Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10_x64 -
resource
win10-20220414-en -
resource tags
arch:x64arch:x86image:win10-20220414-enlocale:en-usos:windows10-1703-x64system -
submitted
12-08-2022 03:54
Static task
static1
Behavioral task
behavioral1
Sample
c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe
Resource
win10-20220414-en
General
-
Target
c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe
-
Size
905KB
-
MD5
2a30eb2ce951c8d07108c6f06b493a75
-
SHA1
89b347a6edbdec60ea9fdbbad3a1fb16606874c3
-
SHA256
c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568
-
SHA512
34ab15e1f6aae7a6d738debfa39e970e118b69f05558a55cd390a2c08106bdda3d030d3454dd7ef5a51ae6112536d27b5d9b6a4cdc0ece0f7a87108550262c7e
Malware Config
Extracted
redline
nam3
103.89.90.61:34589
-
auth_value
64b900120bbceaa6a9c60e9079492895
Extracted
redline
@tag12312341
62.204.41.144:14096
-
auth_value
71466795417275fac01979e57016e277
Extracted
redline
RuXaRR_GG
insttaller.com:40915
-
auth_value
4a733ff307847db3ee220c11d113a305
Extracted
redline
5076357887
195.54.170.157:16525
-
auth_value
0dfaff60271d374d0c206d19883e06f3
Extracted
redline
4
31.41.244.134:11643
-
auth_value
a516b2d034ecd34338f12b50347fbd92
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 15 IoCs
Processes:
resource yara_rule C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline C:\Program Files (x86)\Company\NewProduct\tag.exe family_redline C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe family_redline C:\Program Files (x86)\Company\NewProduct\jshainx.exe family_redline C:\Program Files (x86)\Company\NewProduct\safert44.exe family_redline C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline C:\Program Files (x86)\Company\NewProduct\tag.exe family_redline C:\Program Files (x86)\Company\NewProduct\safert44.exe family_redline C:\Program Files (x86)\Company\NewProduct\jshainx.exe family_redline C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe family_redline behavioral1/memory/5000-643-0x00000000003B0000-0x00000000003D0000-memory.dmp family_redline behavioral1/memory/4216-665-0x0000000000890000-0x00000000008B0000-memory.dmp family_redline behavioral1/memory/5100-663-0x00000000007F0000-0x0000000000834000-memory.dmp family_redline behavioral1/memory/4476-676-0x0000000000CF0000-0x0000000000D10000-memory.dmp family_redline behavioral1/memory/4700-695-0x0000000000800000-0x0000000000820000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
Processes:
F0geI.exekukurzka9000.exenamdoitntn.exereal.exesafert44.exetag.exejshainx.exeffnameedit.exerawxdev.exeme.exepid process 4904 F0geI.exe 4936 kukurzka9000.exe 5000 namdoitntn.exe 5048 real.exe 5100 safert44.exe 4216 tag.exe 4476 jshainx.exe 4700 ffnameedit.exe 4832 rawxdev.exe 5020 me.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Control Panel\International\Geo\Nation c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe -
Loads dropped DLL 3 IoCs
Processes:
F0geI.exepid process 4904 F0geI.exe 4904 F0geI.exe 4904 F0geI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 10 IoCs
Processes:
c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exedescription ioc process File opened for modification C:\Program Files (x86)\Company\NewProduct\F0geI.exe c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\real.exe c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\me.exe c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\rawxdev.exe c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\safert44.exe c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\tag.exe c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\jshainx.exe c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe -
Drops file in Windows directory 10 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5820 5048 WerFault.exe real.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
real.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 real.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString real.exe -
Processes:
browser_broker.exeMicrosoftEdgeCP.exeMicrosoftEdge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DOMStorage MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing\NewTabPage\ProcessingFlag = 70c52770ffadd801 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\ManagerHistoryComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url5 = "https://twitter.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows\AllowInPrivate MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 6bec626effadd801 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 04142f70ffadd801 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 6d2ecb54ffadd801 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\FontSize = "3" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating MicrosoftEdge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
real.exejshainx.exetag.exesafert44.exeffnameedit.exenamdoitntn.exepid process 5048 real.exe 5048 real.exe 4476 jshainx.exe 4476 jshainx.exe 4216 tag.exe 4216 tag.exe 5100 safert44.exe 5100 safert44.exe 4700 ffnameedit.exe 4700 ffnameedit.exe 5000 namdoitntn.exe 5000 namdoitntn.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
MicrosoftEdgeCP.exepid process 2728 MicrosoftEdgeCP.exe 2728 MicrosoftEdgeCP.exe 2728 MicrosoftEdgeCP.exe 2728 MicrosoftEdgeCP.exe 2728 MicrosoftEdgeCP.exe 2728 MicrosoftEdgeCP.exe 2728 MicrosoftEdgeCP.exe 2728 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exejshainx.exetag.exesafert44.exeffnameedit.exenamdoitntn.exedescription pid process Token: SeDebugPrivilege 1648 MicrosoftEdge.exe Token: SeDebugPrivilege 1648 MicrosoftEdge.exe Token: SeDebugPrivilege 1648 MicrosoftEdge.exe Token: SeDebugPrivilege 1648 MicrosoftEdge.exe Token: SeDebugPrivilege 3176 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3176 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3176 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3176 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 5860 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 5860 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4476 jshainx.exe Token: SeDebugPrivilege 4216 tag.exe Token: SeDebugPrivilege 5100 safert44.exe Token: SeDebugPrivilege 4700 ffnameedit.exe Token: SeDebugPrivilege 5000 namdoitntn.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exepid process 1648 MicrosoftEdge.exe 2728 MicrosoftEdgeCP.exe 2728 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 62 IoCs
Processes:
c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exeMicrosoftEdgeCP.exedescription pid process target process PID 3704 wrote to memory of 4904 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe F0geI.exe PID 3704 wrote to memory of 4904 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe F0geI.exe PID 3704 wrote to memory of 4904 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe F0geI.exe PID 2728 wrote to memory of 616 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 616 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 616 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 616 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 3176 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 3176 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 3176 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 3176 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 3704 wrote to memory of 4936 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe kukurzka9000.exe PID 3704 wrote to memory of 4936 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe kukurzka9000.exe PID 3704 wrote to memory of 4936 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe kukurzka9000.exe PID 3704 wrote to memory of 5000 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe namdoitntn.exe PID 3704 wrote to memory of 5000 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe namdoitntn.exe PID 3704 wrote to memory of 5000 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe namdoitntn.exe PID 3704 wrote to memory of 5048 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe real.exe PID 3704 wrote to memory of 5048 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe real.exe PID 3704 wrote to memory of 5048 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe real.exe PID 3704 wrote to memory of 5100 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe safert44.exe PID 3704 wrote to memory of 5100 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe safert44.exe PID 3704 wrote to memory of 5100 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe safert44.exe PID 3704 wrote to memory of 4216 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe tag.exe PID 3704 wrote to memory of 4216 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe tag.exe PID 3704 wrote to memory of 4216 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe tag.exe PID 3704 wrote to memory of 4476 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe jshainx.exe PID 3704 wrote to memory of 4476 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe jshainx.exe PID 3704 wrote to memory of 4476 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe jshainx.exe PID 3704 wrote to memory of 4700 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe ffnameedit.exe PID 3704 wrote to memory of 4700 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe ffnameedit.exe PID 3704 wrote to memory of 4700 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe ffnameedit.exe PID 3704 wrote to memory of 4832 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe rawxdev.exe PID 3704 wrote to memory of 4832 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe rawxdev.exe PID 3704 wrote to memory of 4832 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe rawxdev.exe PID 2728 wrote to memory of 2768 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 2768 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 2768 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 2768 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 3704 wrote to memory of 5020 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe me.exe PID 3704 wrote to memory of 5020 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe me.exe PID 3704 wrote to memory of 5020 3704 c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe me.exe PID 2728 wrote to memory of 3524 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 3524 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 3524 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 3524 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 4736 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 4736 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 4736 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 4736 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 4280 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 4280 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 4280 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 4280 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 4524 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 4524 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 4524 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 4524 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 4704 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 4704 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 4704 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2728 wrote to memory of 4704 2728 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe"C:\Users\Admin\AppData\Local\Temp\c33aec2527c88a003a6073ee31c1fec0cc3fea40b40f5b1170f67ea5c0838568.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exe"C:\Program Files (x86)\Company\NewProduct\F0geI.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\tag.exe"C:\Program Files (x86)\Company\NewProduct\tag.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\rawxdev.exe"C:\Program Files (x86)\Company\NewProduct\rawxdev.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\me.exe"C:\Program Files (x86)\Company\NewProduct\me.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe"C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\jshainx.exe"C:\Program Files (x86)\Company\NewProduct\jshainx.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\safert44.exe"C:\Program Files (x86)\Company\NewProduct\safert44.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\real.exe"C:\Program Files (x86)\Company\NewProduct\real.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5048 -s 12563⤵
- Program crash
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
339KB
MD5501e0f6fa90340e3d7ff26f276cd582e
SHA11bce4a6153f71719e786f8f612fbfcd23d3e130a
SHA256f07d918c6571f11abf9ab7268ac6e2ecbcd931c3d9d878895c777d15052aae2b
SHA512dee3aabfca7912f15b628253222cfe8d8e13cd64f0438e8d705b68b0a14b4c9523b7a207583be7b424e444d6b05f237484a0c38bf2e075d347ef937d409a3a69
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
339KB
MD5501e0f6fa90340e3d7ff26f276cd582e
SHA11bce4a6153f71719e786f8f612fbfcd23d3e130a
SHA256f07d918c6571f11abf9ab7268ac6e2ecbcd931c3d9d878895c777d15052aae2b
SHA512dee3aabfca7912f15b628253222cfe8d8e13cd64f0438e8d705b68b0a14b4c9523b7a207583be7b424e444d6b05f237484a0c38bf2e075d347ef937d409a3a69
-
C:\Program Files (x86)\Company\NewProduct\ffnameedit.exeFilesize
107KB
MD54bf892a854af9af2802f526837819f6e
SHA109f2e9938466e74a67368ecd613efdc57f80c30b
SHA256713eeb4e9271fe4b15160d900ad78498838bb33f7f97ad544a705ab2a46d97cf
SHA5127ef9d8cb4daf6be60c5a41439dab4e7384676b34de2341ac52cb33815645fbb51a4b78725ea97479d287a8d7a0a61b4b337b1ad49cce2a23c9192fd9b7678d44
-
C:\Program Files (x86)\Company\NewProduct\ffnameedit.exeFilesize
107KB
MD54bf892a854af9af2802f526837819f6e
SHA109f2e9938466e74a67368ecd613efdc57f80c30b
SHA256713eeb4e9271fe4b15160d900ad78498838bb33f7f97ad544a705ab2a46d97cf
SHA5127ef9d8cb4daf6be60c5a41439dab4e7384676b34de2341ac52cb33815645fbb51a4b78725ea97479d287a8d7a0a61b4b337b1ad49cce2a23c9192fd9b7678d44
-
C:\Program Files (x86)\Company\NewProduct\jshainx.exeFilesize
107KB
MD52647a5be31a41a39bf2497125018dbce
SHA1a1ac856b9d6556f5bb3370f0342914eb7cbb8840
SHA25684c7458316adf09943e459b4fb1aa79bd359ec1516e0ad947f44bdc6c0931665
SHA51268f70140af2ad71a40b6c884627047cdcbc92b4c6f851131e61dc9db3658bde99c1a09cad88c7c922aa5873ab6829cf4100dc12b75f237b2465e22770657ae26
-
C:\Program Files (x86)\Company\NewProduct\jshainx.exeFilesize
107KB
MD52647a5be31a41a39bf2497125018dbce
SHA1a1ac856b9d6556f5bb3370f0342914eb7cbb8840
SHA25684c7458316adf09943e459b4fb1aa79bd359ec1516e0ad947f44bdc6c0931665
SHA51268f70140af2ad71a40b6c884627047cdcbc92b4c6f851131e61dc9db3658bde99c1a09cad88c7c922aa5873ab6829cf4100dc12b75f237b2465e22770657ae26
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
491KB
MD5681d98300c552b8c470466d9e8328c8a
SHA1d15f4a432a2abce96ba9ba74443e566c1ffb933f
SHA2568bbc892aedc1424ca5c66677b465c826f867515a3fea28821d015edcee71c912
SHA512b909975d0212d5a5a0cb2e2809ee02224aac729cb761be97a8e3be4ee0a1d7470946da8cf725953c1b2d71fb5fc9dc3c26fd74bce5db5cc0e91a106f8bded887
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
491KB
MD5681d98300c552b8c470466d9e8328c8a
SHA1d15f4a432a2abce96ba9ba74443e566c1ffb933f
SHA2568bbc892aedc1424ca5c66677b465c826f867515a3fea28821d015edcee71c912
SHA512b909975d0212d5a5a0cb2e2809ee02224aac729cb761be97a8e3be4ee0a1d7470946da8cf725953c1b2d71fb5fc9dc3c26fd74bce5db5cc0e91a106f8bded887
-
C:\Program Files (x86)\Company\NewProduct\me.exeFilesize
286KB
MD529f986a025ca64b6e5fbc50fcefc8743
SHA14930311ffe1eac17a468c454d2ac37532b79c454
SHA256766033bd59297068c74324bfffca88887a4f02588bac347e277644011fb6b090
SHA5127af798f1480c18952597699189eff78d2ac638b40bffbc651954807b81d667207dd6d4ad073a787d40a423a15361d625f49b556109f998d2c56fa66d71c7268a
-
C:\Program Files (x86)\Company\NewProduct\me.exeFilesize
286KB
MD529f986a025ca64b6e5fbc50fcefc8743
SHA14930311ffe1eac17a468c454d2ac37532b79c454
SHA256766033bd59297068c74324bfffca88887a4f02588bac347e277644011fb6b090
SHA5127af798f1480c18952597699189eff78d2ac638b40bffbc651954807b81d667207dd6d4ad073a787d40a423a15361d625f49b556109f998d2c56fa66d71c7268a
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
107KB
MD5bbd8ea73b7626e0ca5b91d355df39b7f
SHA166e298653beb7f652eb44922010910ced6242879
SHA2561aa3fdc24e789b01a39944b85c99e4ac08864d2eae7530164cea2821acbf184e
SHA512625cc9c108b4660030be1282493700e5f0ccfb973f466f61254ed1e1a96f5f042cdeaa94607825a2f694647468e2f525a6451542fe3aac785ebac1ccfe39864f
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
107KB
MD5bbd8ea73b7626e0ca5b91d355df39b7f
SHA166e298653beb7f652eb44922010910ced6242879
SHA2561aa3fdc24e789b01a39944b85c99e4ac08864d2eae7530164cea2821acbf184e
SHA512625cc9c108b4660030be1282493700e5f0ccfb973f466f61254ed1e1a96f5f042cdeaa94607825a2f694647468e2f525a6451542fe3aac785ebac1ccfe39864f
-
C:\Program Files (x86)\Company\NewProduct\rawxdev.exeFilesize
287KB
MD5c1595ffe08cf9360cda3a95c2104d2d9
SHA17d2727bf305fd7ffcf4119f7d545b189135b06f6
SHA256dc55684473d7a957277eb4dc82deab4cadc83bd21f2c9a6c4b1b3f579cc1b7f3
SHA5128847577ecd6590fdc4dbd0447e8a990c8d8835e733106a3b910edf4ee4fbac4e1ca6b61468c8fdef83982e5bd347b21525dc605e6d596bb6f2ca940dab256619
-
C:\Program Files (x86)\Company\NewProduct\rawxdev.exeFilesize
287KB
MD5c1595ffe08cf9360cda3a95c2104d2d9
SHA17d2727bf305fd7ffcf4119f7d545b189135b06f6
SHA256dc55684473d7a957277eb4dc82deab4cadc83bd21f2c9a6c4b1b3f579cc1b7f3
SHA5128847577ecd6590fdc4dbd0447e8a990c8d8835e733106a3b910edf4ee4fbac4e1ca6b61468c8fdef83982e5bd347b21525dc605e6d596bb6f2ca940dab256619
-
C:\Program Files (x86)\Company\NewProduct\real.exeFilesize
286KB
MD58a370815d8a47020150efa559ffdf736
SHA1ba9d8df8f484b8da51161a0e29fd29e5001cff5d
SHA256975457ed5ae0174f06cc093d4f9edcf75d88118cbbac5a1e76ad7bc7c679cd58
SHA512d2eb60e220f64e76ebed2b051cc14f3a2da29707d8b2eb52fb41760800f11eafeb8bb3f1f8edcfca693a791aa60e56e263063f2b72abe4ad8784061feee6f7bf
-
C:\Program Files (x86)\Company\NewProduct\real.exeFilesize
286KB
MD58a370815d8a47020150efa559ffdf736
SHA1ba9d8df8f484b8da51161a0e29fd29e5001cff5d
SHA256975457ed5ae0174f06cc093d4f9edcf75d88118cbbac5a1e76ad7bc7c679cd58
SHA512d2eb60e220f64e76ebed2b051cc14f3a2da29707d8b2eb52fb41760800f11eafeb8bb3f1f8edcfca693a791aa60e56e263063f2b72abe4ad8784061feee6f7bf
-
C:\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
244KB
MD5dbe947674ea388b565ae135a09cc6638
SHA1ae8e1c69bd1035a92b7e06baad5e387de3a70572
SHA25686aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709
SHA51267441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893
-
C:\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
244KB
MD5dbe947674ea388b565ae135a09cc6638
SHA1ae8e1c69bd1035a92b7e06baad5e387de3a70572
SHA25686aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709
SHA51267441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893
-
C:\Program Files (x86)\Company\NewProduct\tag.exeFilesize
107KB
MD52ebc22860c7d9d308c018f0ffb5116ff
SHA178791a83f7161e58f9b7df45f9be618e9daea4cd
SHA2568e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89
SHA512d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e
-
C:\Program Files (x86)\Company\NewProduct\tag.exeFilesize
107KB
MD52ebc22860c7d9d308c018f0ffb5116ff
SHA178791a83f7161e58f9b7df45f9be618e9daea4cd
SHA2568e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89
SHA512d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\C8G5TKYW.cookieFilesize
340B
MD5462ff647add0aebbce29a153f5971012
SHA1dbe5c0e9a7921d370017e4bef4eec40bab890497
SHA256d6f0e3bb13fbe30061d5d131b9cb28c55c3267eec8219c2611225f74b7734af6
SHA51264b616a041b6c4a5fb7a338b97a832b15462ef259e1f159b500ffdb0d5bb38b723733e722ebfb10c7d5643ae970beffd9704daea38d9bd111214eba9b468261a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\I4L3Y4A9.cookieFilesize
508B
MD584958f8b91f1f13addf2be7aba6d24af
SHA136da7dfcc72e3bee7d0bf7136200d97c5a948c40
SHA256fe42cb6906bbf8fbc3718042f9cb1eda45f23607e0202ce2af707caad4aec413
SHA512843e5a72aada6279ea4d4b59404e40025f1df2968be599baa51a8f5d591cfeb9f95d39e8469fb0ffc4bf3f6d338bc25ba4075c3882902961491fd12e159479d4
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\K23GFP3G.cookieFilesize
424B
MD5fa87be04607bd6e3c8ed6b3fd036bef4
SHA1ef81fe29312939ae047c0a7de0d2696837d9b29b
SHA256e2681bdd0307a3a78b169fb8c6022776f4154883367a4f89a32918aeeb8140c0
SHA5124d545de9150768682e534746ff27cc81e6c72ad75408ea41593195517db31b0b8178b96a994b51457a5267260c5434374c2d91e804cd2f4677d07796d04031c4
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\O5G43R8C.cookieFilesize
592B
MD583c4b21a91a6672b049155399cb04ed0
SHA16e0f93720693e3d55799e9d7ddd32aabc7ab403c
SHA2563e867d84018b245805938201c95b35a2b554bd39de8514191f25bf5b312e49a2
SHA5121357ef302b9fd19411697659e57a6b772d2835a3363c2f0f30897705dee13d1954570984f015ceaf54a9a6d169e8b549e49283cb696a00477058749ffd0824b1
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\TQTXOJUQ.cookieFilesize
256B
MD52b5a7645e85f32c185ef2bb993bf2084
SHA15dcd6ce602dd9b23e7bdc80007f92bd1f02372ab
SHA256f0c21360a77665e45d3c832836f527b87400b70972e843ff9167c44f7ff64cf9
SHA512928881f4dab803f78f4f5adc07d77881a69498eb5831bf316330a3983faf9e55ccd6e7663a914fea6833a7dbf697cb8cabc5b2b42a1f0cdb593f97f2f85ea850
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\YTCKKLI6.cookieFilesize
172B
MD53c245ffa58ff7fbfd43e3330aee8e6b5
SHA1ac0607a3baf8ad65e88ad50d22674371574e1247
SHA256374bf47dcb927af9a6a342dda886367aa514e9abbcbecea5166900dad3fd197c
SHA51263c0038223f3f854090c14101539275e8f4d886f2035fd8e36068ba0537e6866d17ed7cc73cdaa4456e324a72c1c2602df06d163a1133841a2a352b721bf9c83
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751Filesize
717B
MD5ec8ff3b1ded0246437b1472c69dd1811
SHA1d813e874c2524e3a7da6c466c67854ad16800326
SHA256e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab
SHA512e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157Filesize
4KB
MD5f7dcb24540769805e5bb30d193944dce
SHA1e26c583c562293356794937d9e2e6155d15449ee
SHA2566b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea
SHA512cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157Filesize
4KB
MD5f7dcb24540769805e5bb30d193944dce
SHA1e26c583c562293356794937d9e2e6155d15449ee
SHA2566b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea
SHA512cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD56b9e0f6ee28a900a2397914d087da050
SHA1149d24d9863a2cef5944bc78a94f08c745dc4e1f
SHA256565e005d3d03c19e77cd786fe2ccdc254e73ac73b0e563ea3bd479053ab4efba
SHA51245aa6ffda820626bf5b8b76cd05cef50e6f114fc95f5ba90baa8395b4fd914bff52da357cac00ce0b07f17c36baf1fb9344bf845bfda49fb53d74dde1dcda9e9
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD56b9e0f6ee28a900a2397914d087da050
SHA1149d24d9863a2cef5944bc78a94f08c745dc4e1f
SHA256565e005d3d03c19e77cd786fe2ccdc254e73ac73b0e563ea3bd479053ab4efba
SHA51245aa6ffda820626bf5b8b76cd05cef50e6f114fc95f5ba90baa8395b4fd914bff52da357cac00ce0b07f17c36baf1fb9344bf845bfda49fb53d74dde1dcda9e9
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD503e9b826164c2428e230605083b6b683
SHA13e56d7a090e128eeb0e3571ab585d18d9d434c8c
SHA256cd6a791130c5f8ad65425aae434e22e958972df5e4efb9cd393bffa51a91ff2f
SHA512771b2d1307a6e49fbab084c2d939f55babdc4eca7370b806ed4422b07cf307898c7bf17da6993b118186acdd9ae3ca3f16ed1ed5e189acaa4d98f2592b7a20a9
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD530dafdbb3c94e06d004cf4de0ffa9b96
SHA1a05ce20f6f884e916256c5340c45ce4e29718042
SHA25609c29defece26f3c05e75e6a863d75329ab88e6df5a7432b3f2b73580f32474d
SHA512859fcad7c182d7edcf864da345b85785095e161e5cfe6cc7107363a4cd6223a2fc31dfad68b122640484d3b18ff9010e14cf137da36284384a80f98d8baa7705
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157Filesize
340B
MD51c354142b0f9d6911b80d54b96ca55d3
SHA124d27f49aea74ef20e28564543231e9b2f796243
SHA256efda432d32c93b830c764a2fd2ba17170427d7175389c16b1b73aa56e897b507
SHA5126acce239d236ce04f2415fd1b0aa4a9282ab70c8f3ad5fa362f76f4d5aec7f39a43312035e7c4b7c4c3bff50f726248280062a380140a1abba5ce3de141646b2
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157Filesize
340B
MD51c354142b0f9d6911b80d54b96ca55d3
SHA124d27f49aea74ef20e28564543231e9b2f796243
SHA256efda432d32c93b830c764a2fd2ba17170427d7175389c16b1b73aa56e897b507
SHA5126acce239d236ce04f2415fd1b0aa4a9282ab70c8f3ad5fa362f76f4d5aec7f39a43312035e7c4b7c4c3bff50f726248280062a380140a1abba5ce3de141646b2
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\Windows\3720402701\2219095117.priFilesize
207KB
MD5e2b88765ee31470114e866d939a8f2c6
SHA1e0a53b8511186ff308a0507b6304fb16cabd4e1f
SHA256523e419d2fa2e780239812d36caa37e92f8c3e6a5cd9f18f0d807c593effa45e
SHA512462e8e6b4e63fc6781b6a9935b332a1dc77bfb88e1de49134f86fd46bd1598d2e842902dd9415a328e325bd7cdee766bd9473f2695acdfa769ffe7ba9ae1953d
-
\Users\Admin\AppData\LocalLow\mozglue.dllFilesize
612KB
MD5f07d9977430e762b563eaadc2b94bbfa
SHA1da0a05b2b8d269fb73558dfcf0ed5c167f6d3877
SHA2564191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862
SHA5126afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf
-
\Users\Admin\AppData\LocalLow\nss3.dllFilesize
1.9MB
MD5f67d08e8c02574cbc2f1122c53bfb976
SHA16522992957e7e4d074947cad63189f308a80fcf2
SHA256c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e
SHA5122e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5
-
\Users\Admin\AppData\LocalLow\sqlite3.dllFilesize
1.0MB
MD5dbf4f8dcefb8056dc6bae4b67ff810ce
SHA1bbac1dd8a07c6069415c04b62747d794736d0689
SHA25647b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68
SHA512b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1
-
memory/3704-136-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-162-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-159-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-160-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-161-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-150-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-163-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-134-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-165-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-166-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-168-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-167-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-169-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-170-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-171-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-172-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-173-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-174-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-175-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-176-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-177-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-178-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-179-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-180-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-181-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-157-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-149-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-156-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-155-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-148-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-154-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-118-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-146-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-153-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-145-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-144-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-152-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-147-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-142-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-143-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-141-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-140-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-139-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-119-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-138-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-120-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-137-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-151-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-135-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-121-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-122-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-164-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-158-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-133-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-123-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-124-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-125-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-132-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-131-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-130-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-128-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-129-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-127-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/3704-126-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4216-665-0x0000000000890000-0x00000000008B0000-memory.dmpFilesize
128KB
-
memory/4216-348-0x0000000000000000-mapping.dmp
-
memory/4216-839-0x00000000051D0000-0x00000000052DA000-memory.dmpFilesize
1.0MB
-
memory/4216-975-0x0000000005430000-0x0000000005496000-memory.dmpFilesize
408KB
-
memory/4216-834-0x0000000005610000-0x0000000005C16000-memory.dmpFilesize
6.0MB
-
memory/4216-874-0x0000000005140000-0x000000000518B000-memory.dmpFilesize
300KB
-
memory/4476-676-0x0000000000CF0000-0x0000000000D10000-memory.dmpFilesize
128KB
-
memory/4476-856-0x0000000005560000-0x000000000559E000-memory.dmpFilesize
248KB
-
memory/4476-1026-0x0000000006F80000-0x0000000007142000-memory.dmpFilesize
1.8MB
-
memory/4476-979-0x0000000006570000-0x0000000006A6E000-memory.dmpFilesize
5.0MB
-
memory/4476-976-0x0000000005970000-0x0000000005A02000-memory.dmpFilesize
584KB
-
memory/4476-990-0x0000000006090000-0x00000000060AE000-memory.dmpFilesize
120KB
-
memory/4476-973-0x00000000058F0000-0x0000000005966000-memory.dmpFilesize
472KB
-
memory/4476-358-0x0000000000000000-mapping.dmp
-
memory/4476-1027-0x0000000007680000-0x0000000007BAC000-memory.dmpFilesize
5.2MB
-
memory/4476-837-0x0000000005500000-0x0000000005512000-memory.dmpFilesize
72KB
-
memory/4476-1033-0x0000000006EF0000-0x0000000006F40000-memory.dmpFilesize
320KB
-
memory/4700-368-0x0000000000000000-mapping.dmp
-
memory/4700-695-0x0000000000800000-0x0000000000820000-memory.dmpFilesize
128KB
-
memory/4832-379-0x0000000000000000-mapping.dmp
-
memory/4904-672-0x00000000006A0000-0x00000000006B0000-memory.dmpFilesize
64KB
-
memory/4904-662-0x000000000071A000-0x000000000072B000-memory.dmpFilesize
68KB
-
memory/4904-1055-0x000000000071A000-0x000000000072B000-memory.dmpFilesize
68KB
-
memory/4904-1056-0x0000000000400000-0x000000000046E000-memory.dmpFilesize
440KB
-
memory/4904-685-0x0000000000400000-0x000000000046E000-memory.dmpFilesize
440KB
-
memory/4904-956-0x000000000071A000-0x000000000072B000-memory.dmpFilesize
68KB
-
memory/4904-957-0x0000000000400000-0x000000000046E000-memory.dmpFilesize
440KB
-
memory/4904-322-0x0000000000000000-mapping.dmp
-
memory/4936-920-0x0000000002360000-0x0000000002372000-memory.dmpFilesize
72KB
-
memory/4936-325-0x0000000000000000-mapping.dmp
-
memory/4936-924-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/4936-928-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/5000-327-0x0000000000000000-mapping.dmp
-
memory/5000-643-0x00000000003B0000-0x00000000003D0000-memory.dmpFilesize
128KB
-
memory/5020-390-0x0000000000000000-mapping.dmp
-
memory/5048-333-0x0000000000000000-mapping.dmp
-
memory/5100-747-0x0000000002C60000-0x0000000002C66000-memory.dmpFilesize
24KB
-
memory/5100-339-0x0000000000000000-mapping.dmp
-
memory/5100-663-0x00000000007F0000-0x0000000000834000-memory.dmpFilesize
272KB