a8d4bc101873ce55a6d3ed9569a0a763ca58bc732c215d67d2876c38c8bc6787c28ef1d67f44c39adc28
-
Filesize
152B
MD5fa0f335aed03f37d107743b53054938f
SHA192e70323951fadecbf01b0083ff1f8467aeb2267
SHA2568ed2ab6926b7c652ab59ef69acdd13e08031e7c24c59e19ed2de299a69dae743
SHA5127538bac51ee819c886f987d627d9535cd835475a16f4a8d4bc101873ce55a6d3ed9569a0a763ca58bc732c215d67d2876c38c8bc6787c28ef1d67f44c39adc28
-
Filesize
152B
MD5c1556a561a27904fd20a49c300482d51
SHA16e3965ff50e8e7d1e96a2d45e4dfc1ca5755aa33
SHA256b101d260d9fcd242c4216d9890383b23fc4e70ef68bedcd92ce5b7c5e0bbe9c4
SHA51255b8ac257b7a75115be004b9a2e1763869cf3a2e9d71c637bbbc804db88724c436bdef21385712df9f7aa839e246a74270fbbad1785584fe17843f9421c61372
-
Filesize
152B
MD5c1556a561a27904fd20a49c300482d51
SHA16e3965ff50e8e7d1e96a2d45e4dfc1ca5755aa33
SHA256b101d260d9fcd242c4216d9890383b23fc4e70ef68bedcd92ce5b7c5e0bbe9c4
SHA51255b8ac257b7a75115be004b9a2e1763869cf3a2e9d71c637bbbc804db88724c436bdef21385712df9f7aa839e246a74270fbbad1785584fe17843f9421c61372
-
Filesize
152B
MD5c1556a561a27904fd20a49c300482d51
SHA16e3965ff50e8e7d1e96a2d45e4dfc1ca5755aa33
SHA256b101d260d9fcd242c4216d9890383b23fc4e70ef68bedcd92ce5b7c5e0bbe9c4
SHA51255b8ac257b7a75115be004b9a2e1763869cf3a2e9d71c637bbbc804db88724c436bdef21385712df9f7aa839e246a74270fbbad1785584fe17843f9421c61372
-
Filesize
2KB
MD57b77089a9b59b49a004dcb1d9a5fe1e7
SHA1352ee17ae4c6c9cff28f29328496bd2eca99bf7c
SHA2560c7d26e4743df51bc2ef6a83bdaa6ab63bb312dece1921c90bfe641bba4b19ea
SHA5128c1cf7147057fa2e6ed9c338e0d903068ee7464786b98c64c823c8c4543962eef5fd8dc07a92a4b2e66fd98accc0acd3b253770656c44c462154962a5984dce2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Trust Protection Lists\1.0.0.21\Mu\Advertising
Filesize24KB
MD54e9962558e74db5038d8073a5b3431aa
SHA13cd097d9dd4b16a69efbb0fd1efe862867822146
SHA2566f81212bd841eca89aa6f291818b4ad2582d7cdb4e488adea98261494bdcd279
SHA512fcd76bca998afc517c87de0db6ee54e45aa2263fa7b91653ac3adb34c41f3681fbe19d673ae9b24fdf3d53f5af4e4968e603a1eb557207f8860ac51372026b2e
-
Filesize
4KB
MD5fad197d6ffd32d1268b9e7e8d13ab32a
SHA1b0129887a75965bb2ef56a2c39d3231e5b87265d
SHA2564e446af739e1a06b48a73607e9441bc4aa34ceafd808ff845864408179a4d2c3
SHA51201d9f588bfa315e316ff0ff4a15a0a49144fd77ee89960882cd528d7f7a277b086667cea2357c3ca2bd16a2b3f4aeb7fcaf473501b499101be68acbe1e0126cb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Trust Protection Lists\1.0.0.21\Mu\CompatExceptions
Filesize660B
MD5900263477e1368869fbf1be99990c878
SHA1e56e199aa4119f3cc4c4d46f96daea89bbf9685a
SHA2567f660d9db521646e9c6510d844b6c6ea26716b620c46f34edaf7ce318a9473e4
SHA5121035b388b4b00c744824d13c5ef48118d88abbb53e9d76896a2d96a2a127a7739c119e781d7d5f0b8d910e10539c0c502c9f937fc2487747c65e7285f4b1e6d2
-
Filesize
6KB
MD594c183b842784d0ae69f8aa57c8ac015
SHA1c5b1ebc2b5c140ccbb21cd377ca18f3c5d0b80cd
SHA256aa5c4d50684aa478d5982e509cbf1f8347fbc9cc75cb847d54915c16c3a33d25
SHA5125808ddb81657acf4712fa845c95aacbab32a414ffda3b9d1218637e2d53bd3e0d6b95c872779ead6eaa13b4d2d563494ad5587337958bd17f1e791fad5d822fb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Trust Protection Lists\1.0.0.21\Mu\Cryptomining
Filesize1KB
MD58c31feb9c3faaa9794aa22ce9f48bfbd
SHA1f5411608a15e803afc97961b310bb21a6a8bd5b6
SHA2566016fd3685046b33c7a2b1e785ac757df20e7c760abe0c27e1b8b0294222421d
SHA512ba4b5886c04ba8f7a7dbb87e96d639783a5969a245de181cf620b8f536e3ac95bbd910cd2f1f6aae6c3cd70fc1ef6209dc10d2b083ec51861b51d83f95811baa
-
Filesize
68KB
MD50d37c9d98f35f2c6524bd9b874ec93ed
SHA187d2d1149db8a1c2d91bc8d2d6e2827d2d8850f5
SHA25619ce05d2716fae5d0d6e2067a7a624c0fa7f8b02486d9469861fd30cf1c499ac
SHA51268e73804a144cbe7287c2136ab1986c4e2a97c497d5bfd36ef5db0f1fb1b4a28839d63d83019082ce61af9b42853934888ce05d6b28350742776b97fa310a575
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Trust Protection Lists\1.0.0.21\Mu\Fingerprinting
Filesize1KB
MD5b51076d21461e00fcbf3dbd2c9e96b2b
SHA131311536cf570f2f9c88d21f03a935ac6e233231
SHA25621a8d3e85d76761a1aab9dca765efef5dfa08d49db037befd91833e4639dd993
SHA5123e193220ddddc47ecea32a2f777e55faa12c7a8052323455c8d7a89c01048155c77ae009fd0f5bebea89f1fae4a88b6b3ceca4e808064f474ea5b3a9497598cb
-
Filesize
34B
MD5cd0395742b85e2b669eaec1d5f15b65b
SHA143c81d1c62fc7ff94f9364639c9a46a0747d122e
SHA2562b4a47b82cbe70e34407c7df126a24007aff8b45d5716db384d27cc1f3b30707
SHA5124df2ce734e2f7bc5f02bb7845ea801b57dcf649565dd94b1b71f578b453ba0a17c61ccee73e7cff8f23cdd6aa37e55be5cb15f4767ff88a9a06de3623604fbf0
-
Filesize
999B
MD5152b745da17397ed5a2f3059bb157600
SHA147bf4e575ba1acf47dcc99f1800f753b4cc65ef6
SHA256ef994058a637f7b1b47c31c8670977084d1f86cc21a196920aa87f8ed31e98e8
SHA5124984a8a46eb452b3c62f2c2ca8c9d999de37c39895ad9a9ed91d12a7731b1cd227f335829f7a6927f19cd8bf4dd7d6749fc853461a46fc97853d5b9e23171d31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Trust Protection Lists\1.0.0.21\Sigma\Advertising
Filesize459B
MD5d024831cae8599f0edee70275d99e843
SHA169e08b543802b130da5305cbb0140bda5601079c
SHA2560b75817b9ce2164f52e537c66bbff0fe53024bf9a00fb193efd63fe48f34a978
SHA512ee1096446f6a17bc3fde9aadb418ca4b2db5132cdde1e429300487aaf4d8b9865a3bbc95d3a3198cde137a6395f69c035b74a72f74edc22a490bccc3320b0b03
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Trust Protection Lists\1.0.0.21\Sigma\Analytics
Filesize50B
MD54cefbb980962973a354915a49d1b0f4d
SHA11d20148cab5cdadb85fad6041262584a12c2745d
SHA25666de8db363de02974a1471153112e51f014bb05936ce870c433fd9a85b34455a
SHA5126a088bbc6c40454165ddee3183667d2997dca5fcc8312f69e3c2397e61255e49b5146b24c2c64cd3c8867289e3abfdf1155e47722fdd8276f96d51e8f311d4b0
-
Filesize
36B
MD57f077f40c2d1ce8e95faa8fdb23ed8b4
SHA12c329e3e20ea559974ddcaabc2c7c22de81e7ad2
SHA256bda08f8b53c121bbc03da1f5c870c016b06fa620a2c02375988555dd12889cdf
SHA512c1fb5d40491ae22a155a9bd115c32cbe9dbcba615545af2f1a252475f9d59844763cd7c177f08277d8ef59e873b7d885fda17f2a504d9ec2c181d0f793cb542b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Trust Protection Lists\1.0.0.21\Sigma\Cryptomining
Filesize32B
MD54ec1eda0e8a06238ff5bf88569964d59
SHA1a2e78944fcac34d89385487ccbbfa4d8f078d612
SHA256696e930706b5d391eb8778f73b0627ffc2be7f6c9a3e7659170d9d37fc4a97b5
SHA512c9b1ed7b61f26d94d7f5eded2d42d40f3e4300eee2319fe28e04b25cdb6dd92daf67828bff453bf5fc8d7b6ceb58cab319fc0daac9b0050e27a89efe74d2734e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Trust Protection Lists\1.0.0.21\Sigma\Entities
Filesize2KB
MD5ba60431b366f83677a5bf1a2e4601799
SHA183f828c27de5429e25c38c36ba77e069d5c7b2de
SHA256ab895ef5f75efd49dbb4fcdf7529e50ca622d13433e067bcf8a1f1127a944da3
SHA512aa9ff0374fb3d4bff7ee5a78dd5ace340da4af1a844f453a40b2723a91b32e6e3f4bd736fb3f3cb210b016109660a7b5cc8440901c6bb410e61530286a4e0200
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Trust Protection Lists\1.0.0.21\Sigma\Fingerprinting
Filesize110B
MD5a004023825237dadc8f934758ff9eaf2
SHA1c981a900b5ce63884635cedfe5ba722416021cb2
SHA2563c4e82aae615a7bed985b4544afecb774b728df1cc9f7561ea25b97482119ef7
SHA512e49667fca51a6497ccae9b881d679b857c025f2945ab93c9a6769b1c0a632329993daefab6eda9ed70a32a75630d7b3d93dda5acda8ff87ffe5f090ca7b35e4f
-
Filesize
75B
MD5c6c7f3ee1e17acbff6ac22aa89b02e4e
SHA1bdbd0220e54b80b3d2ffbbddadc89bfbb8e64a8b
SHA256a2f9f27d6938a74979d34484bced535412969c2533dc694bfa667fe81d66d7d4
SHA51286ed28ffdd00b4a397a20968792fcd30dd4a891a187a7789c00c88b64689b334a11fa087eb54ccee813c181cf891b43184dde7af9a6f33caed2a71e2c445a7b4
-
Filesize
35B
MD5976b1cf7e3442f88cd8ba26d3f0965bb
SHA1b75438dc71de4ac761d94a215ddbffadcd1225b0
SHA256decde67630f29fc003cb1f2ccbd7371a05079985a9cce93ec93c4fadd8dc5541
SHA512d0472fed72e1eb0a7747a693a0e654fbe92dd028db3cc42377810d90474dd4099ac981cca333eb52c18e75ed04a1f1f79f3bf5957fe8b16086f1252b3454b8d5
-
Filesize
519B
MD59ca5eb41a53645be63d247ad8a9a7869
SHA12e98b04b5a2efb04d20bc7fe51b05c4e4841205b
SHA256f67c58a61ddef715b01debc66ddc0e3c365295ac9870328f6b8bdbcb02a6b8c9
SHA5127dd7d295ccce957490f025eef124b22c809f140a96003126b801bbbdd94eb2115ee59e7d16dd1f020b1d6eaaff66853b9de2cbf7092c1692f40dbe21ab346fd8
-
Filesize
1KB
MD5612220779ebfd47b99802a917f80fb96
SHA1b69839c4d565c384f266561422aa5db071c59e59
SHA256c160e4e288dbfb1a1efde0c629fe3123ef912aab72406e12a7f60c41e509f198
SHA5121a758ef80647656c6a72744d320539f97e6e853cff0763ea91d52e89966280bf3f937405446827b252748dff50bba0cfe42a8156bdc5d4309cda3d9ac4329ea2
-
Filesize
392KB
MD56653ef20d2a3a6ef656d9c886ebabd93
SHA1bb0cc0b05bb70a3d347faa94fb36a35c771b0692
SHA25648ff838a7fe98ec2c5bb59a8a76100047abcfa6db824f4982b8e7fdf2110f05d
SHA512b68b37147ce0d1389d62f5f72ebb616edc7d2ed2aaa484e85f6dc4b6070c9ce973a523e11e311686dc0efb0757fe52dcfa430afb1f48f98ecfdc257c6f3cc360
-
Filesize
392KB
MD56653ef20d2a3a6ef656d9c886ebabd93
SHA1bb0cc0b05bb70a3d347faa94fb36a35c771b0692
SHA25648ff838a7fe98ec2c5bb59a8a76100047abcfa6db824f4982b8e7fdf2110f05d
SHA512b68b37147ce0d1389d62f5f72ebb616edc7d2ed2aaa484e85f6dc4b6070c9ce973a523e11e311686dc0efb0757fe52dcfa430afb1f48f98ecfdc257c6f3cc360
-
Filesize
12KB
MD5a734a143464f83a03f0604ad0d1975fb
SHA13b1c0d630afce9419a2990002c3db93373928232
SHA2562a6a17bb38457d4ad59d777e3fc95af15842258be33b6fce0dd7438693db3fc2
SHA5127a755d3c2205044ba5e63b826dd4aa719407078ecaf67ea135e5167ac364a5b0effc0e6e1a5a380c10cf243432a1bfd3ee965f4482b1b681ab62f716cf33578b
-
Filesize
10KB
MD5e95e94892b495658f51ec62ce28d6f5d
SHA183f70977cf04d1fb4038854397b15dbbdfd02131
SHA2561b3db9c3828bfdc7cf53b93167440bb17c28f02f9d7d577cd305d1ac0fa2cf5f
SHA512a473f7ade532e0e1b1f1199a3165c4f7dc29f7079facc65445e14283ed65a62538f1a1c9a65ec86da89b90d8e87a91ff6d33c2093a65b398e5e01fd0148fa9a5
-
Filesize
219B
MD535a3e3b45dcfc1e6c4fd4a160873a0d1
SHA1a0bcc855f2b75d82cbaae3a8710f816956e94b37
SHA2568ad5e0f423ce1ff13f45a79746813f0f1d56993d7f125ab96f3d93fb54bdc934
SHA5126d8e68b969ef67903aff526e983b0fb496678e4c819139e560a11f754a36c4b5770ac2ecf3fc1d9cb5aaa84f80363b4f55553255569503893192911b80d9d853