Analysis

  • max time kernel
    651s
  • max time network
    665s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2023 02:45

General

  • Target

    https://cdn.discordapp.com/attachments/1128768775949389844/1170554457503838258/ConsoleApplication1_protected.exe?ex=655976ca&is=654701ca&hm=9359f9c36307ef7f4d225a9451f15ee3d8fc911ca490483440dc9abb34ffe355&

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1170536634891128902/hdNxkvpSxRXfW2ouud2imDE8eFbcAfoi3fBBxpcoRyxI8E-rxHT7NHLuI-Q-ThYq7M3H

Signatures

  • Detect Umbral payload 10 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 13 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Detected potential entity reuse from brand microsoft.
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1128768775949389844/1170554457503838258/ConsoleApplication1_protected.exe?ex=655976ca&is=654701ca&hm=9359f9c36307ef7f4d225a9451f15ee3d8fc911ca490483440dc9abb34ffe355&
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd13539758,0x7ffd13539768,0x7ffd13539778
      2⤵
        PID:1452
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1876,i,6902293016757657237,10859062570779332197,131072 /prefetch:8
        2⤵
          PID:2308
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 --field-trial-handle=1876,i,6902293016757657237,10859062570779332197,131072 /prefetch:8
          2⤵
            PID:4628
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1876,i,6902293016757657237,10859062570779332197,131072 /prefetch:2
            2⤵
              PID:3056
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1876,i,6902293016757657237,10859062570779332197,131072 /prefetch:1
              2⤵
                PID:4604
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1876,i,6902293016757657237,10859062570779332197,131072 /prefetch:1
                2⤵
                  PID:2640
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 --field-trial-handle=1876,i,6902293016757657237,10859062570779332197,131072 /prefetch:8
                  2⤵
                    PID:2180
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5248 --field-trial-handle=1876,i,6902293016757657237,10859062570779332197,131072 /prefetch:8
                    2⤵
                      PID:4136
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5232 --field-trial-handle=1876,i,6902293016757657237,10859062570779332197,131072 /prefetch:8
                      2⤵
                        PID:1968
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5560 --field-trial-handle=1876,i,6902293016757657237,10859062570779332197,131072 /prefetch:1
                        2⤵
                          PID:500
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 --field-trial-handle=1876,i,6902293016757657237,10859062570779332197,131072 /prefetch:8
                          2⤵
                            PID:3556
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2840 --field-trial-handle=1876,i,6902293016757657237,10859062570779332197,131072 /prefetch:8
                            2⤵
                              PID:5016
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5352 --field-trial-handle=1876,i,6902293016757657237,10859062570779332197,131072 /prefetch:8
                              2⤵
                                PID:2608
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5044 --field-trial-handle=1876,i,6902293016757657237,10859062570779332197,131072 /prefetch:8
                                2⤵
                                  PID:2232
                                • C:\Users\Admin\Downloads\ConsoleApplication1_protected.exe
                                  "C:\Users\Admin\Downloads\ConsoleApplication1_protected.exe"
                                  2⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Checks whether UAC is enabled
                                  • Drops file in System32 directory
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  PID:1352
                                  • C:\Windows\System32\Speech\rzVcer4bmE4Jex7MrYlM6wXs8CdoRpwG.exe
                                    C:\Windows\System32\Speech\rzVcer4bmE4Jex7MrYlM6wXs8CdoRpwG.exe
                                    3⤵
                                    • Executes dropped EXE
                                    PID:224
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=rzVcer4bmE4Jex7MrYlM6wXs8CdoRpwG.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
                                      4⤵
                                      • Enumerates system info in registry
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      PID:2108
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfa1a46f8,0x7ffcfa1a4708,0x7ffcfa1a4718
                                        5⤵
                                          PID:4536
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,10929851898995046051,11894231851040303454,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:3
                                          5⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:1136
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,10929851898995046051,11894231851040303454,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:8
                                          5⤵
                                            PID:1792
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,10929851898995046051,11894231851040303454,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:2
                                            5⤵
                                              PID:1716
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10929851898995046051,11894231851040303454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
                                              5⤵
                                                PID:2184
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10929851898995046051,11894231851040303454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:1
                                                5⤵
                                                  PID:2792
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10929851898995046051,11894231851040303454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:1
                                                  5⤵
                                                    PID:5336
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10929851898995046051,11894231851040303454,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:1
                                                    5⤵
                                                      PID:5580
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10929851898995046051,11894231851040303454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3624 /prefetch:1
                                                      5⤵
                                                        PID:5560
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10929851898995046051,11894231851040303454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:1
                                                        5⤵
                                                          PID:6020
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10929851898995046051,11894231851040303454,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6236 /prefetch:1
                                                          5⤵
                                                            PID:6052
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10929851898995046051,11894231851040303454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6208 /prefetch:1
                                                            5⤵
                                                              PID:6044
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10929851898995046051,11894231851040303454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:1
                                                              5⤵
                                                                PID:6012
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,10929851898995046051,11894231851040303454,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:8
                                                                5⤵
                                                                  PID:5688
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,10929851898995046051,11894231851040303454,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:8
                                                                  5⤵
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:5596
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,10929851898995046051,11894231851040303454,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5712 /prefetch:2
                                                                  5⤵
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:3140
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=rzVcer4bmE4Jex7MrYlM6wXs8CdoRpwG.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
                                                                4⤵
                                                                  PID:1388
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,15440938358528659475,18361980280125306496,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:3
                                                                    5⤵
                                                                      PID:5344
                                                                • C:\Windows\System32\Speech\QrxHeK2MIlvo2rANCX01CYgpVLo0XuIi.exe
                                                                  C:\Windows\System32\Speech\QrxHeK2MIlvo2rANCX01CYgpVLo0XuIi.exe
                                                                  3⤵
                                                                  • Drops file in Drivers directory
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:1428
                                                                  • C:\Windows\SYSTEM32\attrib.exe
                                                                    "attrib.exe" +h +s "C:\Windows\System32\Speech\QrxHeK2MIlvo2rANCX01CYgpVLo0XuIi.exe"
                                                                    4⤵
                                                                    • Drops file in System32 directory
                                                                    • Views/modifies file attributes
                                                                    PID:768
                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Windows\System32\Speech\QrxHeK2MIlvo2rANCX01CYgpVLo0XuIi.exe'
                                                                    4⤵
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:4664
                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
                                                                    4⤵
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:3344
                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                    4⤵
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:5808
                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                    4⤵
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:4040
                                                                  • C:\Windows\System32\Wbem\wmic.exe
                                                                    "wmic.exe" os get Caption
                                                                    4⤵
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:656
                                                                  • C:\Windows\System32\Wbem\wmic.exe
                                                                    "wmic.exe" computersystem get totalphysicalmemory
                                                                    4⤵
                                                                      PID:5124
                                                                    • C:\Windows\System32\Wbem\wmic.exe
                                                                      "wmic.exe" csproduct get uuid
                                                                      4⤵
                                                                        PID:2232
                                                                        • C:\Windows\System32\Conhost.exe
                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          5⤵
                                                                            PID:2792
                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                                                                          4⤵
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:5464
                                                                        • C:\Windows\System32\Wbem\wmic.exe
                                                                          "wmic" path win32_VideoController get name
                                                                          4⤵
                                                                          • Detects videocard installed
                                                                          PID:5712
                                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                                          "cmd.exe" /c ping localhost && del /F /A h "C:\Windows\System32\Speech\QrxHeK2MIlvo2rANCX01CYgpVLo0XuIi.exe" && pause
                                                                          4⤵
                                                                            PID:2164
                                                                            • C:\Windows\system32\PING.EXE
                                                                              ping localhost
                                                                              5⤵
                                                                              • Runs ping.exe
                                                                              PID:220
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c pause
                                                                          3⤵
                                                                            PID:656
                                                                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                                        1⤵
                                                                          PID:1392
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfa1a46f8,0x7ffcfa1a4708,0x7ffcfa1a4718
                                                                          1⤵
                                                                            PID:2032
                                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                            1⤵
                                                                              PID:5572
                                                                            • C:\Windows\System32\CompPkgSrv.exe
                                                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                              1⤵
                                                                                PID:5832

                                                                              Network

                                                                              MITRE ATT&CK Enterprise v15

                                                                              Replay Monitor

                                                                              Loading Replay Monitor...

                                                                              Downloads

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies

                                                                                Filesize

                                                                                20KB

                                                                                MD5

                                                                                9522800b033a2c9f04a5a9b03d9ee791

                                                                                SHA1

                                                                                0e2ae36c1695907c90dd8f64569b954113854d14

                                                                                SHA256

                                                                                cf80433fcf970acb3d6b53eef899825aa5967840d7892e3e9786be62358926cb

                                                                                SHA512

                                                                                f45502c5a61844ce3890ee2ba2f2e414f1ecaa0cbf33c7ff9a092fb63af5684a993d56a4b75cbd6c626c85e2c6c41eff6e8fc83ddf3e0c9f09cdb409c893f6dd

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                                Filesize

                                                                                1KB

                                                                                MD5

                                                                                b82fe560149bde79e75fed2c508fb6c1

                                                                                SHA1

                                                                                4d772bf5caf6be4de6bee98bbdc8b39c14a6e8be

                                                                                SHA256

                                                                                986e273bf90c7c77ff04b98a51cda35cc7c0e6266282b0a67ed039f2cf7ab462

                                                                                SHA512

                                                                                58b57a81ca7a8d33e779375582c56243e5f669ce936d91ccc496db189104b6829f1d14fa649dcf1ab10a9c1945df513193829c64a88e9110a40b6fd734cd1960

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                Filesize

                                                                                5KB

                                                                                MD5

                                                                                87914e2ac624d03e100462ea6d11178c

                                                                                SHA1

                                                                                4f4a190bb0ecdd412afb81076275981ea26d84ff

                                                                                SHA256

                                                                                935d8e85158f8de961e124c670b9678476119e2cd245486a84fbf8780f2e0ac8

                                                                                SHA512

                                                                                cdcacac1286bbe8ad4cd744531d3233108fe71b01600299e50f83acc6d1c63b8a1ffc48a50611d82432e97d9211d785bdf09baf0028a06f3061c60f0e21d19bf

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                Filesize

                                                                                5KB

                                                                                MD5

                                                                                df40ae514fbb1b6bc5f8ffee9a817687

                                                                                SHA1

                                                                                2f2b001e06b8788104f02b97cd45150e754534c3

                                                                                SHA256

                                                                                a359d6012642d92743316b7fc59394ed88a02578a5ca0c6a009ab0377af9ae13

                                                                                SHA512

                                                                                d1b065df29b70a4ef3ce8db0d801e3cfb94db299590dad9acd5059410ae7f61052f0935df491cd392ebc49fa3f8f8fbb6ff3527d580f4f1e0ce68fb7ce72bc6a

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000003.log

                                                                                Filesize

                                                                                8KB

                                                                                MD5

                                                                                66a7adb74aa694413b5bf4a0a47be6e3

                                                                                SHA1

                                                                                1e59141c47dddf685f360e65a520156a54c9e373

                                                                                SHA256

                                                                                c61ec87889a9117a1dba2eb4120174a710e6475e91bc521a32bae71784a13307

                                                                                SHA512

                                                                                37e9130f77e9bbb456b8833c6922223ef9db3a720bcdaabb716fb512d0fcca2079577f52d3df14c2caca6b0a4e3db4ef11d271c0496ad3a2752fb33e839c1b53

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                Filesize

                                                                                109KB

                                                                                MD5

                                                                                c267c239c635b4f14aff3799ca099726

                                                                                SHA1

                                                                                ebb639c34128a2f4d2408a86a2263441624b42df

                                                                                SHA256

                                                                                b2606171075144bb1d6d11ee57b214508b4cb60eb70138ccdb519a94d1c03b64

                                                                                SHA512

                                                                                4b5dba1871385f0ddc6772a4dc5fcd638c38266d393d19e692e0f46789528e53a89e7a15714a2642aa91d245fe175f4e0278096131d97a903f8b36b40eafcec9

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                Filesize

                                                                                109KB

                                                                                MD5

                                                                                688d1fce2250b6e4356e565abf653536

                                                                                SHA1

                                                                                72e7fe2af00ce26872cd490a8613495086a25377

                                                                                SHA256

                                                                                b3edbca71362f210d52ba6d646353d33fe6ba0fa1ada5b643d46eea18be5746b

                                                                                SHA512

                                                                                9672cf7e9e3910f33a330cfcd127453150a127de8fcb8c2f539560be92d070505602a52948a2b4490c83d42ae452f04287fa08178eadae169f5de00a797a6853

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                Filesize

                                                                                109KB

                                                                                MD5

                                                                                688d1fce2250b6e4356e565abf653536

                                                                                SHA1

                                                                                72e7fe2af00ce26872cd490a8613495086a25377

                                                                                SHA256

                                                                                b3edbca71362f210d52ba6d646353d33fe6ba0fa1ada5b643d46eea18be5746b

                                                                                SHA512

                                                                                9672cf7e9e3910f33a330cfcd127453150a127de8fcb8c2f539560be92d070505602a52948a2b4490c83d42ae452f04287fa08178eadae169f5de00a797a6853

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                                                                Filesize

                                                                                264KB

                                                                                MD5

                                                                                f50f89a0a91564d0b8a211f8921aa7de

                                                                                SHA1

                                                                                112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                SHA256

                                                                                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                SHA512

                                                                                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                                                                Filesize

                                                                                2B

                                                                                MD5

                                                                                99914b932bd37a50b983c5e7c90ae93b

                                                                                SHA1

                                                                                bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                                                SHA256

                                                                                44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                                                SHA512

                                                                                27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                Filesize

                                                                                2KB

                                                                                MD5

                                                                                d85ba6ff808d9e5444a4b369f5bc2730

                                                                                SHA1

                                                                                31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                SHA256

                                                                                84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                SHA512

                                                                                8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                Filesize

                                                                                152B

                                                                                MD5

                                                                                f4787679d96bf7263d9a34ce31dea7e4

                                                                                SHA1

                                                                                ebbade52b0a07d888ae0221ad89081902e6e7f1b

                                                                                SHA256

                                                                                bfcadaffd49f5351acf68b8249b32270424bc2459125818492cd3224662a9a87

                                                                                SHA512

                                                                                de3f3d1cd602bddb664bd0d2aecb661204dd239b278b1f03d6b9dca6f3d03bd3041ac42f4382f5edf5b310b17ff9ecddff59f16729e8c095625040a364252307

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                Filesize

                                                                                152B

                                                                                MD5

                                                                                f4787679d96bf7263d9a34ce31dea7e4

                                                                                SHA1

                                                                                ebbade52b0a07d888ae0221ad89081902e6e7f1b

                                                                                SHA256

                                                                                bfcadaffd49f5351acf68b8249b32270424bc2459125818492cd3224662a9a87

                                                                                SHA512

                                                                                de3f3d1cd602bddb664bd0d2aecb661204dd239b278b1f03d6b9dca6f3d03bd3041ac42f4382f5edf5b310b17ff9ecddff59f16729e8c095625040a364252307

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                Filesize

                                                                                152B

                                                                                MD5

                                                                                f4787679d96bf7263d9a34ce31dea7e4

                                                                                SHA1

                                                                                ebbade52b0a07d888ae0221ad89081902e6e7f1b

                                                                                SHA256

                                                                                bfcadaffd49f5351acf68b8249b32270424bc2459125818492cd3224662a9a87

                                                                                SHA512

                                                                                de3f3d1cd602bddb664bd0d2aecb661204dd239b278b1f03d6b9dca6f3d03bd3041ac42f4382f5edf5b310b17ff9ecddff59f16729e8c095625040a364252307

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                Filesize

                                                                                152B

                                                                                MD5

                                                                                f4787679d96bf7263d9a34ce31dea7e4

                                                                                SHA1

                                                                                ebbade52b0a07d888ae0221ad89081902e6e7f1b

                                                                                SHA256

                                                                                bfcadaffd49f5351acf68b8249b32270424bc2459125818492cd3224662a9a87

                                                                                SHA512

                                                                                de3f3d1cd602bddb664bd0d2aecb661204dd239b278b1f03d6b9dca6f3d03bd3041ac42f4382f5edf5b310b17ff9ecddff59f16729e8c095625040a364252307

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                Filesize

                                                                                152B

                                                                                MD5

                                                                                f4787679d96bf7263d9a34ce31dea7e4

                                                                                SHA1

                                                                                ebbade52b0a07d888ae0221ad89081902e6e7f1b

                                                                                SHA256

                                                                                bfcadaffd49f5351acf68b8249b32270424bc2459125818492cd3224662a9a87

                                                                                SHA512

                                                                                de3f3d1cd602bddb664bd0d2aecb661204dd239b278b1f03d6b9dca6f3d03bd3041ac42f4382f5edf5b310b17ff9ecddff59f16729e8c095625040a364252307

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                Filesize

                                                                                152B

                                                                                MD5

                                                                                f4787679d96bf7263d9a34ce31dea7e4

                                                                                SHA1

                                                                                ebbade52b0a07d888ae0221ad89081902e6e7f1b

                                                                                SHA256

                                                                                bfcadaffd49f5351acf68b8249b32270424bc2459125818492cd3224662a9a87

                                                                                SHA512

                                                                                de3f3d1cd602bddb664bd0d2aecb661204dd239b278b1f03d6b9dca6f3d03bd3041ac42f4382f5edf5b310b17ff9ecddff59f16729e8c095625040a364252307

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                Filesize

                                                                                216B

                                                                                MD5

                                                                                f4bef6bb1728af18a9afe513a1de85eb

                                                                                SHA1

                                                                                24ea31c5e4f945b14b37b42e2d6d9bd889c23527

                                                                                SHA256

                                                                                104190dca118fd486d2e8d897ef350537404fae9871c5f8f3b6dea2b641f4164

                                                                                SHA512

                                                                                46832462ca183cd33157c0bd68d730f0d44fd068765dbda232396046b8f353256472ab4ef7d4206dc171f8f0f36ab8e5aaec7f687e10da9332e06d379e417e56

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                Filesize

                                                                                111B

                                                                                MD5

                                                                                285252a2f6327d41eab203dc2f402c67

                                                                                SHA1

                                                                                acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                                                SHA256

                                                                                5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                                                SHA512

                                                                                11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                Filesize

                                                                                437B

                                                                                MD5

                                                                                05592d6b429a6209d372dba7629ce97c

                                                                                SHA1

                                                                                b4d45e956e3ec9651d4e1e045b887c7ccbdde326

                                                                                SHA256

                                                                                3aacb982b8861c38a392829ee3156d05dfdd46b0ecb46154f0ea9374557bc0fd

                                                                                SHA512

                                                                                caa85bdccabea9250e8a5291f987b8d54362a7b3eec861c56f79cebb06277aa35d411e657ec632079f46affd4d6730e82115e7b317fbda55dacc16378528abaa

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                Filesize

                                                                                5KB

                                                                                MD5

                                                                                3087140bbd27850bf0755e0b65c51334

                                                                                SHA1

                                                                                fdd4b5e54a726ff9f6d5753d2563913a8444fb9d

                                                                                SHA256

                                                                                44a36906745f0bf6c8836f6f8ac3c20ef2b88bad96c8caef1bd74618de0f5780

                                                                                SHA512

                                                                                470a015a9472bf753bb8829b47270669f8e1b03c6ebd472428ae2a380e95daf0e845cf93ebfc5ee4a3321139b103b22f9667e3b2636217fdedc07baa9287a3a8

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                Filesize

                                                                                5KB

                                                                                MD5

                                                                                c6118505cc0a0523149334f4074a5a66

                                                                                SHA1

                                                                                0c3223c32cc02fe40c76037f9f736d092fb7740e

                                                                                SHA256

                                                                                bbca4a81d4e2a02214db7ba4749698c0feb99ef5346e530d50b5ebb5a23824f7

                                                                                SHA512

                                                                                ce7855ad4fe7e3601756ef639bff3a3e672f25245031b5a31c3b0b1ef9573463124c1b053814302ca7281a421f47f6d71e14eab116dc671eca216d9f0420b266

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                Filesize

                                                                                5KB

                                                                                MD5

                                                                                9a6b6b54b30d81763535bec6ab223ee3

                                                                                SHA1

                                                                                e559930cd62919f5300417609d652e972d62d105

                                                                                SHA256

                                                                                aeb30315ad3a44468385c1881abfdaaa0af6ca1a644f661af64cba7ca973723e

                                                                                SHA512

                                                                                8a55877949bd764b266249386829087c7350ea80c80513d5a6b6321aa5a9a502cea1e1d46bb11545cdfde45b4c9b54c1f6f2232899a4e43ba4acf7898ad9582a

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                                Filesize

                                                                                24KB

                                                                                MD5

                                                                                3a748249c8b0e04e77ad0d6723e564ff

                                                                                SHA1

                                                                                5c4cc0e5453c13ffc91f259ccb36acfb3d3fa729

                                                                                SHA256

                                                                                f98f5543c33c0b85b191bb85718ee7845982275130da1f09e904d220f1c6ceed

                                                                                SHA512

                                                                                53254db3efd9c075e4f24a915e0963563ce4df26d4771925199a605cd111ae5025a65f778b4d4ed8a9b3e83b558066cd314f37b84115d4d24c58207760174af2

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                Filesize

                                                                                369B

                                                                                MD5

                                                                                e7c5929cbb0e9f61ccae6dee8049df72

                                                                                SHA1

                                                                                311dc41c649233f10b3dbdd85a586d66c7779081

                                                                                SHA256

                                                                                c11c1cc784b0eb60478fbd0a2dc39d18306bc50fb105f34e92dba6cf4cf9e9c9

                                                                                SHA512

                                                                                77c2d4b0c0c9d6b80c815131951bca63e3f6c3b57a8829a128838f7ff2615f16a9cb13001e1ede7c7606dada1b0dc357ebaa32c79847928286557fdc77a48d1f

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                Filesize

                                                                                369B

                                                                                MD5

                                                                                074dcbaa7ab6f4e459a164a29e184782

                                                                                SHA1

                                                                                380b06cd02057511bc759eda54cf28e0146d39c6

                                                                                SHA256

                                                                                f244cacf8af4e2f995dcbcb8ddd0ff833deb88a14785e7a173096969b2e27e60

                                                                                SHA512

                                                                                a4647ce44420171f39eb048648c8463e153d495c94846ad2fa7905a72e9c1d45a4fe4254642b61cba3fb4d5211d2f9febfeeb94f01de2e9c3e4a9bcdded5c91f

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5922c1.TMP

                                                                                Filesize

                                                                                203B

                                                                                MD5

                                                                                305ec237cc4b7ef44fec91c5bc197b8e

                                                                                SHA1

                                                                                a3ef5e16707a9fd9caf729379df0344722b5f1d9

                                                                                SHA256

                                                                                9e6f71baa6e63585f5af88114cd6b3624aa9b8fabc92c9f2902fa373bb7f0391

                                                                                SHA512

                                                                                e9594bfde04b32ba290c027e51ab566d8dd8405c023ec92db21e7b1f2638dc8ae5d6f332ec324253f49126096c4570b5a1fa48db69e41cef99fc7b02cc8276fc

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                Filesize

                                                                                16B

                                                                                MD5

                                                                                6752a1d65b201c13b62ea44016eb221f

                                                                                SHA1

                                                                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                SHA256

                                                                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                SHA512

                                                                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                Filesize

                                                                                2KB

                                                                                MD5

                                                                                2eabde95116c9eac3afcc3a9c27b38b5

                                                                                SHA1

                                                                                3367b6f7534e412a0083be776577c86b87f25cf3

                                                                                SHA256

                                                                                1196870c862256f843a743d101e8f23640589c9fc9a2a9dd044681fe27fd09ab

                                                                                SHA512

                                                                                3a099635c4df691e0d0cc905ea8dfb5439ece1120e7d6c697517b994ae0c444c031d726d83b49bb52e3059e3e8a4d82f25f612d863e24a82abb8627130509dd9

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                Filesize

                                                                                10KB

                                                                                MD5

                                                                                3f41132b8cd64bbf00d21e653d939bd4

                                                                                SHA1

                                                                                162b569f6c7dcd1607c8e9bb48a94fa62bc0dc6e

                                                                                SHA256

                                                                                c75f923087f8347da33507edddef7b769b8a05d16758106d5e45b88eefce7be9

                                                                                SHA512

                                                                                9c9a424f018b64f3c97bedf6d6b8848cad18ec59bee47388892ca293281307b6735a2d8ff99bd2ae282d4c65534216a9716f4bac2f0e04e3ea43e2406db0b088

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                Filesize

                                                                                10KB

                                                                                MD5

                                                                                3f41132b8cd64bbf00d21e653d939bd4

                                                                                SHA1

                                                                                162b569f6c7dcd1607c8e9bb48a94fa62bc0dc6e

                                                                                SHA256

                                                                                c75f923087f8347da33507edddef7b769b8a05d16758106d5e45b88eefce7be9

                                                                                SHA512

                                                                                9c9a424f018b64f3c97bedf6d6b8848cad18ec59bee47388892ca293281307b6735a2d8ff99bd2ae282d4c65534216a9716f4bac2f0e04e3ea43e2406db0b088

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                Filesize

                                                                                10KB

                                                                                MD5

                                                                                64e352da4a41a31324dd7a21700404fe

                                                                                SHA1

                                                                                ce8a50c63fd73797935d5f4791303e5394295bb1

                                                                                SHA256

                                                                                833956722dfaf6b7ddcb17f3801594535057f027839398d7a967ed479aaa82ce

                                                                                SHA512

                                                                                55eda80a15848d83ca8ece6621aacc636f84e6c3b9dfadf3b777a5f8f355dbdd67234e16fcd3e91a3454a7833f1234463c6fe9d801039ad3ff66f7d7aea9dc5a

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                Filesize

                                                                                2KB

                                                                                MD5

                                                                                2eabde95116c9eac3afcc3a9c27b38b5

                                                                                SHA1

                                                                                3367b6f7534e412a0083be776577c86b87f25cf3

                                                                                SHA256

                                                                                1196870c862256f843a743d101e8f23640589c9fc9a2a9dd044681fe27fd09ab

                                                                                SHA512

                                                                                3a099635c4df691e0d0cc905ea8dfb5439ece1120e7d6c697517b994ae0c444c031d726d83b49bb52e3059e3e8a4d82f25f612d863e24a82abb8627130509dd9

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                Filesize

                                                                                2KB

                                                                                MD5

                                                                                2eabde95116c9eac3afcc3a9c27b38b5

                                                                                SHA1

                                                                                3367b6f7534e412a0083be776577c86b87f25cf3

                                                                                SHA256

                                                                                1196870c862256f843a743d101e8f23640589c9fc9a2a9dd044681fe27fd09ab

                                                                                SHA512

                                                                                3a099635c4df691e0d0cc905ea8dfb5439ece1120e7d6c697517b994ae0c444c031d726d83b49bb52e3059e3e8a4d82f25f612d863e24a82abb8627130509dd9

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                Filesize

                                                                                944B

                                                                                MD5

                                                                                d28a889fd956d5cb3accfbaf1143eb6f

                                                                                SHA1

                                                                                157ba54b365341f8ff06707d996b3635da8446f7

                                                                                SHA256

                                                                                21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

                                                                                SHA512

                                                                                0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                Filesize

                                                                                948B

                                                                                MD5

                                                                                6a29e9f9eb72c3bffbb054cd27e3ceea

                                                                                SHA1

                                                                                d38f7c2ad68dcf1d24deca9792256ff53d5218b2

                                                                                SHA256

                                                                                7a9f831f96b9e4843751dea3ed57ee11d70bb83a5970ddf9d6bd440f4def442c

                                                                                SHA512

                                                                                b4826f172c6ac60ad17412a634987c45640b1b8fe03aecba26510ae224685bcd571bc4b131724036e2b502b3a8198fb69414be8c72e46f833f0601a15d313430

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                Filesize

                                                                                1KB

                                                                                MD5

                                                                                e4d5f16dff1c6c4bd78c48253f411da2

                                                                                SHA1

                                                                                0fb7366585572b2cf4144d169302ba21d8e71ac3

                                                                                SHA256

                                                                                360fe2bf9d46f0e6bb35c1b41ba0d70c5f10a1a9b42e29d9cafea37de5964133

                                                                                SHA512

                                                                                27cb84814bf84d0db623e68c06b6391e63d985d5fe77a9d6ca9093329fbe73da490bb9bef67fea667d2d03b1d42ed5b4591f9e72c281c15965d0765c019d4b69

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                Filesize

                                                                                1KB

                                                                                MD5

                                                                                f932bf98b7d843301e8853f5bf166db8

                                                                                SHA1

                                                                                ca85ca9dd65ee3ec5a232c1b38ea0e480dac0a11

                                                                                SHA256

                                                                                f58055aa03ea6f91f4e3af7008a175773c642bd3db35c5c676f4c3b7fcbb58d1

                                                                                SHA512

                                                                                9d93b94400b5b88374132665e5dfe280c2ffeedd820766907b5ea43bad0791cf2063fd198b74564f3d975619200ca7481dbf326526582904ff52f39ac1a761b0

                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5toieqww.3l2.ps1

                                                                                Filesize

                                                                                60B

                                                                                MD5

                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                SHA1

                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                SHA256

                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                SHA512

                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                              • C:\Users\Admin\Downloads\ConsoleApplication1_protected.exe

                                                                                Filesize

                                                                                16.6MB

                                                                                MD5

                                                                                fde37b48c7fb5c2533cfa94b2e055934

                                                                                SHA1

                                                                                332b9c9cdfcfe4a88c69614b8c3681692e9f6077

                                                                                SHA256

                                                                                f2f31c8a669a1898131f1c7119b3b3cf8216bc2fa1240fee1f9113e3b4d74faa

                                                                                SHA512

                                                                                a84488e8cb9cfa852e4ba63bd80b1db2a2c68f5af147dbaa5e28150a2649fdc9d7b4435d9cbf6d48582e874555caa4825aacbe2c40701692c89f98ce80406d1d

                                                                              • C:\Users\Admin\Downloads\ConsoleApplication1_protected.exe

                                                                                Filesize

                                                                                16.6MB

                                                                                MD5

                                                                                fde37b48c7fb5c2533cfa94b2e055934

                                                                                SHA1

                                                                                332b9c9cdfcfe4a88c69614b8c3681692e9f6077

                                                                                SHA256

                                                                                f2f31c8a669a1898131f1c7119b3b3cf8216bc2fa1240fee1f9113e3b4d74faa

                                                                                SHA512

                                                                                a84488e8cb9cfa852e4ba63bd80b1db2a2c68f5af147dbaa5e28150a2649fdc9d7b4435d9cbf6d48582e874555caa4825aacbe2c40701692c89f98ce80406d1d

                                                                              • C:\Users\Admin\Downloads\Unconfirmed 836262.crdownload

                                                                                Filesize

                                                                                16.6MB

                                                                                MD5

                                                                                fde37b48c7fb5c2533cfa94b2e055934

                                                                                SHA1

                                                                                332b9c9cdfcfe4a88c69614b8c3681692e9f6077

                                                                                SHA256

                                                                                f2f31c8a669a1898131f1c7119b3b3cf8216bc2fa1240fee1f9113e3b4d74faa

                                                                                SHA512

                                                                                a84488e8cb9cfa852e4ba63bd80b1db2a2c68f5af147dbaa5e28150a2649fdc9d7b4435d9cbf6d48582e874555caa4825aacbe2c40701692c89f98ce80406d1d

                                                                              • C:\Windows\System32\Speech\QrxHeK2MIlvo2rANCX01CYgpVLo0XuIi.exe

                                                                                Filesize

                                                                                227KB

                                                                                MD5

                                                                                ef2711e9aeeb23297016ef32b46a3c7e

                                                                                SHA1

                                                                                ba51f478c1118d7803620367cb97ce2ceba52a5a

                                                                                SHA256

                                                                                2fe65b8585389b60e44f688f755bbaefe5a3689737050a96c7586bd9b69a9759

                                                                                SHA512

                                                                                3c5453a308f0f8321141c2949540f7c3a7c9774eb9e8767210ee30e9745caee0e8bafa8806736f1ec04bd952aa411a5a38a6c97fe19bea3d8d86729571a7059f

                                                                              • C:\Windows\System32\Speech\QrxHeK2MIlvo2rANCX01CYgpVLo0XuIi.exe

                                                                                Filesize

                                                                                227KB

                                                                                MD5

                                                                                ef2711e9aeeb23297016ef32b46a3c7e

                                                                                SHA1

                                                                                ba51f478c1118d7803620367cb97ce2ceba52a5a

                                                                                SHA256

                                                                                2fe65b8585389b60e44f688f755bbaefe5a3689737050a96c7586bd9b69a9759

                                                                                SHA512

                                                                                3c5453a308f0f8321141c2949540f7c3a7c9774eb9e8767210ee30e9745caee0e8bafa8806736f1ec04bd952aa411a5a38a6c97fe19bea3d8d86729571a7059f

                                                                              • C:\Windows\System32\Speech\rzVcer4bmE4Jex7MrYlM6wXs8CdoRpwG.exe

                                                                                Filesize

                                                                                11KB

                                                                                MD5

                                                                                cebf7458dceffcbb81a290cf045beb27

                                                                                SHA1

                                                                                98c74fa610995d61d2ee78a2ea888e003e9f436d

                                                                                SHA256

                                                                                97d22321ba783bf6d2119320d38d776bbc6bef42fe3dadecf512e23bbdd29660

                                                                                SHA512

                                                                                144f0da1e8060e08340f1b349f7bbb17be298ee3d27d056d5603143125b8a9d7abb9485d0f5a2a26e2e50f0d5970ecf5fc3a9e665eece70414c6dc1504b04a91

                                                                              • C:\Windows\system32\drivers\etc\hosts

                                                                                Filesize

                                                                                2KB

                                                                                MD5

                                                                                4028457913f9d08b06137643fe3e01bc

                                                                                SHA1

                                                                                a5cb3f12beaea8194a2d3d83a62bdb8d558f5f14

                                                                                SHA256

                                                                                289d433902418aaf62e7b96b215ece04fcbcef2457daf90f46837a4d5090da58

                                                                                SHA512

                                                                                c8e1eef90618341bbde885fd126ece2b1911ca99d20d82f62985869ba457553b4c2bf1e841fd06dacbf27275b3b0940e5a794e1b1db0fd56440a96592362c28b

                                                                              • memory/1352-121-0x00007FF7257B0000-0x00007FF7281D9000-memory.dmp

                                                                                Filesize

                                                                                42.2MB

                                                                              • memory/1352-140-0x00007FF7257B0000-0x00007FF7281D9000-memory.dmp

                                                                                Filesize

                                                                                42.2MB

                                                                              • memory/1352-141-0x00007FF7257B0000-0x00007FF7281D9000-memory.dmp

                                                                                Filesize

                                                                                42.2MB

                                                                              • memory/1352-142-0x00007FF7257B0000-0x00007FF7281D9000-memory.dmp

                                                                                Filesize

                                                                                42.2MB

                                                                              • memory/1352-139-0x00007FF7257B0000-0x00007FF7281D9000-memory.dmp

                                                                                Filesize

                                                                                42.2MB

                                                                              • memory/1352-122-0x00007FF7257B0000-0x00007FF7281D9000-memory.dmp

                                                                                Filesize

                                                                                42.2MB

                                                                              • memory/1352-241-0x00007FF7257B0000-0x00007FF7281D9000-memory.dmp

                                                                                Filesize

                                                                                42.2MB

                                                                              • memory/1352-165-0x00007FFD21770000-0x00007FFD21965000-memory.dmp

                                                                                Filesize

                                                                                2.0MB

                                                                              • memory/1352-282-0x00007FFD21770000-0x00007FFD21965000-memory.dmp

                                                                                Filesize

                                                                                2.0MB

                                                                              • memory/1352-54-0x00007FFD21770000-0x00007FFD21965000-memory.dmp

                                                                                Filesize

                                                                                2.0MB

                                                                              • memory/1352-163-0x00007FF7257B0000-0x00007FF7281D9000-memory.dmp

                                                                                Filesize

                                                                                42.2MB

                                                                              • memory/1352-150-0x00007FF7257B0000-0x00007FF7281D9000-memory.dmp

                                                                                Filesize

                                                                                42.2MB

                                                                              • memory/1352-53-0x00007FF7257B0000-0x00007FF7281D9000-memory.dmp

                                                                                Filesize

                                                                                42.2MB

                                                                              • memory/1428-283-0x0000019829D00000-0x0000019829D1E000-memory.dmp

                                                                                Filesize

                                                                                120KB

                                                                              • memory/1428-166-0x0000019829C30000-0x0000019829C40000-memory.dmp

                                                                                Filesize

                                                                                64KB

                                                                              • memory/1428-160-0x0000019829830000-0x0000019829870000-memory.dmp

                                                                                Filesize

                                                                                256KB

                                                                              • memory/1428-164-0x00007FFD02D40000-0x00007FFD03801000-memory.dmp

                                                                                Filesize

                                                                                10.8MB

                                                                              • memory/1428-185-0x00007FFD02D40000-0x00007FFD03801000-memory.dmp

                                                                                Filesize

                                                                                10.8MB

                                                                              • memory/1428-246-0x0000019844030000-0x00000198440A6000-memory.dmp

                                                                                Filesize

                                                                                472KB

                                                                              • memory/1428-189-0x0000019829C30000-0x0000019829C40000-memory.dmp

                                                                                Filesize

                                                                                64KB

                                                                              • memory/1428-476-0x00007FFD02D40000-0x00007FFD03801000-memory.dmp

                                                                                Filesize

                                                                                10.8MB

                                                                              • memory/1428-247-0x000001982B4F0000-0x000001982B540000-memory.dmp

                                                                                Filesize

                                                                                320KB

                                                                              • memory/1428-432-0x0000019829D30000-0x0000019829D3A000-memory.dmp

                                                                                Filesize

                                                                                40KB

                                                                              • memory/1428-433-0x000001982B560000-0x000001982B572000-memory.dmp

                                                                                Filesize

                                                                                72KB

                                                                              • memory/3344-198-0x00000289756C0000-0x00000289756D0000-memory.dmp

                                                                                Filesize

                                                                                64KB

                                                                              • memory/3344-233-0x00007FFD02D40000-0x00007FFD03801000-memory.dmp

                                                                                Filesize

                                                                                10.8MB

                                                                              • memory/3344-197-0x00000289756C0000-0x00000289756D0000-memory.dmp

                                                                                Filesize

                                                                                64KB

                                                                              • memory/3344-230-0x00000289756C0000-0x00000289756D0000-memory.dmp

                                                                                Filesize

                                                                                64KB

                                                                              • memory/3344-209-0x00000289756C0000-0x00000289756D0000-memory.dmp

                                                                                Filesize

                                                                                64KB

                                                                              • memory/3344-195-0x00007FFD02D40000-0x00007FFD03801000-memory.dmp

                                                                                Filesize

                                                                                10.8MB

                                                                              • memory/4040-381-0x00007FFD02D40000-0x00007FFD03801000-memory.dmp

                                                                                Filesize

                                                                                10.8MB

                                                                              • memory/4040-386-0x000002637F240000-0x000002637F250000-memory.dmp

                                                                                Filesize

                                                                                64KB

                                                                              • memory/4040-412-0x00007FFD02D40000-0x00007FFD03801000-memory.dmp

                                                                                Filesize

                                                                                10.8MB

                                                                              • memory/4664-180-0x0000018525700000-0x0000018525710000-memory.dmp

                                                                                Filesize

                                                                                64KB

                                                                              • memory/4664-181-0x0000018525700000-0x0000018525710000-memory.dmp

                                                                                Filesize

                                                                                64KB

                                                                              • memory/4664-178-0x00007FFD02D40000-0x00007FFD03801000-memory.dmp

                                                                                Filesize

                                                                                10.8MB

                                                                              • memory/4664-186-0x00007FFD02D40000-0x00007FFD03801000-memory.dmp

                                                                                Filesize

                                                                                10.8MB

                                                                              • memory/4664-182-0x0000018525700000-0x0000018525710000-memory.dmp

                                                                                Filesize

                                                                                64KB

                                                                              • memory/4664-177-0x0000018525610000-0x0000018525632000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/4664-179-0x0000018525700000-0x0000018525710000-memory.dmp

                                                                                Filesize

                                                                                64KB

                                                                              • memory/5464-452-0x00007FFD02D40000-0x00007FFD03801000-memory.dmp

                                                                                Filesize

                                                                                10.8MB

                                                                              • memory/5464-450-0x000001987B4A0000-0x000001987B4B0000-memory.dmp

                                                                                Filesize

                                                                                64KB

                                                                              • memory/5464-438-0x000001987B4A0000-0x000001987B4B0000-memory.dmp

                                                                                Filesize

                                                                                64KB

                                                                              • memory/5464-439-0x000001987B4A0000-0x000001987B4B0000-memory.dmp

                                                                                Filesize

                                                                                64KB

                                                                              • memory/5464-437-0x00007FFD02D40000-0x00007FFD03801000-memory.dmp

                                                                                Filesize

                                                                                10.8MB

                                                                              • memory/5808-319-0x000001DE88B80000-0x000001DE88B90000-memory.dmp

                                                                                Filesize

                                                                                64KB

                                                                              • memory/5808-291-0x000001DE88B80000-0x000001DE88B90000-memory.dmp

                                                                                Filesize

                                                                                64KB

                                                                              • memory/5808-290-0x000001DE88B80000-0x000001DE88B90000-memory.dmp

                                                                                Filesize

                                                                                64KB

                                                                              • memory/5808-289-0x00007FFD02D40000-0x00007FFD03801000-memory.dmp

                                                                                Filesize

                                                                                10.8MB

                                                                              • memory/5808-370-0x00007FFD02D40000-0x00007FFD03801000-memory.dmp

                                                                                Filesize

                                                                                10.8MB