Analysis
-
max time kernel
299s -
max time network
290s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
13-08-2022 04:46
Static task
static1
Behavioral task
behavioral1
Sample
be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe
Resource
win10-20220812-en
General
-
Target
be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe
-
Size
1.3MB
-
MD5
c0ea08a163298e0493d9cb9d9f6881d1
-
SHA1
bb69cd93645a2cb1a0629fbfe5314d6774c31f0d
-
SHA256
be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0
-
SHA512
38518baaba5372f97ac22ed3576fd50c63a883480195b2bc4d480f036bf5850a4dfd232a248043fb8b50c89eb6d3b69eeb07361341e259b596e93a97f0077291
Malware Config
Extracted
raccoon
315dc1dd84dd7b872ce61c63b12c8944
http://146.19.247.91/
Extracted
redline
4
31.41.244.134:11643
-
auth_value
a516b2d034ecd34338f12b50347fbd92
Extracted
redline
nam3
103.89.90.61:18728
-
auth_value
64b900120bbceaa6a9c60e9079492895
Extracted
redline
https://t.me/insttailer
185.199.224.90:37143
-
auth_value
1e73e022970e3ad55c62cb5010e7599b
Extracted
redline
@tag12312341
62.204.41.144:14096
-
auth_value
71466795417275fac01979e57016e277
Extracted
redline
5076357887
185.87.149.167:31402
-
auth_value
0dfaff60271d374d0c206d19883e06f3
Extracted
raccoon
27f434caa92497d1b6f4b36154ae9141
http://45.182.189.196/
Extracted
privateloader
http://163.123.143.4/proxies.txt
http://193.233.177.215/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
163.123.143.12
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Raccoon Stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2780-482-0x00000000001D0000-0x00000000001DE000-memory.dmp family_raccoon behavioral2/memory/2780-484-0x0000000000400000-0x0000000000454000-memory.dmp family_raccoon behavioral2/memory/5216-935-0x0000000002370000-0x0000000002385000-memory.dmp family_raccoon behavioral2/memory/5216-943-0x0000000000400000-0x0000000000522000-memory.dmp family_raccoon -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 16 IoCs
Processes:
resource yara_rule C:\Program Files (x86)\Company\NewProduct\safert44.exe family_redline C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe family_redline C:\Program Files (x86)\Company\NewProduct\tag.exe family_redline C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline C:\Program Files (x86)\Company\NewProduct\safert44.exe family_redline C:\Program Files (x86)\Company\NewProduct\tag.exe family_redline C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe family_redline behavioral2/memory/6112-774-0x0000000000ED0000-0x0000000000F14000-memory.dmp family_redline behavioral2/memory/5156-780-0x00000000002C0000-0x00000000002E0000-memory.dmp family_redline behavioral2/memory/5268-794-0x0000000000070000-0x00000000000A0000-memory.dmp family_redline behavioral2/memory/5144-776-0x0000000000680000-0x00000000006C4000-memory.dmp family_redline C:\Program Files (x86)\Company\NewProduct\jshainx.exe family_redline C:\Program Files (x86)\Company\NewProduct\jshainx.exe family_redline behavioral2/memory/5692-1053-0x0000000000BB0000-0x0000000000BD0000-memory.dmp family_redline -
Executes dropped EXE 12 IoCs
Processes:
real.exeF0geI.exenamdoitntn.exeromb_ro.exesafert44.exetag.exekukurzka9000.exeffnameedit.exenamdoitntn.exeg3rgg.exejshainx.exeme.exepid process 1520 real.exe 2780 F0geI.exe 6112 namdoitntn.exe 6140 romb_ro.exe 5144 safert44.exe 5156 tag.exe 5216 kukurzka9000.exe 5268 ffnameedit.exe 5308 namdoitntn.exe 5956 g3rgg.exe 5692 jshainx.exe 5388 me.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 11 IoCs
Processes:
be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exedescription ioc process File opened for modification C:\Program Files (x86)\Company\NewProduct\real.exe be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\safert44.exe be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\g3rgg.exe be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\jshainx.exe be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\F0geI.exe be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\romb_ro.exe be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\tag.exe be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\me.exe be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe -
Drops file in Windows directory 12 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5588 1520 WerFault.exe real.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
real.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 real.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString real.exe -
Processes:
MicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\MigrationTime = 03bc80556daed801 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\FirstRecoveryTime = 03bc80556daed801 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 94e2827ce0aed801 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\CRLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\FontSize = "3" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\ACGPolicyState = "6" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Extensible Cache MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$MediaWiki MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\FlipAheadCompletedVersion = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main\OperationalData = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 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 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 010000003c77ac3d0e29817c8e1fb85401182449c49a1d0382ce28a43bff0f561109703b84177f2b356874860e021d912fdc8f22bab3fc817d65d9681b090d62 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = df9bd97be0aed801 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$Discuz! MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\AllComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 487ff97ae0aed801 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = fb059e7be0aed801 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\NextBrowserDataLogTime = 605ceadf12afd801 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\AllComplete = "1" MicrosoftEdge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
real.exepid process 1520 real.exe 1520 real.exe -
Suspicious behavior: MapViewOfSection 10 IoCs
Processes:
MicrosoftEdgeCP.exepid process 4336 MicrosoftEdgeCP.exe 4336 MicrosoftEdgeCP.exe 4336 MicrosoftEdgeCP.exe 4336 MicrosoftEdgeCP.exe 4336 MicrosoftEdgeCP.exe 4336 MicrosoftEdgeCP.exe 4336 MicrosoftEdgeCP.exe 4336 MicrosoftEdgeCP.exe 4336 MicrosoftEdgeCP.exe 4336 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription pid process Token: SeDebugPrivilege 1572 MicrosoftEdge.exe Token: SeDebugPrivilege 1572 MicrosoftEdge.exe Token: SeDebugPrivilege 1572 MicrosoftEdge.exe Token: SeDebugPrivilege 1572 MicrosoftEdge.exe Token: SeDebugPrivilege 4940 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4940 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4940 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4940 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 5820 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 5820 MicrosoftEdgeCP.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exepid process 1572 MicrosoftEdge.exe 4336 MicrosoftEdgeCP.exe 4336 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exeMicrosoftEdgeCP.exedescription pid process target process PID 3500 wrote to memory of 1520 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe real.exe PID 3500 wrote to memory of 1520 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe real.exe PID 3500 wrote to memory of 1520 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe real.exe PID 3500 wrote to memory of 2780 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe F0geI.exe PID 3500 wrote to memory of 2780 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe F0geI.exe PID 3500 wrote to memory of 2780 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe F0geI.exe PID 4336 wrote to memory of 312 4336 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4336 wrote to memory of 312 4336 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4336 wrote to memory of 312 4336 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4336 wrote to memory of 312 4336 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4336 wrote to memory of 4556 4336 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4336 wrote to memory of 3840 4336 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4336 wrote to memory of 4556 4336 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4336 wrote to memory of 3840 4336 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4336 wrote to memory of 4556 4336 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4336 wrote to memory of 3840 4336 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4336 wrote to memory of 4556 4336 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4336 wrote to memory of 3840 4336 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4336 wrote to memory of 4376 4336 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4336 wrote to memory of 4376 4336 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4336 wrote to memory of 4376 4336 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4336 wrote to memory of 4376 4336 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4336 wrote to memory of 4780 4336 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4336 wrote to memory of 4780 4336 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4336 wrote to memory of 4780 4336 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4336 wrote to memory of 4780 4336 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 3500 wrote to memory of 6112 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe namdoitntn.exe PID 3500 wrote to memory of 6112 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe namdoitntn.exe PID 3500 wrote to memory of 6112 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe namdoitntn.exe PID 3500 wrote to memory of 6140 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe romb_ro.exe PID 3500 wrote to memory of 6140 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe romb_ro.exe PID 3500 wrote to memory of 6140 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe romb_ro.exe PID 3500 wrote to memory of 5144 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe safert44.exe PID 3500 wrote to memory of 5144 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe safert44.exe PID 3500 wrote to memory of 5144 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe safert44.exe PID 3500 wrote to memory of 5156 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe tag.exe PID 3500 wrote to memory of 5156 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe tag.exe PID 3500 wrote to memory of 5156 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe tag.exe PID 3500 wrote to memory of 5216 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe kukurzka9000.exe PID 3500 wrote to memory of 5216 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe kukurzka9000.exe PID 3500 wrote to memory of 5216 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe kukurzka9000.exe PID 3500 wrote to memory of 5268 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe ffnameedit.exe PID 3500 wrote to memory of 5268 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe ffnameedit.exe PID 3500 wrote to memory of 5268 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe ffnameedit.exe PID 3500 wrote to memory of 5308 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe namdoitntn.exe PID 3500 wrote to memory of 5308 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe namdoitntn.exe PID 3500 wrote to memory of 5308 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe namdoitntn.exe PID 3500 wrote to memory of 5956 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe g3rgg.exe PID 3500 wrote to memory of 5956 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe g3rgg.exe PID 3500 wrote to memory of 5956 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe g3rgg.exe PID 3500 wrote to memory of 5692 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe jshainx.exe PID 3500 wrote to memory of 5692 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe jshainx.exe PID 3500 wrote to memory of 5692 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe jshainx.exe PID 3500 wrote to memory of 5388 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe me.exe PID 3500 wrote to memory of 5388 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe me.exe PID 3500 wrote to memory of 5388 3500 be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe me.exe PID 4336 wrote to memory of 2712 4336 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4336 wrote to memory of 2712 4336 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4336 wrote to memory of 2712 4336 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4336 wrote to memory of 2712 4336 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe"C:\Users\Admin\AppData\Local\Temp\be999ae161fe785ae48c92bb141597bef0aa748f4180b8c67134efe512454bc0.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Company\NewProduct\real.exe"C:\Program Files (x86)\Company\NewProduct\real.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 12523⤵
- Program crash
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exe"C:\Program Files (x86)\Company\NewProduct\F0geI.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\romb_ro.exe"C:\Program Files (x86)\Company\NewProduct\romb_ro.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\safert44.exe"C:\Program Files (x86)\Company\NewProduct\safert44.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\tag.exe"C:\Program Files (x86)\Company\NewProduct\tag.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe"C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\g3rgg.exe"C:\Program Files (x86)\Company\NewProduct\g3rgg.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\jshainx.exe"C:\Program Files (x86)\Company\NewProduct\jshainx.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\me.exe"C:\Program Files (x86)\Company\NewProduct\me.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
290KB
MD58ab8fc20b7ab8b18bf0f474cc0156523
SHA121b922f6dcd49b67b5b3abc9603ec90835e7a20d
SHA256b8849a951aadc7c35e1d1b8c57064b49a5eddf54928419b21f18584263162fca
SHA512ab1ffba707911c50b2ac609c0736560ad2a37dd71f87597af5a87eae3c1811309f3973ecfc0b68cb5d234dd374d771e55637bd84748291758f932dc088def9d2
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
290KB
MD58ab8fc20b7ab8b18bf0f474cc0156523
SHA121b922f6dcd49b67b5b3abc9603ec90835e7a20d
SHA256b8849a951aadc7c35e1d1b8c57064b49a5eddf54928419b21f18584263162fca
SHA512ab1ffba707911c50b2ac609c0736560ad2a37dd71f87597af5a87eae3c1811309f3973ecfc0b68cb5d234dd374d771e55637bd84748291758f932dc088def9d2
-
C:\Program Files (x86)\Company\NewProduct\ffnameedit.exeFilesize
173KB
MD5c5acc7e661db592ec6208d6147d5b165
SHA1642f9ab10434a77ed016921401c9361b1bb36639
SHA25698169ab9ee35cdca15321683fe25378988a02350c9c09236d022c1202714fa4d
SHA51292f06ee866222d47496d43ac4228e43aad2886c1a6195015d6ffa40f95fef2f803f2754e4efe620fde60808cb55a42e5c9a294098718d63f419a2e282d912161
-
C:\Program Files (x86)\Company\NewProduct\ffnameedit.exeFilesize
173KB
MD5c5acc7e661db592ec6208d6147d5b165
SHA1642f9ab10434a77ed016921401c9361b1bb36639
SHA25698169ab9ee35cdca15321683fe25378988a02350c9c09236d022c1202714fa4d
SHA51292f06ee866222d47496d43ac4228e43aad2886c1a6195015d6ffa40f95fef2f803f2754e4efe620fde60808cb55a42e5c9a294098718d63f419a2e282d912161
-
C:\Program Files (x86)\Company\NewProduct\g3rgg.exeFilesize
386KB
MD559be2ebcf6516dd07ee5df8eae402523
SHA1e4e5b949a0c9721e4c89f124750d8a97e4d96c7e
SHA256d2952be5c81f4135c0953b7b36677704f24f4d780de268ce6b67a44a6f15419a
SHA5129148e9a303a3562f9552da8fa6cdd3c1d4034be31d20968a8dc51904c0d4cf167c0cdfa0d6ceac0ec0a24a975b8c04de9a1d4d67f0056dce810ad4e5b83215d2
-
C:\Program Files (x86)\Company\NewProduct\g3rgg.exeFilesize
386KB
MD559be2ebcf6516dd07ee5df8eae402523
SHA1e4e5b949a0c9721e4c89f124750d8a97e4d96c7e
SHA256d2952be5c81f4135c0953b7b36677704f24f4d780de268ce6b67a44a6f15419a
SHA5129148e9a303a3562f9552da8fa6cdd3c1d4034be31d20968a8dc51904c0d4cf167c0cdfa0d6ceac0ec0a24a975b8c04de9a1d4d67f0056dce810ad4e5b83215d2
-
C:\Program Files (x86)\Company\NewProduct\jshainx.exeFilesize
107KB
MD5b754a7159fff494383d9e7de4709aa53
SHA1a25f172b4ed0b0a567594ad693483c821f2af14d
SHA2564eaae9daa081304d9281c56bc508ebdb5b83f7d717784da04a08d934304f06f4
SHA512ec244aa45a717c7374d564930a48b9b2eb151fbf2643711a9658dbb4df830d60651179a652f9281b1f56f1490e6796fb8e0ecb8fb5167fb6921f424549dddb33
-
C:\Program Files (x86)\Company\NewProduct\jshainx.exeFilesize
107KB
MD5b754a7159fff494383d9e7de4709aa53
SHA1a25f172b4ed0b0a567594ad693483c821f2af14d
SHA2564eaae9daa081304d9281c56bc508ebdb5b83f7d717784da04a08d934304f06f4
SHA512ec244aa45a717c7374d564930a48b9b2eb151fbf2643711a9658dbb4df830d60651179a652f9281b1f56f1490e6796fb8e0ecb8fb5167fb6921f424549dddb33
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
1.1MB
MD5b0d7a19c257498a2ddf4ff73a9b6fbcf
SHA107233b967c956c3cfd5498c2db6a2251769704ff
SHA25645bb46dc46d924cba64dfb24d80656a9e11c0d83d506431c86ddc58e3487b1f3
SHA51260ed892b712b69befb78138cc096a6cb17d367cd1a2e6ab9010d485d9e583aff226aff67cf23d04170bbbd679652ed03ec72cdd67507db8450dab3fc9ecd7147
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
1.1MB
MD5b0d7a19c257498a2ddf4ff73a9b6fbcf
SHA107233b967c956c3cfd5498c2db6a2251769704ff
SHA25645bb46dc46d924cba64dfb24d80656a9e11c0d83d506431c86ddc58e3487b1f3
SHA51260ed892b712b69befb78138cc096a6cb17d367cd1a2e6ab9010d485d9e583aff226aff67cf23d04170bbbd679652ed03ec72cdd67507db8450dab3fc9ecd7147
-
C:\Program Files (x86)\Company\NewProduct\me.exeFilesize
289KB
MD5ba9d6ca5408c517da107fd4ee6cec610
SHA1cbf27fb8cca2aadc5378fd4f01a32178df222bfd
SHA256b8d34c685e42f7db3219a45d06ff76fce32db0c62b7f87987a834fc79046f834
SHA512b402eca0bf73bf3e2090042d5498aec6c1d85b5a8b712a4b01c7c6ea3ffb91b61ea0f848881704d71f3fcf3b2d7fb02485852b90cf3c5fb484921e580675ca3e
-
C:\Program Files (x86)\Company\NewProduct\me.exeFilesize
289KB
MD5ba9d6ca5408c517da107fd4ee6cec610
SHA1cbf27fb8cca2aadc5378fd4f01a32178df222bfd
SHA256b8d34c685e42f7db3219a45d06ff76fce32db0c62b7f87987a834fc79046f834
SHA512b402eca0bf73bf3e2090042d5498aec6c1d85b5a8b712a4b01c7c6ea3ffb91b61ea0f848881704d71f3fcf3b2d7fb02485852b90cf3c5fb484921e580675ca3e
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
245KB
MD5b16134159e66a72fb36d93bc703b4188
SHA1e869e91a2b0f77e7ac817e0b30a9a23d537b3001
SHA256b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c
SHA5123fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
245KB
MD5b16134159e66a72fb36d93bc703b4188
SHA1e869e91a2b0f77e7ac817e0b30a9a23d537b3001
SHA256b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c
SHA5123fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
245KB
MD5b16134159e66a72fb36d93bc703b4188
SHA1e869e91a2b0f77e7ac817e0b30a9a23d537b3001
SHA256b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c
SHA5123fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c
-
C:\Program Files (x86)\Company\NewProduct\real.exeFilesize
289KB
MD5c334f2f742fc8f7c13dfa2a01da3f46a
SHA1d020819927da87bc5499df52e12dc5211a09ef61
SHA25692e9d7c3e28e78b7702d1de113e7b1ffbd6fe1447159e1982e0158aafe5e75cb
SHA51243deb443af74f5086d58d7d79af0407c2c6ef94ed338dfd2311dd595388143929a1ad8550b60d30a54e13207a3c95fa26be6fad773f191a56ca845c1055b5156
-
C:\Program Files (x86)\Company\NewProduct\real.exeFilesize
289KB
MD5c334f2f742fc8f7c13dfa2a01da3f46a
SHA1d020819927da87bc5499df52e12dc5211a09ef61
SHA25692e9d7c3e28e78b7702d1de113e7b1ffbd6fe1447159e1982e0158aafe5e75cb
SHA51243deb443af74f5086d58d7d79af0407c2c6ef94ed338dfd2311dd595388143929a1ad8550b60d30a54e13207a3c95fa26be6fad773f191a56ca845c1055b5156
-
C:\Program Files (x86)\Company\NewProduct\romb_ro.exeFilesize
289KB
MD5e699a82cef03ea485495a78f74af733d
SHA1c5d3719a8a05f27e4f733294b8b89838f204fc64
SHA256206104c8b944adca4068bf6d7c89fb28c68884f63d013f7dd0f67270a8220b97
SHA512887c81ef11f4c4b5d4e135e9b6d740ce1cbfce873302c0ef80ae636492ff53a763b4ea7ad961c2bbc8b967de7a78e3ac8d3965acb679fbf69dd396466c0950a0
-
C:\Program Files (x86)\Company\NewProduct\romb_ro.exeFilesize
289KB
MD5e699a82cef03ea485495a78f74af733d
SHA1c5d3719a8a05f27e4f733294b8b89838f204fc64
SHA256206104c8b944adca4068bf6d7c89fb28c68884f63d013f7dd0f67270a8220b97
SHA512887c81ef11f4c4b5d4e135e9b6d740ce1cbfce873302c0ef80ae636492ff53a763b4ea7ad961c2bbc8b967de7a78e3ac8d3965acb679fbf69dd396466c0950a0
-
C:\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
244KB
MD5dbe947674ea388b565ae135a09cc6638
SHA1ae8e1c69bd1035a92b7e06baad5e387de3a70572
SHA25686aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709
SHA51267441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893
-
C:\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
244KB
MD5dbe947674ea388b565ae135a09cc6638
SHA1ae8e1c69bd1035a92b7e06baad5e387de3a70572
SHA25686aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709
SHA51267441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893
-
C:\Program Files (x86)\Company\NewProduct\tag.exeFilesize
107KB
MD52ebc22860c7d9d308c018f0ffb5116ff
SHA178791a83f7161e58f9b7df45f9be618e9daea4cd
SHA2568e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89
SHA512d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e
-
C:\Program Files (x86)\Company\NewProduct\tag.exeFilesize
107KB
MD52ebc22860c7d9d308c018f0ffb5116ff
SHA178791a83f7161e58f9b7df45f9be618e9daea4cd
SHA2568e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89
SHA512d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\03QQC1QW.cookieFilesize
424B
MD5ecfd9e293a1fc7898dbdff03c4a4588a
SHA1f7565ce61fe868a445e66ed1ccc373f579af1a48
SHA2567714847df207531820ea057724bb96ba0b1dc634836d64e6e7bfe60d28f471da
SHA512b93ce7193e074782951a7a659a3622a04959d3cbf250edc452a84c80cfcbc9289b904d6ba9795cc8921bb584458f043833f2e5afff84b0e6844a13917a309404
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\1FCV01M4.cookieFilesize
676B
MD52e022eb0540ef0e0151acc8b11d8b903
SHA166e32872ff237b83b762090a30eb88aa59300f2c
SHA2568d093384fd9ce0330c29a1519e03c54e92bc8e0505131d7606ed37004d4824dd
SHA51240d43f6472bb282cbdd44e2a3a51906f223ad5bdd3dd2eb1eaedba912e1a1e50756e44e0c4d098913b3ac4ef13ed39027da5fa4033328d8b7e30bb41b3c2437b
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\3T2PS35A.cookieFilesize
592B
MD5607fafe96c9d1b89a3e131748f068e55
SHA17d60d0a6a8687203fee06ba31491f32b328b79e8
SHA25667de4ae6ee4584fc8f6e19183624de409503252a2dfcfb9408e34673cde676fb
SHA51268e9720d8ab7c08ab88cfb7bb956d23271a494cad4cbe36c18fdc873cdf7bdba3c0400fa79edc6dacfeb84a105f02cd7d053832e8ac25747aa0040c5149658b4
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\4H84RXWP.cookieFilesize
172B
MD536a92c84612dda847c2f59a8810b2dba
SHA1f013e92d5bfd541ee07d56ee3807ba42c9437ccc
SHA256190313b55936f7f863d3e1a0c650f24d78f5892f4b4fabf766fdf8f60b90633c
SHA5124a296b20b86d9517e3e5fae74857f554437bf035d1a31b4f412199ea74ac4ef7a0efab6d105bec962480b74ea2ee3153d10f505ee49564ca8e29c8ab959c1f52
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\DF0AF5VZ.cookieFilesize
760B
MD545c8ebbdf19f82f84b97a91b412d8304
SHA14bb9a79d4dc588b5929c94c41c8ec970d07a7f19
SHA2567ad7d3bed8b923a8ce629902e883c60b7ebde81415f936ce7fe6f11f4bd23b71
SHA512b69b7087af058a428df06cdee48e9f39b06c566e6665c28bbb9234942243e9ec69768018934cfc22e09d98c3e383e85e38815cbd9e36727debe0202d076b9587
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\GRFRHCOJ.cookieFilesize
844B
MD5c5eee63dc376f65aa3608eb5d888582d
SHA163fcba7de2a4243b07c7c95eae4b59c1fffef415
SHA256272515582dcb1bebff83c0cfc676aec4f30dbb02b5d308a2641651b32e637620
SHA5123361b80a27c191e5115c4aca2020427fa8b2d9a726b2fcd41b5df8a0c4716709687f06cf47fc0cb3c9ed313fc9674b92f5453b70c6a5a367ab2262608f0c7152
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\MZKOAOLE.cookieFilesize
256B
MD561f199bd4a655845a62b876a00da1b7a
SHA15f3fbc8281d79f042c9e7b50ebd9dd0b7050d7bc
SHA256a73b7def756365098e1e3d47be3800a72751900cca022c6c02640d64c2f96768
SHA5125057b6a48f22b4dd012cd50169b4fa9b98f9482984df85beb6529bed37f9672714ae4eb4f8f7e32f80876b7b486af3443b82e7829809edc4a33dc7645ebb19e8
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\S9M315FC.cookieFilesize
340B
MD58e2feca72f4f0ce32f703a279febd0f5
SHA1000750e8ea5ba7f7b6d42a9e3417c4ad5b53d708
SHA256602a3288dcac2779ba325c7c43c078ca44c9dde475b95678aaf2c53ed2ee57d0
SHA512f3ef27683c3484120d2c1f6f9fbfd3b1abdd2337bc74c3ab0e9a7e09bad523cdfa3278d555e5082837b30b346e06985f80ae5fb26e82b85d75bcc9ed8931cd4d
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\YTQTMCLV.cookieFilesize
508B
MD5b68c9083f19147d5abd944337911b880
SHA15bc28ba727095ff22c3c55290375ee062cefd3e3
SHA2561d62c3518de4dfbb4be0ed4a02a9dc004f9f6f4e7783152b817796005c7aae3f
SHA51253ca2333b6687d20dfbc9171b75ed9ef1ae1fb5471e1bf60e6714b7595885d7c32b3f49ba058e84fd673b8e9f506fa4f3d9c257135d3367b85f648bb196e6613
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\ZEERMN32.cookieFilesize
172B
MD5832e6caf10892cc74da28ce5f76a84a0
SHA1b6d654cbd19b5c76f7ba34cffaa1efed881e9621
SHA2569e4c8cd5d10e73cc15b769bee103c4c323888afaf26fc5da12426e93f769ff79
SHA512433ebf56a17a85843aa1c78e105c7c0c0e1e967b6730ac270a9f858dbf924d5182f3f4347ac601a1f25d2e33abc6f48c88c9d45791e6a45bd600fd5872cc4e9f
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751Filesize
717B
MD5ec8ff3b1ded0246437b1472c69dd1811
SHA1d813e874c2524e3a7da6c466c67854ad16800326
SHA256e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab
SHA512e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751Filesize
717B
MD5ec8ff3b1ded0246437b1472c69dd1811
SHA1d813e874c2524e3a7da6c466c67854ad16800326
SHA256e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab
SHA512e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751Filesize
717B
MD5ec8ff3b1ded0246437b1472c69dd1811
SHA1d813e874c2524e3a7da6c466c67854ad16800326
SHA256e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab
SHA512e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751Filesize
717B
MD5ec8ff3b1ded0246437b1472c69dd1811
SHA1d813e874c2524e3a7da6c466c67854ad16800326
SHA256e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab
SHA512e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751Filesize
717B
MD5ec8ff3b1ded0246437b1472c69dd1811
SHA1d813e874c2524e3a7da6c466c67854ad16800326
SHA256e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab
SHA512e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD5ed325583eb7b4ccd2b0cefd7e1086b8f
SHA1d5d7b7579e2ea7791f0b4aac622ef01f0a6bef42
SHA2561ed4a94330578acf9a0836a3f995edc29d10173b56fa230a68e7457e089362c9
SHA512f28986b313b97e92ab0432676617fbeeb918dbf13f3959448ac90c67b89a109765dff3382c82ea758feffa5d464276c060c84be482c7c52dd1b4aeeb0f1d26bb
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD5ed325583eb7b4ccd2b0cefd7e1086b8f
SHA1d5d7b7579e2ea7791f0b4aac622ef01f0a6bef42
SHA2561ed4a94330578acf9a0836a3f995edc29d10173b56fa230a68e7457e089362c9
SHA512f28986b313b97e92ab0432676617fbeeb918dbf13f3959448ac90c67b89a109765dff3382c82ea758feffa5d464276c060c84be482c7c52dd1b4aeeb0f1d26bb
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD5ed325583eb7b4ccd2b0cefd7e1086b8f
SHA1d5d7b7579e2ea7791f0b4aac622ef01f0a6bef42
SHA2561ed4a94330578acf9a0836a3f995edc29d10173b56fa230a68e7457e089362c9
SHA512f28986b313b97e92ab0432676617fbeeb918dbf13f3959448ac90c67b89a109765dff3382c82ea758feffa5d464276c060c84be482c7c52dd1b4aeeb0f1d26bb
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD5ed325583eb7b4ccd2b0cefd7e1086b8f
SHA1d5d7b7579e2ea7791f0b4aac622ef01f0a6bef42
SHA2561ed4a94330578acf9a0836a3f995edc29d10173b56fa230a68e7457e089362c9
SHA512f28986b313b97e92ab0432676617fbeeb918dbf13f3959448ac90c67b89a109765dff3382c82ea758feffa5d464276c060c84be482c7c52dd1b4aeeb0f1d26bb
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD5ed325583eb7b4ccd2b0cefd7e1086b8f
SHA1d5d7b7579e2ea7791f0b4aac622ef01f0a6bef42
SHA2561ed4a94330578acf9a0836a3f995edc29d10173b56fa230a68e7457e089362c9
SHA512f28986b313b97e92ab0432676617fbeeb918dbf13f3959448ac90c67b89a109765dff3382c82ea758feffa5d464276c060c84be482c7c52dd1b4aeeb0f1d26bb
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD5ed325583eb7b4ccd2b0cefd7e1086b8f
SHA1d5d7b7579e2ea7791f0b4aac622ef01f0a6bef42
SHA2561ed4a94330578acf9a0836a3f995edc29d10173b56fa230a68e7457e089362c9
SHA512f28986b313b97e92ab0432676617fbeeb918dbf13f3959448ac90c67b89a109765dff3382c82ea758feffa5d464276c060c84be482c7c52dd1b4aeeb0f1d26bb
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD5ed325583eb7b4ccd2b0cefd7e1086b8f
SHA1d5d7b7579e2ea7791f0b4aac622ef01f0a6bef42
SHA2561ed4a94330578acf9a0836a3f995edc29d10173b56fa230a68e7457e089362c9
SHA512f28986b313b97e92ab0432676617fbeeb918dbf13f3959448ac90c67b89a109765dff3382c82ea758feffa5d464276c060c84be482c7c52dd1b4aeeb0f1d26bb
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD5b238bf22e1594b3843c696b5ab895457
SHA152a42c450d8fb8337c29bddc04d79229b0388a9e
SHA256f2306c3bb10685af3e720c73b2c33ba91288428333aeab4a95724d1f1cba5f98
SHA5120d5a0eaceb72847a1e6719b4cdfa10ca8d3f1e96f602b24dbd1c04fcd9012d37cb89d8379c01e94783aa071a2fb0a02c693c014dfcff423dc7a2f11d1253d70a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD5d3ba6b5ebc67d1ce5708cf92e75befca
SHA1ca9d4c8a0b5a850984007bc69c71a230f87e4016
SHA2567219de9401be3ee4b2857d0fe12ce436fcf3053297b373edb6ce150ae63731f5
SHA51262b2372dfddf8133f2e4c35668688159203199b0988e6d88d9ec793946897bdb07a33789dc14f9742740374ec1a8048fc0861b3cd9ea6430e11d00e34e5f7d20
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\Windows\3720402701\2219095117.priFilesize
207KB
MD5e2b88765ee31470114e866d939a8f2c6
SHA1e0a53b8511186ff308a0507b6304fb16cabd4e1f
SHA256523e419d2fa2e780239812d36caa37e92f8c3e6a5cd9f18f0d807c593effa45e
SHA512462e8e6b4e63fc6781b6a9935b332a1dc77bfb88e1de49134f86fd46bd1598d2e842902dd9415a328e325bd7cdee766bd9473f2695acdfa769ffe7ba9ae1953d
-
memory/1520-345-0x0000000000000000-mapping.dmp
-
memory/2780-542-0x00000000005E8000-0x00000000005F9000-memory.dmpFilesize
68KB
-
memory/2780-484-0x0000000000400000-0x0000000000454000-memory.dmpFilesize
336KB
-
memory/2780-348-0x0000000000000000-mapping.dmp
-
memory/2780-482-0x00000000001D0000-0x00000000001DE000-memory.dmpFilesize
56KB
-
memory/2780-481-0x00000000005E8000-0x00000000005F9000-memory.dmpFilesize
68KB
-
memory/3500-152-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-147-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-171-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-172-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-173-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-174-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-175-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-176-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-177-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-178-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-169-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-153-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-133-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-168-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-137-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-141-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-144-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-167-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-166-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-164-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-146-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-115-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-165-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-163-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-162-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-161-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-160-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-148-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-150-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-151-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-149-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-122-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-145-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-143-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-159-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-142-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-158-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-157-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-156-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-140-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-116-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-155-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-117-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-139-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-138-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-118-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-119-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-136-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-170-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-120-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-121-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-135-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-134-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-132-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-130-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-131-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-129-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-128-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-154-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-127-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-126-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-125-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-124-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/3500-123-0x00000000776C0000-0x000000007784E000-memory.dmpFilesize
1.6MB
-
memory/5144-776-0x0000000000680000-0x00000000006C4000-memory.dmpFilesize
272KB
-
memory/5144-839-0x0000000001010000-0x0000000001016000-memory.dmpFilesize
24KB
-
memory/5144-493-0x0000000000000000-mapping.dmp
-
memory/5156-983-0x0000000002730000-0x000000000277B000-memory.dmpFilesize
300KB
-
memory/5156-930-0x0000000002690000-0x00000000026A2000-memory.dmpFilesize
72KB
-
memory/5156-497-0x0000000000000000-mapping.dmp
-
memory/5156-938-0x0000000004CE0000-0x0000000004DEA000-memory.dmpFilesize
1.0MB
-
memory/5156-964-0x00000000026F0000-0x000000000272E000-memory.dmpFilesize
248KB
-
memory/5156-780-0x00000000002C0000-0x00000000002E0000-memory.dmpFilesize
128KB
-
memory/5156-923-0x00000000051E0000-0x00000000057E6000-memory.dmpFilesize
6.0MB
-
memory/5216-502-0x0000000000000000-mapping.dmp
-
memory/5216-935-0x0000000002370000-0x0000000002385000-memory.dmpFilesize
84KB
-
memory/5216-943-0x0000000000400000-0x0000000000522000-memory.dmpFilesize
1.1MB
-
memory/5268-794-0x0000000000070000-0x00000000000A0000-memory.dmpFilesize
192KB
-
memory/5268-506-0x0000000000000000-mapping.dmp
-
memory/5308-511-0x0000000000000000-mapping.dmp
-
memory/5388-881-0x0000000000000000-mapping.dmp
-
memory/5692-1053-0x0000000000BB0000-0x0000000000BD0000-memory.dmpFilesize
128KB
-
memory/5692-874-0x0000000000000000-mapping.dmp
-
memory/5956-1139-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/5956-1112-0x0000000000470000-0x000000000051E000-memory.dmpFilesize
696KB
-
memory/5956-714-0x0000000000000000-mapping.dmp
-
memory/5956-1115-0x0000000002110000-0x0000000002169000-memory.dmpFilesize
356KB
-
memory/5956-1118-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/5956-1131-0x0000000000470000-0x000000000051E000-memory.dmpFilesize
696KB
-
memory/5956-1132-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/6112-488-0x0000000000000000-mapping.dmp
-
memory/6112-774-0x0000000000ED0000-0x0000000000F14000-memory.dmpFilesize
272KB
-
memory/6112-836-0x00000000018F0000-0x00000000018F6000-memory.dmpFilesize
24KB
-
memory/6140-491-0x0000000000000000-mapping.dmp