Analysis
-
max time kernel
195s -
max time network
305s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
30/10/2023, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
2dfe1ffe94db0e3e245f713fd1d1ec831dbc5afe71b7cd528b8aff35fccb05fc.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2dfe1ffe94db0e3e245f713fd1d1ec831dbc5afe71b7cd528b8aff35fccb05fc.exe
Resource
win10-20231020-en
General
-
Target
2dfe1ffe94db0e3e245f713fd1d1ec831dbc5afe71b7cd528b8aff35fccb05fc.exe
-
Size
1.5MB
-
MD5
ab2369654656485e9dbae6963ea61de3
-
SHA1
e0354845b03ca5377396771c7018a2e5fe6f2e35
-
SHA256
2dfe1ffe94db0e3e245f713fd1d1ec831dbc5afe71b7cd528b8aff35fccb05fc
-
SHA512
99101bb60f37abaa854c80abaa1d892bbfd3b3414d46744673b8386c8f237fef0c0713f8db691aef2c3931088dc76c386d7861832855d211a962686cee0cec95
-
SSDEEP
49152:TURSe2DcobpJ+M1Qu0FMkLo2X9OgmHqjK:gRry9bqoQfFlLoidzm
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
grome
77.91.124.86:19084
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Extracted
redline
kinza
77.91.124.86:19084
Extracted
smokeloader
up3
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/7672-2950-0x0000000000F70000-0x0000000001350000-memory.dmp family_zgrat_v1 -
Glupteba payload 3 IoCs
resource yara_rule behavioral2/memory/4552-2939-0x0000000002DB0000-0x000000000369B000-memory.dmp family_glupteba behavioral2/memory/4552-2948-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4552-3123-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" wmiprvse.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" wmiprvse.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" wmiprvse.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" wmiprvse.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" wmiprvse.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/memory/3928-75-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral2/memory/6556-2576-0x00000000004F0000-0x000000000052E000-memory.dmp family_redline behavioral2/memory/7100-2885-0x0000000000400000-0x000000000047E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 7 IoCs
description pid Process procid_target PID 7280 created 3168 7280 latestX.exe 54 PID 7280 created 3168 7280 latestX.exe 54 PID 7280 created 3168 7280 latestX.exe 54 PID 7280 created 3168 7280 latestX.exe 54 PID 7280 created 3168 7280 latestX.exe 54 PID 7668 created 3168 7668 updater.exe 54 PID 7668 created 3168 7668 updater.exe 54 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts latestX.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 6596 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000\Control Panel\International\Geo\Nation 46CE.exe -
Executes dropped EXE 47 IoCs
pid Process 4248 FA2pf80.exe 4600 YB1mK53.exe 2720 Px1ZX05.exe 452 Ap9Ny27.exe 5060 bO1Oi36.exe 1756 1QD06VA8.exe 4604 2GQ9959.exe 4120 3La00TE.exe 5032 4re814VB.exe 1512 5JV8BA2.exe 4828 explothe.exe 4648 6QQ8xg5.exe 2108 7uT1CA63.exe 3124 87E8.exe 2768 In4Ef7vw.exe 4468 pt6Nm6IV.exe 4536 XH4er0Kd.exe 5684 gS0dO2rt.exe 6228 8A79.exe 6216 1pv51qA8.exe 6556 2lQ988wn.exe 6580 90D4.exe 6720 wmiprvse.exe 6888 972F.exe 7100 9B95.exe 6464 explothe.exe 6476 C94D.exe 7008 CB81.exe 4984 toolspub2.exe 4552 explothe.exe 7208 kos4.exe 7280 latestX.exe 7456 LzmwAqmV.exe 7484 toolspub2.exe 7552 LzmwAqmV.tmp 7672 E004.exe 8004 FAudioConverter.exe 4660 FAudioConverter.exe 7864 4239.exe 7392 46CE.exe 6320 4866.exe 7108 49ED.exe 6328 31839b57a4f11171d6abc8bbc4451ee4.exe 4552 explothe.exe 7668 updater.exe 4608 csrss.exe 6812 explothe.exe -
Loads dropped DLL 7 IoCs
pid Process 6988 rundll32.exe 7100 9B95.exe 7100 9B95.exe 7552 LzmwAqmV.tmp 7552 LzmwAqmV.tmp 7552 LzmwAqmV.tmp 7672 E004.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 51.159.66.125 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 46CE.exe Key opened \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 46CE.exe Key opened \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 46CE.exe Key opened \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 46CE.exe Key opened \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 46CE.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2dfe1ffe94db0e3e245f713fd1d1ec831dbc5afe71b7cd528b8aff35fccb05fc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" bO1Oi36.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" XH4er0Kd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000\Software\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\CB81.exe'\"" CB81.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" YB1mK53.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Px1ZX05.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" In4Ef7vw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP006.TMP\\\"" gS0dO2rt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" FA2pf80.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Ap9Ny27.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 87E8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" pt6Nm6IV.exe Set value (str) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 393 api.ipify.org 394 api.ipify.org -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 1756 set thread context of 4024 1756 1QD06VA8.exe 76 PID 4604 set thread context of 392 4604 2GQ9959.exe 78 PID 5032 set thread context of 3928 5032 4re814VB.exe 83 PID 6216 set thread context of 6512 6216 1pv51qA8.exe 135 PID 4984 set thread context of 7484 4984 toolspub2.exe 164 PID 7672 set thread context of 6616 7672 E004.exe 178 PID 7864 set thread context of 2932 7864 4239.exe 228 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File created C:\Program Files (x86)\FAudioConverter\unins000.dat LzmwAqmV.tmp File created C:\Program Files (x86)\FAudioConverter\is-1JSS4.tmp LzmwAqmV.tmp File created C:\Program Files (x86)\FAudioConverter\is-ERADL.tmp LzmwAqmV.tmp File created C:\Program Files (x86)\FAudioConverter\is-OVNUQ.tmp LzmwAqmV.tmp File opened for modification C:\Program Files (x86)\FAudioConverter\FAudioConverter.exe LzmwAqmV.tmp File created C:\Program Files (x86)\FAudioConverter\is-E7ESV.tmp LzmwAqmV.tmp File created C:\Program Files (x86)\FAudioConverter\is-4D9PA.tmp LzmwAqmV.tmp File created C:\Program Files (x86)\FAudioConverter\is-P31HA.tmp LzmwAqmV.tmp File created C:\Program Files (x86)\FAudioConverter\is-2L16U.tmp LzmwAqmV.tmp File created C:\Program Files (x86)\FAudioConverter\is-3P2KE.tmp LzmwAqmV.tmp File created C:\Program Files (x86)\FAudioConverter\is-JLQI0.tmp LzmwAqmV.tmp File created C:\Program Files (x86)\FAudioConverter\is-8TOBQ.tmp LzmwAqmV.tmp File created C:\Program Files (x86)\FAudioConverter\XML\Styles\is-I12FV.tmp LzmwAqmV.tmp File created C:\Program Files (x86)\FAudioConverter\is-UQIRI.tmp LzmwAqmV.tmp File created C:\Program Files (x86)\FAudioConverter\is-SSMSE.tmp LzmwAqmV.tmp File created C:\Program Files (x86)\FAudioConverter\XML\Styles\is-7D1HF.tmp LzmwAqmV.tmp File created C:\Program Files (x86)\FAudioConverter\XML\Styles\is-RLEJN.tmp LzmwAqmV.tmp File opened for modification C:\Program Files (x86)\FAudioConverter\unins000.dat LzmwAqmV.tmp File created C:\Program Files\Google\Chrome\updater.exe latestX.exe -
Drops file in Windows directory 44 IoCs
description ioc Process File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe -
Launches sc.exe 11 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 7528 sc.exe 5668 sc.exe 3116 sc.exe 7228 sc.exe 7796 sc.exe 6404 sc.exe 6912 sc.exe 3292 sc.exe 3104 sc.exe 7304 sc.exe 3836 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 4228 392 WerFault.exe 78 6548 7100 WerFault.exe 142 2140 6616 WerFault.exe 178 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3La00TE.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3La00TE.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3La00TE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3100 schtasks.exe 2900 schtasks.exe 2440 schtasks.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\newassets.hcaptcha.com MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 602aba6aec0ada01 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.recaptcha.net\ = "25" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DomainSuggestion\FileNames MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\steampowered.com\NumberOfS = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\www.epicgames.com MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DomStorageState MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\Total MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\paypalobjects.com MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "15" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = fe04ad56ec0ada01 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = d840f349ec0ada01 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\recaptcha.net MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\paypalobjects.com\Total = "115" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\hcaptcha.com\Total = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.paypal.com MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\Total MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\store.steampowered.com MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.paypalobjects.com\ = "115" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\recaptcha.net\NumberOfSubdoma = "1" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\paypal.com\Total = "0" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 07ffc05dec0ada01 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "326" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4120 3La00TE.exe 4120 3La00TE.exe 4024 AppLaunch.exe 4024 AppLaunch.exe 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3168 Explorer.EXE -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 4120 3La00TE.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 7484 toolspub2.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4024 AppLaunch.exe Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeDebugPrivilege 2112 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2112 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2112 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2112 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 7552 LzmwAqmV.tmp -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3044 MicrosoftEdge.exe 4280 MicrosoftEdgeCP.exe 2112 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 920 wrote to memory of 4248 920 2dfe1ffe94db0e3e245f713fd1d1ec831dbc5afe71b7cd528b8aff35fccb05fc.exe 70 PID 920 wrote to memory of 4248 920 2dfe1ffe94db0e3e245f713fd1d1ec831dbc5afe71b7cd528b8aff35fccb05fc.exe 70 PID 920 wrote to memory of 4248 920 2dfe1ffe94db0e3e245f713fd1d1ec831dbc5afe71b7cd528b8aff35fccb05fc.exe 70 PID 4248 wrote to memory of 4600 4248 FA2pf80.exe 71 PID 4248 wrote to memory of 4600 4248 FA2pf80.exe 71 PID 4248 wrote to memory of 4600 4248 FA2pf80.exe 71 PID 4600 wrote to memory of 2720 4600 YB1mK53.exe 72 PID 4600 wrote to memory of 2720 4600 YB1mK53.exe 72 PID 4600 wrote to memory of 2720 4600 YB1mK53.exe 72 PID 2720 wrote to memory of 452 2720 Px1ZX05.exe 73 PID 2720 wrote to memory of 452 2720 Px1ZX05.exe 73 PID 2720 wrote to memory of 452 2720 Px1ZX05.exe 73 PID 452 wrote to memory of 5060 452 Ap9Ny27.exe 74 PID 452 wrote to memory of 5060 452 Ap9Ny27.exe 74 PID 452 wrote to memory of 5060 452 Ap9Ny27.exe 74 PID 5060 wrote to memory of 1756 5060 bO1Oi36.exe 75 PID 5060 wrote to memory of 1756 5060 bO1Oi36.exe 75 PID 5060 wrote to memory of 1756 5060 bO1Oi36.exe 75 PID 1756 wrote to memory of 4024 1756 1QD06VA8.exe 76 PID 1756 wrote to memory of 4024 1756 1QD06VA8.exe 76 PID 1756 wrote to memory of 4024 1756 1QD06VA8.exe 76 PID 1756 wrote to memory of 4024 1756 1QD06VA8.exe 76 PID 1756 wrote to memory of 4024 1756 1QD06VA8.exe 76 PID 1756 wrote to memory of 4024 1756 1QD06VA8.exe 76 PID 1756 wrote to memory of 4024 1756 1QD06VA8.exe 76 PID 1756 wrote to memory of 4024 1756 1QD06VA8.exe 76 PID 5060 wrote to memory of 4604 5060 bO1Oi36.exe 77 PID 5060 wrote to memory of 4604 5060 bO1Oi36.exe 77 PID 5060 wrote to memory of 4604 5060 bO1Oi36.exe 77 PID 4604 wrote to memory of 392 4604 2GQ9959.exe 78 PID 4604 wrote to memory of 392 4604 2GQ9959.exe 78 PID 4604 wrote to memory of 392 4604 2GQ9959.exe 78 PID 4604 wrote to memory of 392 4604 2GQ9959.exe 78 PID 4604 wrote to memory of 392 4604 2GQ9959.exe 78 PID 4604 wrote to memory of 392 4604 2GQ9959.exe 78 PID 4604 wrote to memory of 392 4604 2GQ9959.exe 78 PID 4604 wrote to memory of 392 4604 2GQ9959.exe 78 PID 4604 wrote to memory of 392 4604 2GQ9959.exe 78 PID 4604 wrote to memory of 392 4604 2GQ9959.exe 78 PID 452 wrote to memory of 4120 452 Ap9Ny27.exe 79 PID 452 wrote to memory of 4120 452 Ap9Ny27.exe 79 PID 452 wrote to memory of 4120 452 Ap9Ny27.exe 79 PID 2720 wrote to memory of 5032 2720 Px1ZX05.exe 82 PID 2720 wrote to memory of 5032 2720 Px1ZX05.exe 82 PID 2720 wrote to memory of 5032 2720 Px1ZX05.exe 82 PID 5032 wrote to memory of 3928 5032 4re814VB.exe 83 PID 5032 wrote to memory of 3928 5032 4re814VB.exe 83 PID 5032 wrote to memory of 3928 5032 4re814VB.exe 83 PID 5032 wrote to memory of 3928 5032 4re814VB.exe 83 PID 5032 wrote to memory of 3928 5032 4re814VB.exe 83 PID 5032 wrote to memory of 3928 5032 4re814VB.exe 83 PID 5032 wrote to memory of 3928 5032 4re814VB.exe 83 PID 5032 wrote to memory of 3928 5032 4re814VB.exe 83 PID 4600 wrote to memory of 1512 4600 YB1mK53.exe 84 PID 4600 wrote to memory of 1512 4600 YB1mK53.exe 84 PID 4600 wrote to memory of 1512 4600 YB1mK53.exe 84 PID 1512 wrote to memory of 4828 1512 5JV8BA2.exe 85 PID 1512 wrote to memory of 4828 1512 5JV8BA2.exe 85 PID 1512 wrote to memory of 4828 1512 5JV8BA2.exe 85 PID 4248 wrote to memory of 4648 4248 FA2pf80.exe 86 PID 4248 wrote to memory of 4648 4248 FA2pf80.exe 86 PID 4248 wrote to memory of 4648 4248 FA2pf80.exe 86 PID 4828 wrote to memory of 3100 4828 explothe.exe 87 PID 4828 wrote to memory of 3100 4828 explothe.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 46CE.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 46CE.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\2dfe1ffe94db0e3e245f713fd1d1ec831dbc5afe71b7cd528b8aff35fccb05fc.exe"C:\Users\Admin\AppData\Local\Temp\2dfe1ffe94db0e3e245f713fd1d1ec831dbc5afe71b7cd528b8aff35fccb05fc.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FA2pf80.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FA2pf80.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\YB1mK53.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\YB1mK53.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Px1ZX05.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Px1ZX05.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ap9Ny27.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ap9Ny27.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bO1Oi36.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bO1Oi36.exe7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1QD06VA8.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1QD06VA8.exe8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"9⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4024
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2GQ9959.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2GQ9959.exe8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"9⤵PID:392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 392 -s 56810⤵
- Program crash
PID:4228
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3La00TE.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3La00TE.exe7⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4120
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4re814VB.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4re814VB.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3928
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5JV8BA2.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5JV8BA2.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F7⤵
- Creates scheduled task(s)
PID:3100
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit7⤵PID:3976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2156
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"8⤵PID:5100
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E8⤵PID:4656
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1112
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"8⤵PID:2924
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E8⤵PID:4028
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:6988
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6QQ8xg5.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6QQ8xg5.exe4⤵
- Executes dropped EXE
PID:4648
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7uT1CA63.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7uT1CA63.exe3⤵
- Executes dropped EXE
PID:2108 -
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\D3F9.tmp\D3FA.tmp\D3FB.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7uT1CA63.exe"4⤵
- Checks computer location settings
PID:4460
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\87E8.exeC:\Users\Admin\AppData\Local\Temp\87E8.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\In4Ef7vw.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\In4Ef7vw.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pt6Nm6IV.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pt6Nm6IV.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\XH4er0Kd.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\XH4er0Kd.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\gS0dO2rt.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\gS0dO2rt.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5684 -
C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\1pv51qA8.exeC:\Users\Admin\AppData\Local\Temp\IXP006.TMP\1pv51qA8.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6216 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:6512
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\2lQ988wn.exeC:\Users\Admin\AppData\Local\Temp\IXP006.TMP\2lQ988wn.exe7⤵
- Executes dropped EXE
PID:6556
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\8A79.exeC:\Users\Admin\AppData\Local\Temp\8A79.exe2⤵
- Executes dropped EXE
PID:6228
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8DA7.bat" "2⤵
- Checks computer location settings
PID:6416
-
-
C:\Users\Admin\AppData\Local\Temp\90D4.exeC:\Users\Admin\AppData\Local\Temp\90D4.exe2⤵
- Executes dropped EXE
PID:6580
-
-
C:\Users\Admin\AppData\Local\Temp\9308.exeC:\Users\Admin\AppData\Local\Temp\9308.exe2⤵PID:6720
-
-
C:\Users\Admin\AppData\Local\Temp\972F.exeC:\Users\Admin\AppData\Local\Temp\972F.exe2⤵
- Executes dropped EXE
PID:6888
-
-
C:\Users\Admin\AppData\Local\Temp\9B95.exeC:\Users\Admin\AppData\Local\Temp\9B95.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:7100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7100 -s 7683⤵
- Program crash
PID:6548
-
-
-
C:\Users\Admin\AppData\Local\Temp\C94D.exeC:\Users\Admin\AppData\Local\Temp\C94D.exe2⤵
- Executes dropped EXE
PID:6476 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:7484
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵PID:4552
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:8064
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:6328 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:7516
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:6844
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:6596
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3084
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:412
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
PID:4608 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:6308
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:2900
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:7156
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Modifies data under HKEY_USERS
PID:7700
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:6944
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵PID:4184
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:2440
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵PID:8168
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:7568
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
PID:6404
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exeC:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe6⤵PID:6408
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn "csrss" /f7⤵PID:6268
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn "ScheduledUpdate" /f7⤵PID:7600
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\kos4.exe"C:\Users\Admin\AppData\Local\Temp\kos4.exe"3⤵
- Executes dropped EXE
PID:7208 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"4⤵
- Executes dropped EXE
PID:7456 -
C:\Users\Admin\AppData\Local\Temp\is-4PT23.tmp\LzmwAqmV.tmp"C:\Users\Admin\AppData\Local\Temp\is-4PT23.tmp\LzmwAqmV.tmp" /SL5="$10714,2778800,54272,C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:7552 -
C:\Program Files (x86)\FAudioConverter\FAudioConverter.exe"C:\Program Files (x86)\FAudioConverter\FAudioConverter.exe" -i6⤵
- Executes dropped EXE
PID:8004
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Delete /F /TN "EAC1029-3"6⤵PID:7992
-
-
C:\Program Files (x86)\FAudioConverter\FAudioConverter.exe"C:\Program Files (x86)\FAudioConverter\FAudioConverter.exe" -s6⤵
- Executes dropped EXE
PID:4660
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\latestX.exe"C:\Users\Admin\AppData\Local\Temp\latestX.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
PID:7280
-
-
-
C:\Users\Admin\AppData\Local\Temp\CB81.exeC:\Users\Admin\AppData\Local\Temp\CB81.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:7008
-
-
C:\Users\Admin\AppData\Local\Temp\E004.exeC:\Users\Admin\AppData\Local\Temp\E004.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:7672 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:8104
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:6616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6616 -s 5804⤵
- Program crash
PID:2140
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4239.exeC:\Users\Admin\AppData\Local\Temp\4239.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:7864 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe3⤵PID:2932
-
-
-
C:\Users\Admin\AppData\Local\Temp\46CE.exeC:\Users\Admin\AppData\Local\Temp\46CE.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:7392
-
-
C:\Users\Admin\AppData\Local\Temp\4866.exeC:\Users\Admin\AppData\Local\Temp\4866.exe2⤵
- Executes dropped EXE
PID:6320
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:6428
-
-
C:\Users\Admin\AppData\Local\Temp\49ED.exeC:\Users\Admin\AppData\Local\Temp\49ED.exe2⤵
- Executes dropped EXE
PID:7108
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:1220
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:7992
-
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:7528
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:5668
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:6912
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:3116
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:3292
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:5904
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:3508
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:8116
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:7360
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:5564
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:6724
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:6856
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:692
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:8184
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:7228
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:3104
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:7304
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:3836
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:7796
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:996
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:6300
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:5828
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:7544
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:8136
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:6844
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:7304
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:7264
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3044
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:3068
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:4280
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2112
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:4016
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:5040
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:3808
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:4664
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:4464
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:500
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:2924
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:3276
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:5600
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:6036
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5428
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:6008
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:5576
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:928
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:5536
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:6852
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:6372
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:6464
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:6704
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:1756
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:5604
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:4620
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:6240
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:6132
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:5856
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:6072
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:6532
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:5196
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
PID:6720
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:7536
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:6232
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:7408
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:4552
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:1196
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:1996
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:356
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:7668
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:7648
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:4124
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:5780
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:7768
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:6812
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:6212
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:6892
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:7004
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4448
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8108
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵PID:3148
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5f61ae7a8867bd66b4d7be45c07d2d9b3
SHA178d45d50fbab4533c9d2670e279ac252e59b657a
SHA256f576ab51d6a40ffc942585b3ef425080291faa15a8000cc3f6918578550ec252
SHA5127308acd78f8a2356bfb9f3960ad1694d93d1c237141eee25efed5ecae61a1fc5f826362ee4dbe775a625d3fca192a4dbdfa89aa8627554b8001818f5ad512255
-
Filesize
74KB
MD5d4fc49dc14f63895d997fa4940f24378
SHA13efb1437a7c5e46034147cbbc8db017c69d02c31
SHA256853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1
SHA512cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\51OV1GO2\buttons[2].css
Filesize32KB
MD5b91ff88510ff1d496714c07ea3f1ea20
SHA19c4b0ad541328d67a8cde137df3875d824891e41
SHA2560be99fd30134de50d457729cebd0e08342777af747caf503108178cb4c375085
SHA512e82438186bfc3e9ca690af8e099aafbfbc71c9310f9d1c8cb87ffa9e7f0f11f33982c63a2dac95c9b83fef1aaa59178b73212fc76e895d13a1ffbbe3c1adfa4c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\51OV1GO2\shared_global[1].css
Filesize84KB
MD515dd9a8ffcda0554150891ba63d20d76
SHA1bdb7de4df9a42a684fa2671516c10a5995668f85
SHA2566f42b906118e3b3aebcc1a31c162520c95e3b649146a02efd3a0fd8fcddebb21
SHA5122ceeb8b83590fc35e83576fe8058ddf0e7a942960b0564e9867b45677c665ac20e19c25a7a6a8d5115b60ab33b80104ea492e872cc784b424b105cc049b217e9
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\51OV1GO2\shared_responsive_adapter[1].js
Filesize24KB
MD5a52bc800ab6e9df5a05a5153eea29ffb
SHA18661643fcbc7498dd7317d100ec62d1c1c6886ff
SHA25657cfaf9b92c98541f769090cd0229a30013cea7cfafc18519ca654bfae29e14e
SHA5121bcacd0ec7c3d633d6296fff3325802d6352805f0d2cf1eea39237424229ecffad6cb2aee4248e28b1eca02ff0646b58240851a246bbcf0aa1083830d5d9081e
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\D05VS50O\fn_1k[2].jpg
Filesize132KB
MD53ae8bba7279972ba539bdb75e6ced7f5
SHA18c704696343c8ad13358e108ab8b2d0f9021fec2
SHA256de760e6ff6b3aa8af41c5938a5f2bb565b6fc0c0fb3097f03689fe2d588c52f8
SHA5123ca2300a11d965e92bba8dc96ae1b00eca150c530cbfeb9732b8329da47e2f469110306777ed661195ff456855f79e2c4209ccef4a562a71750eb903d0a42c24
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\D05VS50O\hcaptcha[1].js
Filesize323KB
MD55334810719a3cb091a735803ffbbffc9
SHA1bc703f1c9b3ad56dd7659928b0c7e93b09b52709
SHA256bc8bb611de4a8fde99c8ca3393b429f6421f98f6fca51aacf3b2bbfea75159fe
SHA512e4adc37b1466620edf653ac6f09c25341f1eda1e7bae612c0321f14191d496dcca40a48811fc4d383bf7ac16d7e22ec108a411bd1faebba165eda396ec3d32ff
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\D05VS50O\recaptcha__en[1].js
Filesize461KB
MD54efc45f285352a5b252b651160e1ced9
SHA1c7ba19e7058ec22c8d0f7283ab6b722bb7a135d7
SHA256253627a82794506a7d660ee232c06a88d2eaafb6174532f8c390bb69ade6636a
SHA512cfc7aae449b15a8b84f117844547f7a5c2f2dd4a79e8b543305ae83b79195c5a6f6d0ccf6f2888c665002b125d9569cd5c0842fdd2f61d2a2848091776263a39
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\D5BTUAXG\chunk~9229560c0[1].css
Filesize34KB
MD592f1378df1105b434f7def4ee86db032
SHA1b030d4eae4a67200937ecd86479ec23aa47c4596
SHA25664fb68e0df68e185e484878a712adbcac00e0482a2386286507d756294334ed4
SHA51200fb8fb66031bade3f5dc274b71217367792e69fdc9647bf8f71a13b8e43f77eb12b0dcef88c01f2b2b87e27442b94a1a16d2ae02d0a295249f298ed21d8154c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\D5BTUAXG\fb[1].js
Filesize63KB
MD5ec6ea67601ec9c1a200df44f5adb0f09
SHA1d3e773ab7c4633406ef97f202d1a1e94067b2f58
SHA256b3ef5ca0d84ab27a5dce2d14e326cfa6109cb7905ebd38b11a6ae51fab450504
SHA512442649bc816acc030a1621cbd537fd51b28b74323d6ff2af94a219ddad8224a8033c83694d2d7552c40823dbaf87ae95ac6ca23a70be5bbf72df44f5e9d29e66
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\D5BTUAXG\m=_b,_tp[1].js
Filesize209KB
MD57fb78279051428c0fab30f50a4944cc7
SHA1857e07358eaf56b9f5506f0f72e88a2e8f7392c3
SHA256530880148fa5c9ac37d53bec5ed1df7546e850804e5e217175f3c7f348d4f4fd
SHA5120aa326f402e2a4e5a64ca5b144f460433e61dc636331f4fd920b965737cf9e006fc8b58fa7b8425a385093f594bd25bb95475ecccd777fb6fc6a7c9512214b97
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\D5BTUAXG\shared_responsive[1].css
Filesize18KB
MD52ab2918d06c27cd874de4857d3558626
SHA1363be3b96ec2d4430f6d578168c68286cb54b465
SHA2564afb3e37bfdd549cc16ef5321faf3f0a3bf6e84c79fc4408bc6f157280636453
SHA5123af59e0b16ef9d39c2f1c5ccdbd5c9ea35bd78571fde1b5bf01e51a675d5554e03225a2d7c04ed67e22569e9f43b16788105a0bf591ebba28ef917c961cc59e2
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\QC6WO258\shared_global[1].js
Filesize149KB
MD58e8525cbdb99a095ffab84b841c65261
SHA1f384476680d626b53d3e7757492fa7c824e7f35a
SHA256c9e5be0ef70c363787844f5e94fa7ea895d170d173d0e3066ca0b13796c21d05
SHA512285525a9d10e392fc081ce167c7941308c4c0ceb534427b6498d29823f4c72a94ce9506a1ca8cbf602ed1aafe5150b9023ed020988548504192441605784a714
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\QC6WO258\tooltip[2].js
Filesize15KB
MD572938851e7c2ef7b63299eba0c6752cb
SHA1b75196bd3a6f9f4dfc1bbf5e43e96874bcd9ce4e
SHA256e2d4e0e1d3e162fdc815f16dfff9ae9b0a967949f0f3ae371f947d730a3f0661
SHA5122bb6c03a1335ef9514d0d172a4284d82a29d1783a72306bdcb8af3185d5cd2ff16303355aa4b05086d2fa0b5b7c7159cfa67de4a6175095ff0e68adec2a56ac1
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\QEN40EIZ\www.recaptcha[1].xml
Filesize99B
MD5c0cbc063c3a9025726c52e795bbe93b2
SHA1d0f0d5e6bdec1558f9ed25b2ba0a67d055170064
SHA256a8d8a021455f1749aa03330402b353d5bf303eebe4b0defef9e939695de11b15
SHA512d9c5fe0c7811d370c1268a628f3ca63b2cb791dddf729d08c06cdcc1392944ebd6c74ad6378a5f99661a4084406e9dc3a2a08710015f1d3f72e98a7bac8a095c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\QEN40EIZ\www.recaptcha[1].xml
Filesize623B
MD5a34f5605002131a53443c0027d8955d3
SHA1bf5729c7772a46c1ca9091312153910459373f10
SHA256fdc6a678a95930279c951b2f041937f6b439b5531699da4fa5ed9c4ad53d6bb3
SHA51219e3e171c3ebe6337eb9c03b4535d5f8837c5b8d636f1174c220dc716dac7fdaf057c91a4886108c6ef7fd2a8e89b6fa675e3880a7781e642f1944084e552257
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\RXNKGO5U\www.epicgames[1].xml
Filesize13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\PRJ3OPZ2\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\RW9WQB4I\pp_favicon_x[1].ico
Filesize5KB
MD5e1528b5176081f0ed963ec8397bc8fd3
SHA1ff60afd001e924511e9b6f12c57b6bf26821fc1e
SHA2561690c4e20869c3763b7fc111e2f94035b0a7ee830311dd680ac91421daad3667
SHA512acf71864e2844907752901eeeaf5c5648d9f6acf3b73a2fb91e580bee67a04ffe83bc2c984a9464732123bc43a3594007691653271ba94f95f7e1179f4146212
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\T5MYTQOF\B8BxsscfVBr[1].ico
Filesize1KB
MD5e508eca3eafcc1fc2d7f19bafb29e06b
SHA1a62fc3c2a027870d99aedc241e7d5babba9a891f
SHA256e6d1d77403cd9f14fd2377d07e84350cfe768e3353e402bf42ebdc8593a58c9a
SHA51249e3f31fd73e52ba274db9c7d306cc188e09c3ae683827f420fbb17534d197a503460e7ec2f1af46065f8d0b33f37400659bfa2ae165e502f97a8150e184a38c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\T5MYTQOF\favicon[1].ico
Filesize1KB
MD5630d203cdeba06df4c0e289c8c8094f6
SHA1eee14e8a36b0512c12ba26c0516b4553618dea36
SHA256bbce71345828a27c5572637dbe88a3dd1e065266066600c8a841985588bf2902
SHA51209f4e204960f4717848bf970ac4305f10201115e45dd5fe0196a6346628f0011e7bc17d73ec946b68731a5e179108fd39958cecf41125f44094f63fe5f2aeb2c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\T5MYTQOF\favicon[2].ico
Filesize37KB
MD5231913fdebabcbe65f4b0052372bde56
SHA1553909d080e4f210b64dc73292f3a111d5a0781f
SHA2569f890a9debcdfccc339149a7943be9aff9e4c9203c2fa37d5671a5b2c88503ad
SHA5127b11b709968c5a52b9b60189fb534f5df56912417243820e9d1c00c97f4bd6d0835f2cdf574d0c36ecb32dbbf5fc397324df54f7fdf9e1b062b5dbda2c02e919
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\YVIZD3BC\epic-favicon-96x96[1].png
Filesize5KB
MD5c94a0e93b5daa0eec052b89000774086
SHA1cb4acc8cfedd95353aa8defde0a82b100ab27f72
SHA2563f51f3fb508f0d0361b722345974969576daef2c7d3db8f97c4ca8e1ff1a1775
SHA512f676705e63f89d76520637b788f3bac96d177d1be7f9762aeb8d5d1554afd7666cbd6ef22ce08f581eb59bd383dd1971896231264bc3eaabf21135c967930240
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\ImageStore\f3c72lc\imagestore.dat
Filesize40KB
MD52d00b35acdd037609bdcfe4b44cb982b
SHA1fc147f6e170b8460d0d1ed92c50df09218f9dbf6
SHA256bbde34cb1170e380ca760f143dc820676278ce271709467c89eb92d5a1e0af10
SHA512e6a330307c7c78ca3ea6a4900652ce666629a69097226637ed026bc21eb92be15493555e199fd913c0dddd2e70906050a7eb1853d0dbc91a73b689401f0bc9b9
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DFB5624A174C34E6E0.TMP
Filesize16KB
MD5c084305b7449bd8f09881d58b73dbbb0
SHA1f3d349f32de0e2bb13c3b6c1731dfdddfe0ac065
SHA256e121b0ae20effd4e42d8d81d7d09d22283e85e2053d14b74615790c6f563da55
SHA5121080c73ab4df3d819d9cff4997105643a518e5094f70411f04dea50057bf49aec155f00c3f7d305d5eac5da565288c27a85ade255e51a9486b049fe846c2a76d
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\155CATYK.cookie
Filesize216B
MD5b4f219cc6a5874423e715ce946fe8d82
SHA184eed63c406a5ff0121350f92f572813419a2465
SHA256a47544035e6a9db53c9f3b338bd3ecd26b1356332718c631a3e1d783b48ed5e3
SHA512dceedf4c168cc736376e65416c8f43d46f8079f25249764f3177e97d0c0a7c824637c99a448db3ad3e1967a8736fe802487bfb51d06a843d52d4008d2a7715d4
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\1BJ7CGUU.cookie
Filesize88B
MD5a9fd241bb860fc4ece5d542eff9b87c8
SHA1811063b18f74f3b47cd3ed5adda17243aa86ecff
SHA2569a0704b019c7f3fa84256f1ddb0ab13d48cfdddf4c292327e801f393a24d14ca
SHA51251805220b36d9ea96637281f58fff690d4431b2282dd2767c270aaa69742a79838c1643acea6cb762662b871f0d1f55caeb07307cdd35b76aef37e69f934b582
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\21FLMWF1.cookie
Filesize859B
MD5ed4ceedcd6012b60c76c2ed651bd6563
SHA154ab611cf8da8d0992b368c29733af804b05c48b
SHA256603be5fc4bc5024ace17d71688e2fc168ef0bd82d5b4cef38f00cac109c23e90
SHA5120a50ca361f7fb661f269805a6b62df8f678d87a73957c60dc8ff6e1aa1c24e9a10d0f25517d78b44b81fcba5cbb3d4cec79aeff4b2923cad6b163827b9f1a6e8
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\3T7NZL3Y.cookie
Filesize261B
MD5bf9c946b3a3759fc414c73acb91c0769
SHA10d34f60482ef166989df146cc7c5e5a8731ac310
SHA25674389b6fb243a70ca3aae99cd4272f96a3bc82b46ba794c066e84d49180b9a50
SHA512ed989980e7bccf1a8dad0fa05c06e6dc5a461699baa5fb6b00310e859ec9423f727d2546d969d7162d475406728d83bd600a5a890913a7ab998a19371c07bd2b
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\7XAC6XE8.cookie
Filesize972B
MD595d1f3a5c3f4ba187f98d651ff10babe
SHA131cc11601d4ff03f74a761d24288b9ce926d609a
SHA25684f1aab02ae037eef78255d4473f0dd5119699946405b055f262b22b3b80c882
SHA5123665b0741e87f140bb8a713498656679cc80d80f00a328084043fb182fe89c544951a463164b7666b942fd351dff6d98b01c74fb1c7828ea63f1b790f6cfe04e
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\8AYHFXL3.cookie
Filesize860B
MD54153140b9f10e2431984fea0cd3834b6
SHA15748e94666dd8d28aa26235f1f02e2dc5081e45a
SHA256ffde31a2144707c49f26f7b4727263bb9d17eecb36bbdfb0f1664342b88f0671
SHA5122da54b330b7e1c94dab6e3592f5c0e0f5c4979ea535d5e8ad273c2d92221cf28944fe167cc1692d867b4f37c98f49ab2821dd8be30f235ec7798ab2965bbf1da
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\8UK21QAZ.cookie
Filesize973B
MD5f9c00873dff228ebdd79ebd9d2a0a0ff
SHA1e0a850768491f68fc1934a9013c2f7bb72cb96f1
SHA256853054ed652a7562178f68ab26d9f8c6d42895a8af9fb806c2485e091d3296eb
SHA51230946f26a117a138558064c40a5cb46b38c686e5af762db0a51538632d4d244ca510411ff314c46cb1af842e1483f2ba9abb7ffb680ac451cf906435486c3bf8
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\A1M0BJK4.cookie
Filesize860B
MD5d4072933dd990cccfc1a60d5e0b878e8
SHA17407341e90b60c08e6fd06888d3f603f5fb5f74f
SHA256e6ef0f73e3e292316876c9c1dd794fea43750f43d1e0b005709564c4da666759
SHA51237db1a0b3598966ce573dcc826a29a564cb15cb73f17abed7dd7982a58d0cd29a55cfb3b00fe794e130da737cd980d4c42e72ac97285cfe31a8dbc9d9ca643c3
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\BNG4BBQZ.cookie
Filesize132B
MD504c96b690fb2c4ddd9e4de5e30c02b90
SHA1319b8d98acb0f7dc29d7fb5dba455710beffa6aa
SHA2562a620911016e0d77a38db189a06cb63022db78e7e2053137a2c174f226994155
SHA512b2b2afc3e8d8eee8a39a081f25210b6bfc87a5c7c6b93c79b7bcdddd7ce12c67dc164fe71b26cd0f42f47a2a7c4ca80bd8f0fcf11aaaa21c64ad4091ec6d0f9a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\G0HWFF9N.cookie
Filesize1KB
MD58e7fa6f7a8d3ccf0b1c606c561fb9f44
SHA110554937c5b2298396782738a1a4569a1aafed63
SHA256aacbd768e7c51d3d6ec0c20490bd224d4895538681dae2b3e39574e81b6c7b3a
SHA512e42e483851dc3d125bd0d7d3e3cec9c135108794d6f5190e38d98eae3792ac5ae59bf6252f4b3118a72de8a2fc8767b6b1c1456301688b90d9d45bf2df7d1fad
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\H9X212VL.cookie
Filesize860B
MD5a19234e3d75544bb6df92bcd586a560f
SHA1fc4d4bffcbec073a30586c3d7be37ab4191a220d
SHA256de4de7d4732adf3fb0f99cdbb5a3f4b5e781e4ed76bd9ac1795ab7cbe0e1f408
SHA512d47a63dce7aabacad2d77a8cd8f1b1cffb96dd3d8e1e1b993c7edb0b54d93a4b31fc575a1efea4491ae10ba3522618333ff19c5e2dd5ffda5e45c85321239fcc
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\HOYNWPBN.cookie
Filesize859B
MD5a1a4e2214ca77920f4f1865f5e32027f
SHA175d81f9acb0468078e03647c24618977682a4f0c
SHA2568b5f381aea526138cc213aad52aa447cee869ac208ad295b740a869fa825eb56
SHA5122ac2a69d966411adfa5b619a0f04237c21adc314904fae6b86118e495fceeffd58163cccbe66281555632a7f8d8f5af4bcf840588c47110389f87c9e196fd7ae
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\HWNNA4H2.cookie
Filesize132B
MD509329590f2cbc4321950f409bdb4a6ec
SHA1f4e80de601af4da4c80cf202276b2ef55f2afa35
SHA25666409ca62b976f3dbcab339dd36db2239f6701c7a8d5a8d3dadcc11e6589e85e
SHA512022b315c8029bbcf332380f96c7c93bb3ca16742ac2bd8d3ff4060aad1b332a33b42376023c0f88f40125d69dfcc4f89959178399ef9be06873472e7981a685f
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\M1N8M1QH.cookie
Filesize859B
MD59c5da21ee00775c994ed3b4fb7c91e3e
SHA1891a10cb56a8ef8b377469202f3d1070827ca4f3
SHA2560425c69f3a76ee62bc9c50392b84b6a90ee2d60fec0f2284e5319287c8a6c355
SHA5123b07ac089d1eace3ec57935d879202f12ab6880004a190cb3d17f2d1f7ef8beeb3ed49b27a7c57b1ac4cc38be42901d8bce7db2fa7c3aaeee648915c00dc068e
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\MS4O7F1K.cookie
Filesize859B
MD59b6cf4a1e6cb48aba9ee99668e977c90
SHA12addd184d9445f90ea7e6c1dd75f52c9e861eccd
SHA2567e7dcb5d6826abc36aa259af561ef21e02fdf38fc0745942961d0a4571267fc0
SHA5124f06d745890153a7831444625496825ef325c7c0841de3831eabb2b5b4dfb2ecd4b964f837157230e76bd6b1669702bf02ad1ace1374f928b534602012237f55
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\N5RFL91F.cookie
Filesize132B
MD53cdbb23145d4c0ddea3d7998d01c0565
SHA1b173d07eaeb4fdc3885a02c86cb85d5314348abd
SHA256b3b218758584bc19968a1115edc4354cc77b14cf4523f49387aec6a84921812e
SHA5125b1b69ead7d35ce0d3f4565c70addfcc67c29983ed6bfd48ed18a3d97586fae2731181fc57eb64209c9cc384c39bf0e89c297a767d5709f864569863b85522c6
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\OMKND72F.cookie
Filesize109B
MD5d5fce008fe14a5df1d74c73408adbf02
SHA17e02fd55c5bc629c45a180b2b569adae6bb534c5
SHA256518c98a1c1f6db1992819df78d5cf8efa05127c80ebda4990fce725d8d3f58a8
SHA5129df3e4a820b741bc25824de902d89a17d8716f83222a020c1051963dee1067143d9ab7f91ca45742e19523c0f10c655298193cdbd02ea42fd96608263795494b
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\OY2JHAVD.cookie
Filesize868B
MD51f4542f62f653006f68bd5ac2c9ad80e
SHA1834d1cbe429ef59563a888c402fba1e7569430a9
SHA2560bffb9c7d6524b55fdfca775f4b9679294de570623a4fd4a84d6edd214ab21d4
SHA51287f04ad43e33241eaa9d4a96f1fee960aed1846cc9dc271fcb314e2ab6fd49e714c74bba2c715749e02ecec934bd3ed233d1750b846bf7b863e8f2d4f7cc8eba
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\PVA31W22.cookie
Filesize859B
MD5a4db51465ff0766f20f997a2f191bf62
SHA1ad74f758023d2efaca367d40ee108b29802a918b
SHA2569d479f602947ba90792e99a03cc8fd3188f795dcdf05ddcfc7a0b5ab8eea11af
SHA5120930aceac36592a97db8b8a6d2eb3929b090caad79d6bfc4237ec5d78de1a4efa0fb912adb19de2fd8ea34c0085c9d5977b445aa214963720522c4a15afe8630
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\Q0EJ1N90.cookie
Filesize859B
MD5ccf5d36ebd78f683656441fb066e06ea
SHA150338ae72a10cae295197bae169e0b51dce7d3b1
SHA256f1c250c60fe45b06b9cdc92e1b8351075dd1dc3885941475a1114c7aa47f34f0
SHA512c9cea032784888b46599eab90a39c81521f408313355790375bce6f8577e9aebfe18e9ee055595b3251c2170681feb32d6b76d28a5be7d60a70ffe0f5b21fe92
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\SYVTPYOC.cookie
Filesize132B
MD58ed51762e2ce48a1f6e0039a938bed32
SHA1d5c4051aab4bbb98c53b745d50852ed60c39c354
SHA25663b3841245cea7c614f824f15c1497f70ed3c08e89df2713a827d232c76a0fcc
SHA512ab9486e4dccf54d966932e47e63597298b17894fb447dfe885f74b66dc4d3d42eb03458e0e753d0dab993c73a42b0ab1eb3aedeeb12fda177c319cfdebf4a6f0
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\VGZF781J.cookie
Filesize132B
MD5606e90b63c63c0ecf20253b20addaf10
SHA1d06be64a08c53c4a6b449bcf9d0ac74fd5917d52
SHA2563570f5e54626e288fa046df96697ea8f874672030208a5e03863a7c7aef16a30
SHA512abbdcf9940ed5f731870d0c9f1aabc53429fcbd7cb534f60a9c2ddf89f3f9498e74e624f89e8b64d1cf27829216edf9e3408278df0576d8b3d09d48631cdbf8a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\ZF2U9Q12.cookie
Filesize92B
MD5eb2877cc4ebd41f722891834d5099ce3
SHA1be705ff2fbecc574e36e66e02d96ae4d03d9f904
SHA2565341b9506a5c64d9ab4e06afa36495abb586bbed2bb50ad09999eab8a1e75799
SHA512c55c139cefe0e78beece8143dbe821f8a158066c23f82ea0aea455541004018e4e4ff918106392e69f659ed98604c14008c22f6b5ae3ecd34c9d1aab534f780c
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD50fea0cd16cc11b11ac8c150fb3634194
SHA16177ebd00f042f85604dbdaecaf80d845a729d08
SHA2567f6b33a6499fb7f05657e54842b4e7b75eda8f1198f5d22b19e31bdbede93673
SHA512cdfbb76b1ec06140c3cf39063a130d0790be088a8bfecc77115c0c8ddffac263f7b4b73288cee5380ae497624bb2a08a1c873aa762999560fda47d149a1cd19c
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize1KB
MD52fbf22bb6424ad393ea7ac94d16d4c8b
SHA1c56cf594bc597a6e010f7d88b75f5974b440e646
SHA256100144ee930df55ffb1498a587ba3133ee5c449abd1263b96089b188ecc6316d
SHA512afd5e4fa0d2d2aeff0a57d90192c66cc7adb2c1377dabe4d076ba2665bc678e2c19f8c06c0c1d4ed0e2da9876aa91c6b84384adfe4c0207da376d36a6374eb81
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize471B
MD5b21c8352904bfcb81461cedd135a9e55
SHA1217a36414a90a6bed75596c2bfe028b2fd867e7f
SHA256c9e0bfb608362df026751ad2efe01e2206690823877db4092aa4423246d90ca3
SHA51288760005621bd2d7839dd79914f5b80d54b226cd546faf5cf5724f13b5b9268a635e55bc4fff4d5d196726b25695c65fcc9b7111157bd79ddb56b774173cd705
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_524BBAFA66E109E6A3AAE054ADFDA005
Filesize471B
MD5ff04adc3a5288e22757671e4a9ad2dd8
SHA12ecd5642c175f83d63a49864f4df2c1b2b4212fc
SHA25647ee3290a621ba1f28f2bfe07a19358371e6d4fa1cbf4386c27c8d5e2ced0a96
SHA5122f818354d01c5e13475f7998189f4a5f673f2151594698da7aa61d51010f750f700442a5377eb8c4fd2c6859273c48edfe0a3ba0b14ba851fe2df813c60e12aa
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_524BBAFA66E109E6A3AAE054ADFDA005
Filesize471B
MD5ff04adc3a5288e22757671e4a9ad2dd8
SHA12ecd5642c175f83d63a49864f4df2c1b2b4212fc
SHA25647ee3290a621ba1f28f2bfe07a19358371e6d4fa1cbf4386c27c8d5e2ced0a96
SHA5122f818354d01c5e13475f7998189f4a5f673f2151594698da7aa61d51010f750f700442a5377eb8c4fd2c6859273c48edfe0a3ba0b14ba851fe2df813c60e12aa
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD52dfe20a75ef6630b42f10a9d2f3724a7
SHA17f42dbd047fb7e3003ae1bd18c2675793e5759d0
SHA256993e92f6c0db0c0d014db955d53290f07bee211bc96613374ea477ff02af147c
SHA5128c676355cbe8542d10cde0e3df53ef4fc9430ce1274d336b8e88a5658d594019707641b54ca39b2c7f0224af33ec793102e463213863a7dfa03037477ee6ed44
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize408B
MD52d2d1ec4e44a4b769b8f9c832eadbcba
SHA1f7c8ef5c11994189c14e606f038adf1f19326568
SHA256cc9bd1c6919b5d1e8f38d01cff9a2c720fc22301421e92487f572b31ec761e23
SHA512c0e6bd0dea508385a500dbc5f9ce43ed837ea85461ac3b1f9de56cc3f5a10b0cce6f0e4649b31c4b41f0569b6c72d901b4821b92ab81c73ed7bc222464c46e23
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5152eb13826c0e3023d695970b078de3b
SHA1036ae681437b0591d12a082a7bcd008ca46a69e3
SHA256003d96c4b14ce25b2a2aab1a25c73b256b284a38b00ac95b25eed76c5b6c40d4
SHA5128dd4ff7027a5444ee0c7400236353b2fc4f448d13f103e238ae098117a1b2a5087f5ee693ed9219604c17456a92df81c099a49ca968f26b33c981c0e342af190
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize400B
MD5e1a58d3bfd478728bb697ce9b973cd02
SHA148456a76eceec9626492df14d6affe1adf4b6b50
SHA2569192f7073ff0fe38bb9bc64c8cad7c3beccb9e7f3c3869b38d9cb93b0b6c869d
SHA5128a3db3dd890017050c86c4b7543b19cfb9624f6635006448e7bbbdcb1f4eb18144125c88abfc3e6c5bdfd65eac0170d0ab897ca8fcc6191dffd6880e03f87626
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_524BBAFA66E109E6A3AAE054ADFDA005
Filesize406B
MD5d8397031e00da748bc7b80bf00e9a786
SHA138e2c96a2684c3ea24ea7eb186c2800e06f39d27
SHA25689ba28483fd763297a9b394c2895febdee1644f9c3a4b7119680271662c3e3bd
SHA512d9191677830fac91c12936db454df2f2ee7c6a0761e30a2383ee8b1e3974e4c8a1115218c6fd96308fee82511fd6ac3e78e2414e81c49f53b118a832feffa0f4
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_524BBAFA66E109E6A3AAE054ADFDA005
Filesize406B
MD556579eb69cd751ed8b411e6def38acaa
SHA137c669a91d41be17abc1644b276efd95d201b5c2
SHA2565affadab4ea2ce732314355c4f98b0141f0a3472f96703574e559c11ac4e63e5
SHA51258b118b279a57071067769d6a7f1407fe164b55763f80113f15e7ab1e40256b1770fe54eb3264b6574a415e6e6f47851cd526a072482c324679c7c45e03496e7
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_524BBAFA66E109E6A3AAE054ADFDA005
Filesize406B
MD556579eb69cd751ed8b411e6def38acaa
SHA137c669a91d41be17abc1644b276efd95d201b5c2
SHA2565affadab4ea2ce732314355c4f98b0141f0a3472f96703574e559c11ac4e63e5
SHA51258b118b279a57071067769d6a7f1407fe164b55763f80113f15e7ab1e40256b1770fe54eb3264b6574a415e6e6f47851cd526a072482c324679c7c45e03496e7
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_524BBAFA66E109E6A3AAE054ADFDA005
Filesize406B
MD556579eb69cd751ed8b411e6def38acaa
SHA137c669a91d41be17abc1644b276efd95d201b5c2
SHA2565affadab4ea2ce732314355c4f98b0141f0a3472f96703574e559c11ac4e63e5
SHA51258b118b279a57071067769d6a7f1407fe164b55763f80113f15e7ab1e40256b1770fe54eb3264b6574a415e6e6f47851cd526a072482c324679c7c45e03496e7
-
Filesize
429B
MD50769624c4307afb42ff4d8602d7815ec
SHA1786853c829f4967a61858c2cdf4891b669ac4df9
SHA2567da27df04c56cf1aa11d427d9a3dff48b0d0df8c11f7090eb849abee6bfe421f
SHA512df8e4c6e50c74f5daf89b3585a98980ac1dbacf4cce641571f8999e4263078e5d14863dae9cf64be4c987671a21ebdce3bf8e210715f68c5e383cc4d55f53106
-
Filesize
89KB
MD5a72f1a8c712f60ad3f9fd4032d0d5a5b
SHA117242206d47330cae1a0e0a5ee576da1c3084660
SHA256fb5cd33e1f8b282007ab3e5cb7a22badc3bb5a2cf3a90a5ac24861a30e9b6692
SHA512fce7d43650c496730c2284e37d12cfa85f381377c41bc3ccf66efe19c2ac6f3dfc0c8120a66a43b58127ba6c52de0bca62698ecf5e9bd0ad37e87090017266d5
-
Filesize
89KB
MD59f2aba97012c5a9d4c426feb295d1a37
SHA1ca1d876647d9f2f4dc4f79e697a47322331d9b17
SHA256ca904fb15e705faa039ed4bb1d6bb24d68f4481cacfb8375740a434b980b99b1
SHA5127380a5a576553cc23f1f9d7b168e875eecc0de2d0528b4869b226b6a5472d367b228ac780270bb83c9f24ece296a1a932ff21dd4bf3241a94bc1477119cf0c26
-
Filesize
89KB
MD59f2aba97012c5a9d4c426feb295d1a37
SHA1ca1d876647d9f2f4dc4f79e697a47322331d9b17
SHA256ca904fb15e705faa039ed4bb1d6bb24d68f4481cacfb8375740a434b980b99b1
SHA5127380a5a576553cc23f1f9d7b168e875eecc0de2d0528b4869b226b6a5472d367b228ac780270bb83c9f24ece296a1a932ff21dd4bf3241a94bc1477119cf0c26
-
Filesize
1.4MB
MD5f88cd15bbc6393e97aaef59f0a0867b5
SHA1f9a44fe948219be42d4ed6dbabe44e2b07f40e28
SHA25635ccd4cfd972e633d6da87259f0520b2cbc41a7a55f7a7929efb5c7bfa7262c2
SHA512c13ab0ab3c6758e9420f0be1656abafd1da964290ec8ae9b8f8f49752982216f2003a294da4797086d1e80dffa586872c14354b5a47e0fea7dc7f6e47b65cb24
-
Filesize
1.4MB
MD5f88cd15bbc6393e97aaef59f0a0867b5
SHA1f9a44fe948219be42d4ed6dbabe44e2b07f40e28
SHA25635ccd4cfd972e633d6da87259f0520b2cbc41a7a55f7a7929efb5c7bfa7262c2
SHA512c13ab0ab3c6758e9420f0be1656abafd1da964290ec8ae9b8f8f49752982216f2003a294da4797086d1e80dffa586872c14354b5a47e0fea7dc7f6e47b65cb24
-
Filesize
183KB
MD5b0f29fdbc4de96f9098edb00b75df9ae
SHA1af7ab6d8fbe3b3425facff80a51eb571defd8f9c
SHA25641ede4bfedf4538d0669dd5c8578776f886a69df0351cbd6034e34f50c2e72e4
SHA512b70a43551eabb39dfb8310e7b56a2fe200216509d2189f9565ad01fbbecd1593f12bc8b6d1de1d998bb5b20371c98bbb5998f97cd6228496d4cb9f6840612244
-
Filesize
183KB
MD5b0f29fdbc4de96f9098edb00b75df9ae
SHA1af7ab6d8fbe3b3425facff80a51eb571defd8f9c
SHA25641ede4bfedf4538d0669dd5c8578776f886a69df0351cbd6034e34f50c2e72e4
SHA512b70a43551eabb39dfb8310e7b56a2fe200216509d2189f9565ad01fbbecd1593f12bc8b6d1de1d998bb5b20371c98bbb5998f97cd6228496d4cb9f6840612244
-
Filesize
1.2MB
MD51dbdf57a5d36a4b746828b7e8e290398
SHA14125eb865f30dd2252a6bf2ad70b15ea15f20525
SHA256acf5874763d9f11f5a942d197c5a279e59eca74ede6fce05204d440ab7182030
SHA5123a1ba904170be86a893198b73d13c4cd9084215086453dbec14f9db7b36ad72158b3f32e464dd0258570e20e8c89c862bbf63e36163139796ce415fb80af31e4
-
Filesize
1.2MB
MD51dbdf57a5d36a4b746828b7e8e290398
SHA14125eb865f30dd2252a6bf2ad70b15ea15f20525
SHA256acf5874763d9f11f5a942d197c5a279e59eca74ede6fce05204d440ab7182030
SHA5123a1ba904170be86a893198b73d13c4cd9084215086453dbec14f9db7b36ad72158b3f32e464dd0258570e20e8c89c862bbf63e36163139796ce415fb80af31e4
-
Filesize
220KB
MD532a48aa769cde5ccd0284514a5268295
SHA1506e018bc6cf5602821d2b156cd98b99fdc58083
SHA25617360926cf8bd0e46700cc88fcc0b018fea974933cceaa6cffeaba7fed825182
SHA512919d0a5c9a52f6410e8015d7908de01abc593acd642b3aaacf0e8088069dccd3a6cca5b167fa8171f24efd7cec56150ab3575a405747dd03cee3ddce25700a96
-
Filesize
220KB
MD532a48aa769cde5ccd0284514a5268295
SHA1506e018bc6cf5602821d2b156cd98b99fdc58083
SHA25617360926cf8bd0e46700cc88fcc0b018fea974933cceaa6cffeaba7fed825182
SHA512919d0a5c9a52f6410e8015d7908de01abc593acd642b3aaacf0e8088069dccd3a6cca5b167fa8171f24efd7cec56150ab3575a405747dd03cee3ddce25700a96
-
Filesize
1.0MB
MD500e547c012c0042a483b5160f25aaa32
SHA114694a35c3d4d12147c302fe06bcf24f88b46132
SHA25677399dd4047e04f86ac54e030e8346e2e8bf9bf016e5500c95e942fca8117db2
SHA512ab4a164c7fc2b733e8a1d9511a3cacc2f85fd6275cdc734a18ce1a903719884149cae70c73ec2285ab5a7fa0b11af1abcfc32a6969a04cc0548b35edd2c2948f
-
Filesize
1.0MB
MD500e547c012c0042a483b5160f25aaa32
SHA114694a35c3d4d12147c302fe06bcf24f88b46132
SHA25677399dd4047e04f86ac54e030e8346e2e8bf9bf016e5500c95e942fca8117db2
SHA512ab4a164c7fc2b733e8a1d9511a3cacc2f85fd6275cdc734a18ce1a903719884149cae70c73ec2285ab5a7fa0b11af1abcfc32a6969a04cc0548b35edd2c2948f
-
Filesize
1.1MB
MD596e7f7bb87878d20e8df33e2bb80e39e
SHA186e5d9977486db5126af985115ed64d542240952
SHA2563f569e5c7bf6404540b78d333d8a7408c9ed21fef83eaf9e6255486160a06276
SHA512da66c9733b93e5acbc0747f861a97ae890b72280900089572892d83ddaf08452301771d946c1721fa5538da1acdb5abdf69504c7996737c19233a0a7168d2a13
-
Filesize
1.1MB
MD596e7f7bb87878d20e8df33e2bb80e39e
SHA186e5d9977486db5126af985115ed64d542240952
SHA2563f569e5c7bf6404540b78d333d8a7408c9ed21fef83eaf9e6255486160a06276
SHA512da66c9733b93e5acbc0747f861a97ae890b72280900089572892d83ddaf08452301771d946c1721fa5538da1acdb5abdf69504c7996737c19233a0a7168d2a13
-
Filesize
645KB
MD55c7efd9ec3e27bb93244365f3ccf6bd7
SHA18cff2506763935140038ddfd27738d40ebf05eab
SHA256eb3bd6af828d49516b571018684b6f164a7f79bb71c38674e37a085ab5813352
SHA512ea7f94292cb9c024af86dd3176afb4daa7940d2fc6c3616bbba3d9493251273ab921916a04f6a5fd629a5204199ea9dac8948bd03a5031333773e695bf32ac20
-
Filesize
645KB
MD55c7efd9ec3e27bb93244365f3ccf6bd7
SHA18cff2506763935140038ddfd27738d40ebf05eab
SHA256eb3bd6af828d49516b571018684b6f164a7f79bb71c38674e37a085ab5813352
SHA512ea7f94292cb9c024af86dd3176afb4daa7940d2fc6c3616bbba3d9493251273ab921916a04f6a5fd629a5204199ea9dac8948bd03a5031333773e695bf32ac20
-
Filesize
30KB
MD5d84569a706b9c209fe691fb20af40afe
SHA12fd9b3710be51ee7318be4b905cf17447331cc73
SHA2568225d0527e3a0ad5fd83412ed5d2c026ed2677b3f8f221160d64e5bbbe492838
SHA512c346a73bb0710f520524e3b0680f14c9e53428842850c000d5a1d02fcfda0014f57d619e295ad3b45bb31724e6edb69229e77d1ab73a082620ab0ba1cdc9feee
-
Filesize
30KB
MD5d84569a706b9c209fe691fb20af40afe
SHA12fd9b3710be51ee7318be4b905cf17447331cc73
SHA2568225d0527e3a0ad5fd83412ed5d2c026ed2677b3f8f221160d64e5bbbe492838
SHA512c346a73bb0710f520524e3b0680f14c9e53428842850c000d5a1d02fcfda0014f57d619e295ad3b45bb31724e6edb69229e77d1ab73a082620ab0ba1cdc9feee
-
Filesize
184KB
MD5af4f1ccd1ff3950e341aaef9168c0488
SHA1315ab69c4d2d067e0b2371cde32b6036f909996a
SHA2567e6b4a33ffd00b61125e29c719783d2ed16d91efe9b1c6f8318997aa7b95778a
SHA51269f3a3a09bdbe644994eef98fc5a320e5ecf348b5000713f260ec064eb53a32c76046945fd70bbb9603c9e0246f3cbb9d361687d90f0677bc7aa69062e5b4fe9
-
Filesize
521KB
MD57f35d65926d1b28d7e70210e085c6caf
SHA1461a90b25f1c893a50394ec5f7765761892a40f1
SHA256c55be9f930e9865d003860a3f6389c6e3e70dd04879076d6c654387c79e7cfae
SHA512e1d511dde2beb736c7f745bcc72ac30827ef82e4fe6d4410701b735e45c2ad56483fea01ddcda331e9420c4d6c76eab1170a64ed6acabd72f8ca3765d3158c0e
-
Filesize
521KB
MD57f35d65926d1b28d7e70210e085c6caf
SHA1461a90b25f1c893a50394ec5f7765761892a40f1
SHA256c55be9f930e9865d003860a3f6389c6e3e70dd04879076d6c654387c79e7cfae
SHA512e1d511dde2beb736c7f745bcc72ac30827ef82e4fe6d4410701b735e45c2ad56483fea01ddcda331e9420c4d6c76eab1170a64ed6acabd72f8ca3765d3158c0e
-
Filesize
878KB
MD5010bf0c94334d77fdcd5ebf4c268a1f2
SHA1dbbf0d948f8eb38a89081c350ed15a6d5237b234
SHA2565cbe4f941a16573029af6f3d4339e987280ad08f7fe84aae64627c182fe95fcd
SHA512033ba8a967f16a25245fa384d132fdb1b8b0ad28620987a81824261317c19dcdf1e7a935ea3d901596f9a4030cebeff27379ad745d920f47c300a4ddb2460e85
-
Filesize
878KB
MD5010bf0c94334d77fdcd5ebf4c268a1f2
SHA1dbbf0d948f8eb38a89081c350ed15a6d5237b234
SHA2565cbe4f941a16573029af6f3d4339e987280ad08f7fe84aae64627c182fe95fcd
SHA512033ba8a967f16a25245fa384d132fdb1b8b0ad28620987a81824261317c19dcdf1e7a935ea3d901596f9a4030cebeff27379ad745d920f47c300a4ddb2460e85
-
Filesize
1.1MB
MD5b14d236952119c720e5dd5981abcf5ac
SHA15fe5e42551f0339ee787f0e14c4b0d347031cbcc
SHA256587a9ec0924567e8ae88d08796671f0f6a39fb31cd7e53fe268fc7b83f3af1f6
SHA512dc2c37208b00c4188b05285d70735497407a3217ed4218fed6a7ff716994e59004ae6f824538a01b2dc82e540f91bf53aa5e51905fc7f59c414b997870fcbda8
-
Filesize
1.1MB
MD5b14d236952119c720e5dd5981abcf5ac
SHA15fe5e42551f0339ee787f0e14c4b0d347031cbcc
SHA256587a9ec0924567e8ae88d08796671f0f6a39fb31cd7e53fe268fc7b83f3af1f6
SHA512dc2c37208b00c4188b05285d70735497407a3217ed4218fed6a7ff716994e59004ae6f824538a01b2dc82e540f91bf53aa5e51905fc7f59c414b997870fcbda8
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
220KB
MD532a48aa769cde5ccd0284514a5268295
SHA1506e018bc6cf5602821d2b156cd98b99fdc58083
SHA25617360926cf8bd0e46700cc88fcc0b018fea974933cceaa6cffeaba7fed825182
SHA512919d0a5c9a52f6410e8015d7908de01abc593acd642b3aaacf0e8088069dccd3a6cca5b167fa8171f24efd7cec56150ab3575a405747dd03cee3ddce25700a96
-
Filesize
220KB
MD532a48aa769cde5ccd0284514a5268295
SHA1506e018bc6cf5602821d2b156cd98b99fdc58083
SHA25617360926cf8bd0e46700cc88fcc0b018fea974933cceaa6cffeaba7fed825182
SHA512919d0a5c9a52f6410e8015d7908de01abc593acd642b3aaacf0e8088069dccd3a6cca5b167fa8171f24efd7cec56150ab3575a405747dd03cee3ddce25700a96
-
Filesize
220KB
MD532a48aa769cde5ccd0284514a5268295
SHA1506e018bc6cf5602821d2b156cd98b99fdc58083
SHA25617360926cf8bd0e46700cc88fcc0b018fea974933cceaa6cffeaba7fed825182
SHA512919d0a5c9a52f6410e8015d7908de01abc593acd642b3aaacf0e8088069dccd3a6cca5b167fa8171f24efd7cec56150ab3575a405747dd03cee3ddce25700a96
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD53f194152deb86dd24c32d81e7749d57e
SHA1b1c3b2d10013dfd65ef8d44fd475ac76e1815203
SHA2569cad93e2e9da675749e0e07f1b61d65ab1333b17a82b9daeaac035646dcbc5aa
SHA512c4e922f8c3a304d2faf7148c47f202e5062c419ff0d1330b1626f3e2077642e850377a531fe7ac7f935f22b1b64cfab5169305d6ad79fc8bda49dbff37f98fbf
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
177KB
MD56e68805f0661dbeb776db896761d469f
SHA195e550b2f54e9167ae02f67e963703c593833845
SHA256095e2b0ed70525cf5a7a5c31241aad5c27964fd69d68569c646a158c0ff50b47
SHA5125cf25502b2fc8ab34b777b490493c8974af15135e8ff81f43ff254b910f74ee5cece6848ca4a5adae54b8cbf895362f268fd1665705f39bee27f395ea5c04efc
-
Filesize
4.1MB
MD589c82822be2e2bf37b5d80d575ef2ec8
SHA19fe2fad2faff04ad5e8d035b98676dedd5817eca
SHA2566fea30b9d17eacffde43b727058b5b2c422a7b70407534549042ba7b20d5f8c9
SHA512142ca76bc32cc60c11f640bd9e050df6000b6824a192595416f661d22d6e52704dfd369974d7f2f73d01eaa356237c50778737d72d5588c5a2ff8a8010ee8101