Analysis
-
max time kernel
128s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 10:47
Static task
static1
Behavioral task
behavioral1
Sample
e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe
Resource
win10v2004-20220901-en
General
-
Target
e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe
-
Size
577KB
-
MD5
ccd4fc36f74caf6fae7b806ce66a9859
-
SHA1
7b11c433593ffd98a87bd1ec399a1beb768f5b22
-
SHA256
e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf
-
SHA512
7266dc50ad201106c99a9b4141a7fa12e28cdc59c1bd10005e76bb7335849f3b88bf58c37d784bfa14d77d2411a97f339fd0ec27e36d47e5ddd434ddfdba1536
-
SSDEEP
12288:uGQttWvM3zrbETClTkFguiSlqamdqVbnFSPnQxBIyXCD8Hk6:u8U376C1kFgullOo9nGn2BIyXtX
Malware Config
Extracted
C:\readme.txt
http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST2GHJLMOPR
https://yip.su/2QstD5
Extracted
C:\odt\ReadMe.txt
http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?102YQHIABYP
https://yip.su/2QstD5
Extracted
redline
R102
94.130.179.90:21188
-
auth_value
cc794f9cf73d320cef662bb8cd5878d3
Signatures
-
Detects Smokeloader packer 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4228-138-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/4228-139-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/4228-140-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5100-174-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
Processes:
CA84.exeCF57.exeD459.exeCA84.exeCF57.exeCF57.exeD459.exepid process 388 CA84.exe 4256 CF57.exe 3832 D459.exe 4100 CA84.exe 1888 CF57.exe 4444 CF57.exe 5100 D459.exe -
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
CF57.exedescription ioc process File renamed C:\Users\Admin\Pictures\PublishLimit.raw => C:\Users\Admin\Pictures\PublishLimit.raw.obz CF57.exe File renamed C:\Users\Admin\Pictures\SyncImport.raw => C:\Users\Admin\Pictures\SyncImport.raw.obz CF57.exe File renamed C:\Users\Admin\Pictures\CompleteSplit.raw => C:\Users\Admin\Pictures\CompleteSplit.raw.obz CF57.exe File renamed C:\Users\Admin\Pictures\DenyOptimize.crw => C:\Users\Admin\Pictures\DenyOptimize.crw.obz CF57.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
CF57.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce CF57.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\CF57.exe" CF57.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 19 IoCs
Processes:
CF57.exeCA84.exedescription ioc process File opened for modification C:\Users\Public\Documents\desktop.ini CF57.exe File opened for modification C:\Users\Admin\Videos\desktop.ini CF57.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini CF57.exe File opened for modification C:\Users\Public\Videos\desktop.ini CF57.exe File opened for modification C:\Users\Public\Libraries\desktop.ini CF57.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini CF57.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI CA84.exe File opened for modification C:\Users\Public\Pictures\desktop.ini CF57.exe File opened for modification C:\Users\Public\Downloads\desktop.ini CF57.exe File opened for modification C:\Users\Admin\Searches\desktop.ini CF57.exe File opened for modification C:\Program Files\desktop.ini CA84.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini CF57.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini CF57.exe File opened for modification C:\Users\Admin\Music\desktop.ini CF57.exe File opened for modification C:\Users\Public\Music\desktop.ini CF57.exe File opened for modification C:\Users\Public\Desktop\desktop.ini CF57.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini CF57.exe File opened for modification C:\Users\Public\desktop.ini CF57.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini CF57.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
CA84.exedescription ioc process File opened (read-only) \??\Y: CA84.exe File opened (read-only) \??\U: CA84.exe File opened (read-only) \??\I: CA84.exe File opened (read-only) \??\A: CA84.exe File opened (read-only) \??\F: CA84.exe File opened (read-only) \??\Z: CA84.exe File opened (read-only) \??\V: CA84.exe File opened (read-only) \??\Q: CA84.exe File opened (read-only) \??\J: CA84.exe File opened (read-only) \??\K: CA84.exe File opened (read-only) \??\L: CA84.exe File opened (read-only) \??\M: CA84.exe File opened (read-only) \??\W: CA84.exe File opened (read-only) \??\O: CA84.exe File opened (read-only) \??\P: CA84.exe File opened (read-only) \??\G: CA84.exe File opened (read-only) \??\H: CA84.exe File opened (read-only) \??\X: CA84.exe File opened (read-only) \??\B: CA84.exe File opened (read-only) \??\N: CA84.exe File opened (read-only) \??\E: CA84.exe File opened (read-only) \??\T: CA84.exe File opened (read-only) \??\S: CA84.exe File opened (read-only) \??\M: File opened (read-only) \??\R: CA84.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exeCA84.exeCF57.exeD459.exedescription pid process target process PID 4376 set thread context of 4228 4376 e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe PID 388 set thread context of 4100 388 CA84.exe CA84.exe PID 4256 set thread context of 4444 4256 CF57.exe CF57.exe PID 3832 set thread context of 5100 3832 D459.exe D459.exe -
Drops file in Program Files directory 64 IoCs
Processes:
CA84.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPointVL_MAK-ppd.xrm-ms CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\send-email-16.png CA84.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_Trial-ppd.xrm-ms CA84.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019VL_MAK_AE-pl.xrm-ms CA84.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\LyncBasic_Eula.txt CA84.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Data.OData.NetFX35.dll CA84.exe File opened for modification C:\Program Files\Common Files\System\ado\msado60.tlb CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\javax.inject_1.0.0.v20091030.jar CA84.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp4-ul-phn.xrm-ms CA84.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\vi\ReadMe.txt CA84.exe File created C:\Program Files\Common Files\System\msadc\en-US\ReadMe.txt CA84.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\ea-sym.xml CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-api-progress_zh_CN.jar CA84.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial3-ppd.xrm-ms CA84.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp5-ppd.xrm-ms CA84.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019R_Retail-pl.xrm-ms CA84.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProXC2RVL_MAKC2R-ppd.xrm-ms CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\hprof.dll CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\win32_MoveDrop32x32.gif CA84.exe File created C:\Program Files\Microsoft Office\root\Client\ReadMe.txt CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.emf.common_2.10.1.v20140901-1043.jar CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-profiling.xml CA84.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_Trial-ul-oob.xrm-ms CA84.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\TelemetryDashboard.xltx CA84.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TipRes.dll CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\management\management.properties CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\feature.properties CA84.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365EduCloudEDUR_SubTrial-ul-oob.xrm-ms CA84.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_OEM_Perp-ppd.xrm-ms CA84.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProCO365R_SubTrial-ppd.xrm-ms CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\JAWTAccessBridge-64.dll CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\feature.xml CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-uisupport_zh_CN.jar CA84.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\cmm\CIEXYZ.pf CA84.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\deploy\messages_zh_CN.properties CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\feature.xml CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.databinding.property.nl_zh_4.4.0.v20140623020002.jar CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-openide-options.jar CA84.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_Trial-ppd.xrm-ms CA84.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe CA84.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome.exe.sig CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\license.html CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-modules-templates.jar CA84.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\ext\cldrdata.jar CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\AccessBridgeCallbacks.h CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\feature.xml CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\MANIFEST.MF CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-modules-queries.jar CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-editor-mimelookup-impl.xml CA84.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-001F-0409-1000-0000000FF1CE.xml CA84.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.contrast-black_scale-180.png CA84.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\cs\msipc.dll.mui CA84.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-file-l1-2-0.dll CA84.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\rmid.exe CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\feature.properties CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.garbagecollector_1.0.200.v20131115-1210.jar CA84.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Word2019VL_KMS_Client_AE-ppd.xrm-ms CA84.exe File created C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\ReadMe.txt CA84.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.PowerPoint.PowerPoint.x-none.msi.16.x-none.xml CA84.exe File created C:\Program Files\Common Files\microsoft shared\ink\pl-PL\ReadMe.txt CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\LucidaSansRegular.ttf CA84.exe File created C:\Program Files\Java\jre1.8.0_66\bin\ReadMe.txt CA84.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\org-netbeans-modules-profiler-oql.jar CA84.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3904 4852 WerFault.exe explorer.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
SearchApp.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchApp.exe -
Modifies registry class 32 IoCs
Processes:
SearchApp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "6801" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "2214" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Speech_OneCore\\Recognizers\\Tokens\\MS-1033-110-WINMO-DNN" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "2606" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "2214" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "173" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "6801" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "6801" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "2606" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "173" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "173" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\MuiCache SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\www.bing.com SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "2214" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "2606" SearchApp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exepid process 4228 e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe 4228 e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3040 -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exepid process 4228 e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe 3040 3040 3040 3040 -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
CF57.exedescription pid process Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeDebugPrivilege 4256 CF57.exe Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3040 3040 -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
pid process 3040 -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
SearchApp.exepid process 3968 SearchApp.exe -
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exeCA84.exeCF57.exeD459.exedescription pid process target process PID 4376 wrote to memory of 4228 4376 e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe PID 4376 wrote to memory of 4228 4376 e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe PID 4376 wrote to memory of 4228 4376 e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe PID 4376 wrote to memory of 4228 4376 e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe PID 4376 wrote to memory of 4228 4376 e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe PID 4376 wrote to memory of 4228 4376 e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe PID 3040 wrote to memory of 388 3040 CA84.exe PID 3040 wrote to memory of 388 3040 CA84.exe PID 3040 wrote to memory of 388 3040 CA84.exe PID 3040 wrote to memory of 4256 3040 CF57.exe PID 3040 wrote to memory of 4256 3040 CF57.exe PID 3040 wrote to memory of 4256 3040 CF57.exe PID 3040 wrote to memory of 3832 3040 D459.exe PID 3040 wrote to memory of 3832 3040 D459.exe PID 3040 wrote to memory of 3832 3040 D459.exe PID 3040 wrote to memory of 4852 3040 explorer.exe PID 3040 wrote to memory of 4852 3040 explorer.exe PID 3040 wrote to memory of 4852 3040 explorer.exe PID 3040 wrote to memory of 4852 3040 explorer.exe PID 3040 wrote to memory of 3800 3040 explorer.exe PID 3040 wrote to memory of 3800 3040 explorer.exe PID 3040 wrote to memory of 3800 3040 explorer.exe PID 388 wrote to memory of 4100 388 CA84.exe CA84.exe PID 388 wrote to memory of 4100 388 CA84.exe CA84.exe PID 388 wrote to memory of 4100 388 CA84.exe CA84.exe PID 388 wrote to memory of 4100 388 CA84.exe CA84.exe PID 388 wrote to memory of 4100 388 CA84.exe CA84.exe PID 388 wrote to memory of 4100 388 CA84.exe CA84.exe PID 388 wrote to memory of 4100 388 CA84.exe CA84.exe PID 388 wrote to memory of 4100 388 CA84.exe CA84.exe PID 388 wrote to memory of 4100 388 CA84.exe CA84.exe PID 4256 wrote to memory of 1888 4256 CF57.exe CF57.exe PID 4256 wrote to memory of 1888 4256 CF57.exe CF57.exe PID 4256 wrote to memory of 1888 4256 CF57.exe CF57.exe PID 4256 wrote to memory of 4444 4256 CF57.exe CF57.exe PID 4256 wrote to memory of 4444 4256 CF57.exe CF57.exe PID 4256 wrote to memory of 4444 4256 CF57.exe CF57.exe PID 4256 wrote to memory of 4444 4256 CF57.exe CF57.exe PID 4256 wrote to memory of 4444 4256 CF57.exe CF57.exe PID 4256 wrote to memory of 4444 4256 CF57.exe CF57.exe PID 3832 wrote to memory of 5100 3832 D459.exe D459.exe PID 3832 wrote to memory of 5100 3832 D459.exe D459.exe PID 3832 wrote to memory of 5100 3832 D459.exe D459.exe PID 3832 wrote to memory of 5100 3832 D459.exe D459.exe PID 3832 wrote to memory of 5100 3832 D459.exe D459.exe PID 3832 wrote to memory of 5100 3832 D459.exe D459.exe PID 3832 wrote to memory of 5100 3832 D459.exe D459.exe PID 3832 wrote to memory of 5100 3832 D459.exe D459.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe"C:\Users\Admin\AppData\Local\Temp\e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf.exe"{path}"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4228
-
C:\Users\Admin\AppData\Local\Temp\CA84.exeC:\Users\Admin\AppData\Local\Temp\CA84.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\CA84.exe"{path}"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
PID:4100
-
C:\Users\Admin\AppData\Local\Temp\CF57.exeC:\Users\Admin\AppData\Local\Temp\CF57.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\CF57.exe"{path}"2⤵
- Executes dropped EXE
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\CF57.exe"{path}"2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
PID:4444
-
C:\Users\Admin\AppData\Local\Temp\D459.exeC:\Users\Admin\AppData\Local\Temp\D459.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\D459.exe"{path}"2⤵
- Executes dropped EXE
PID:5100
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 8762⤵
- Program crash
PID:3904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4852 -ip 48521⤵PID:2816
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3800
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3968
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:1104
-
C:\Users\Admin\AppData\Local\CF57.exe"C:\Users\Admin\AppData\Local\CF57.exe"2⤵PID:3548
-
C:\Users\Admin\AppData\Roaming\rvdafcsC:\Users\Admin\AppData\Roaming\rvdafcs1⤵PID:4040
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:768
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:1200
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
203KB
MD5fd0afd79aa903acb40ab540962a50d7c
SHA145e43581c9ceed4ca6e33af98269a4b981c39483
SHA2561cc62cfee5e09cd4be8bd930586a05e7de8bfec3dedb77470bf79652cc6de523
SHA5122523057721ec9868fbf01583b335a43db22b626575c92e2d05b5cf39225f535ccd73c2cd3c24f8f89b17af71806a460997fc7a014f82fd14dfd49337b4f21035
-
Filesize
203KB
MD55fc1a16c3567f77cc793bf9ee485af42
SHA122180c74d834500271d3bac9d142f06b61d30c29
SHA25647fd7f6593096c30c34000491d71f5c3488eb4026eabf22f59300fe2caf40d1b
SHA51245a8c26f03355eb359c3f9cf6716aa7836e779b924e6467eda05b47150bb03018352ad9b41d928852f2000daf4900f7fb238b7055568eb0af848329cfb1cc539
-
Filesize
320KB
MD59002257695bd1a66a87f0f49bb9ec355
SHA14b34e363f3833eb8aacc6b1cae7d53f13eb27307
SHA256ff975d4f6bef9a40512bad51e186cd0aa2743af92a511a8f33cfc2338c5d2a1a
SHA512988b7c82cbf44004688d151829e7d7f69beacc83b8d0e926a8e0ae9c06e1c79cfcfbeb0803df6e9e1ab3dd30f06e7215f21738dfdeb6a017f8492f78a82a89c9
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
3KB
MD55a1b22412a0232528f491aa6f2db6828
SHA1588fc039ba58086af960549b7db2bf9bf8642c5f
SHA256135fb187661b5780c057392f7aa3ef5cc7d2c5fb0a25d54f1d218125522e1606
SHA512d29a202df92e8bf3f73adfa6b93d1ac178505fd888391f8233246083b544a0fca744780f1d7ed7c4dde54b49206732dfbc03262ffab36709471508e4ebc47660
-
Filesize
1KB
MD5f5edbf7b4bade85bd62f19e949d5f264
SHA12806f20bec9d1217c26aee168af7e4b26e3a8897
SHA256d80769eb4c682d000cde62b135f37765d82ed35c8c3144c44b6662169c03043b
SHA512621b612d5ec830d8846ef00ed40c3d2864c5d78d43aa26da1c879fdefd4c2b02a969129ee7b4f3bb9467164b3931ea73b5162621f7f9e1b8e3d155ac93ddf7f7
-
Filesize
3KB
MD5425ed0011c51cb060a76282cdc89765e
SHA14eef52378baa8b7c8d54fb9a6eab468b273d9010
SHA256617cffdba22e6ae48aa0054df67eeeb8c59d4570cbf21a1d3f78677781d6e942
SHA5129ebca7ee142b70de9d445ac1a888eb41d5e5903763ffe92ba922a5e4e7a2d91d4ed82ebc4a034264fae041e2a7fcd28c16f8ad23d0c8dbab197ea10fe0b3c548
-
Filesize
1KB
MD594fc8527d9a3df1c9895d87a22e04e4f
SHA18769e8f9a001ff50fd6feb9c7981165d618aa571
SHA256f668a4a4fdbeec35991887b41b9eae1996f9cfee217c954a61b0f2d0b1546ddb
SHA512d37c4394c6819817974eca57a9e4e98a1eb397a23d6b4d0c2d335b84aeefc202b0735c31fa606f94593912c72bcb2226399efd88f7a1f4c57bb530aee2582542
-
Filesize
1KB
MD5aea0dfd8c7caf24605a5712f1840649c
SHA1a62e062d3c90a4a4731c99f1a60bf4aa70430dda
SHA256bf7054500c89e1d57696a1f13b866fc7775c0a809cedde59a7f76a2d87f5b2ac
SHA5120440fde9d0a3ff536e7fdf27857c065c7c3827d43403556615a767b98004c353ff43ab721bba916aab561363b9290d64c938198319ccd6734f0d0f8ca44400b3
-
Filesize
847KB
MD5409e2d09f3675bd1d2cdac3bb003f78d
SHA1588b45567e8e4846c90b7a5d3c5b3d80cfc80426
SHA256bdbba6afa1fe6a41d85a712ddb48c6fb9057df42cc9e318ea582d5535008025c
SHA51274a9cfd8bfa55bb2d92bbbdbc7b3783a781682895a05035872b54421a5e135a9ce23dc046cb5d2b1810321043c8da43480fefcbad6583a1c2f0900c1d33f05d4
-
Filesize
847KB
MD5409e2d09f3675bd1d2cdac3bb003f78d
SHA1588b45567e8e4846c90b7a5d3c5b3d80cfc80426
SHA256bdbba6afa1fe6a41d85a712ddb48c6fb9057df42cc9e318ea582d5535008025c
SHA51274a9cfd8bfa55bb2d92bbbdbc7b3783a781682895a05035872b54421a5e135a9ce23dc046cb5d2b1810321043c8da43480fefcbad6583a1c2f0900c1d33f05d4
-
Filesize
1KB
MD584e77a587d94307c0ac1357eb4d3d46f
SHA183cc900f9401f43d181207d64c5adba7a85edc1e
SHA256e16024b092a026a9dc00df69d4b9bbcab7b2dc178dc5291fc308a1abc9304a99
SHA512aefb5c62200b3ed97718d20a89990954d4d8acdc0a6a73c5a420f1bba619cb79e70c2cd0a579b9f52dc6b09e1de2cea6cd6cac4376cfee92d94e2c01d310f691
-
Filesize
1KB
MD584e77a587d94307c0ac1357eb4d3d46f
SHA183cc900f9401f43d181207d64c5adba7a85edc1e
SHA256e16024b092a026a9dc00df69d4b9bbcab7b2dc178dc5291fc308a1abc9304a99
SHA512aefb5c62200b3ed97718d20a89990954d4d8acdc0a6a73c5a420f1bba619cb79e70c2cd0a579b9f52dc6b09e1de2cea6cd6cac4376cfee92d94e2c01d310f691
-
C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442
Filesize446B
MD5c2e75bdc16b8248db2482a0a4b872cdc
SHA16e7f64689e027f1731e132a990ca463018b23685
SHA25659b69354114efc6a069949c0dcb4cba0407ece9a4fb5b384a1ac4cfac9b30fa5
SHA51204a79d77452f0cd522ea97e7b39c0d53549bec2db08846bad540a6d0f6b93e1f8776228cd82862568bc32ab866848567086138a0b70fa2bb3eb8e1b15a9b5c34
-
C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\E8T2NA25\www.bing[1].xml
Filesize8KB
MD5bbb7f739404475118f670bad2ea2682d
SHA1e8ee1687a577be82c5882e17d1923b1eb29fed0b
SHA2565d587ec1379ca0e7d3ba81f2301674e40fb6617da694858cea67134778bfde88
SHA5122d6f796ff1807566bb9a04ec34f096c63d2e535ae9435a48e7d2e51e46612e6af178799e4237b7728ea1638a60921374da01756d48539f5606fa7cd56817a344
-
Filesize
884KB
MD513d8c2f2cdf5f6208c3e999621019304
SHA1fc8930cd264393552727a457efbbea67e60e49e5
SHA256edb7c1252fc4d53a733afe5b74dfab6395bcd90ea2c3cf0664e3b610e84e24d6
SHA512fd03cb71100f2638a0f8406b1b68e1b811cd6c8f66c67cd34ce4221372e569e8709906c4b2fb125cfe14ba6e8919e214440d7e15fa11122c4ee255b742b6b118
-
Filesize
884KB
MD513d8c2f2cdf5f6208c3e999621019304
SHA1fc8930cd264393552727a457efbbea67e60e49e5
SHA256edb7c1252fc4d53a733afe5b74dfab6395bcd90ea2c3cf0664e3b610e84e24d6
SHA512fd03cb71100f2638a0f8406b1b68e1b811cd6c8f66c67cd34ce4221372e569e8709906c4b2fb125cfe14ba6e8919e214440d7e15fa11122c4ee255b742b6b118
-
Filesize
884KB
MD513d8c2f2cdf5f6208c3e999621019304
SHA1fc8930cd264393552727a457efbbea67e60e49e5
SHA256edb7c1252fc4d53a733afe5b74dfab6395bcd90ea2c3cf0664e3b610e84e24d6
SHA512fd03cb71100f2638a0f8406b1b68e1b811cd6c8f66c67cd34ce4221372e569e8709906c4b2fb125cfe14ba6e8919e214440d7e15fa11122c4ee255b742b6b118
-
Filesize
847KB
MD5409e2d09f3675bd1d2cdac3bb003f78d
SHA1588b45567e8e4846c90b7a5d3c5b3d80cfc80426
SHA256bdbba6afa1fe6a41d85a712ddb48c6fb9057df42cc9e318ea582d5535008025c
SHA51274a9cfd8bfa55bb2d92bbbdbc7b3783a781682895a05035872b54421a5e135a9ce23dc046cb5d2b1810321043c8da43480fefcbad6583a1c2f0900c1d33f05d4
-
Filesize
847KB
MD5409e2d09f3675bd1d2cdac3bb003f78d
SHA1588b45567e8e4846c90b7a5d3c5b3d80cfc80426
SHA256bdbba6afa1fe6a41d85a712ddb48c6fb9057df42cc9e318ea582d5535008025c
SHA51274a9cfd8bfa55bb2d92bbbdbc7b3783a781682895a05035872b54421a5e135a9ce23dc046cb5d2b1810321043c8da43480fefcbad6583a1c2f0900c1d33f05d4
-
Filesize
847KB
MD5409e2d09f3675bd1d2cdac3bb003f78d
SHA1588b45567e8e4846c90b7a5d3c5b3d80cfc80426
SHA256bdbba6afa1fe6a41d85a712ddb48c6fb9057df42cc9e318ea582d5535008025c
SHA51274a9cfd8bfa55bb2d92bbbdbc7b3783a781682895a05035872b54421a5e135a9ce23dc046cb5d2b1810321043c8da43480fefcbad6583a1c2f0900c1d33f05d4
-
Filesize
847KB
MD5409e2d09f3675bd1d2cdac3bb003f78d
SHA1588b45567e8e4846c90b7a5d3c5b3d80cfc80426
SHA256bdbba6afa1fe6a41d85a712ddb48c6fb9057df42cc9e318ea582d5535008025c
SHA51274a9cfd8bfa55bb2d92bbbdbc7b3783a781682895a05035872b54421a5e135a9ce23dc046cb5d2b1810321043c8da43480fefcbad6583a1c2f0900c1d33f05d4
-
Filesize
921KB
MD5a67dd1e291c6bcea7a09c0e27d622577
SHA1647f48a2306695cdfb2b2424f0dff4253e10bbca
SHA2569681559af9504e3f6c6674992a37b660262f98042f3b8f754ffa12b3153402d5
SHA512b26aa2ca5f2793e6c8cfd052d9e93a1d71ccfae1e3e67af4ba9363d9bcb08c67ce1f73cc26d2c08adc60045ae0220340f448c6bd7bc7838a795b70b3443564e2
-
Filesize
921KB
MD5a67dd1e291c6bcea7a09c0e27d622577
SHA1647f48a2306695cdfb2b2424f0dff4253e10bbca
SHA2569681559af9504e3f6c6674992a37b660262f98042f3b8f754ffa12b3153402d5
SHA512b26aa2ca5f2793e6c8cfd052d9e93a1d71ccfae1e3e67af4ba9363d9bcb08c67ce1f73cc26d2c08adc60045ae0220340f448c6bd7bc7838a795b70b3443564e2
-
Filesize
921KB
MD5a67dd1e291c6bcea7a09c0e27d622577
SHA1647f48a2306695cdfb2b2424f0dff4253e10bbca
SHA2569681559af9504e3f6c6674992a37b660262f98042f3b8f754ffa12b3153402d5
SHA512b26aa2ca5f2793e6c8cfd052d9e93a1d71ccfae1e3e67af4ba9363d9bcb08c67ce1f73cc26d2c08adc60045ae0220340f448c6bd7bc7838a795b70b3443564e2
-
Filesize
577KB
MD5ccd4fc36f74caf6fae7b806ce66a9859
SHA17b11c433593ffd98a87bd1ec399a1beb768f5b22
SHA256e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf
SHA5127266dc50ad201106c99a9b4141a7fa12e28cdc59c1bd10005e76bb7335849f3b88bf58c37d784bfa14d77d2411a97f339fd0ec27e36d47e5ddd434ddfdba1536
-
Filesize
577KB
MD5ccd4fc36f74caf6fae7b806ce66a9859
SHA17b11c433593ffd98a87bd1ec399a1beb768f5b22
SHA256e27879b1cbd53ab565e049393da99ed5efa099a5eaf1e2595d44bdaea1d60ddf
SHA5127266dc50ad201106c99a9b4141a7fa12e28cdc59c1bd10005e76bb7335849f3b88bf58c37d784bfa14d77d2411a97f339fd0ec27e36d47e5ddd434ddfdba1536
-
Filesize
1KB
MD503f47accff0d10a1192c69056f54d325
SHA1a8c1d4e4ff73c18ce67e58fa7eb7a42a04795c19
SHA256ce38a4140f8f55411ed587c380377e236352c2927e4fa6259dddc9c2a8a8cf1d
SHA5124fbeb2618b3aaddee615426607f54c248828b3f4f58ef92dd7558b4336cf8a3200ea4f6688202ce7208a57fa99950e05f3e7c584aedbfb64fdbef4538aaab661
-
Filesize
1KB
MD5c1679f4cb87fef1c67da09ee9c13a526
SHA12ea444d366307b6f9fe888a8bdc63a19e56c5d2d
SHA256344d4d76f73ffc5328bb491c007401e97f627c0648120f7b7514b8ac4b72ceb3
SHA51211361fc16e267653328e31899764cdfc3d6256238a5288514ac2c292cd6ff8b97c5e4d9f227f95c99bcfa012aa5f1261e9baef4181b589b06934ae8c48017a0d