Analysis

  • max time kernel
    81s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/01/2024, 23:33

General

  • Target

    47740279995f3c51087bf01fe8a4d901.exe

  • Size

    286KB

  • MD5

    47740279995f3c51087bf01fe8a4d901

  • SHA1

    91ed7628c367b40c3db07752e1b9345e0752e252

  • SHA256

    2e8cc7c54ad24b23ec164f475cbafec0c2cee12fbc6593544e0d4f8999bd9e6d

  • SHA512

    115b18309c735d90e3344bc1a5a4276c0418a45e5a0bcddaa098b5c0ac10d8f878452cf05f647e19acf593a33edb8ef0981c5df91d01eb702e6a89aec97da75b

  • SSDEEP

    6144:349tPFmx+RLcd7FpigfViBXsVoLBnMq0mPuBK7co4rKX1jz:36tPFmx+RLCFptuYYnPGBrhK

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Disables taskbar notifications via registry modification
  • Modifies Installed Components in the registry 2 TTPs 13 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 14 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 19 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\47740279995f3c51087bf01fe8a4d901.exe
    "C:\Users\Admin\AppData\Local\Temp\47740279995f3c51087bf01fe8a4d901.exe"
    1⤵
    • Modifies security service
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:784
    • C:\Users\Admin\AppData\Local\Temp\47740279995f3c51087bf01fe8a4d901.exe
      C:\Users\Admin\AppData\Local\Temp\47740279995f3c51087bf01fe8a4d901.exe startC:\Users\Admin\AppData\Roaming\872D4\C7202.exe%C:\Users\Admin\AppData\Roaming\872D4
      2⤵
        PID:3736
      • C:\Users\Admin\AppData\Local\Temp\47740279995f3c51087bf01fe8a4d901.exe
        C:\Users\Admin\AppData\Local\Temp\47740279995f3c51087bf01fe8a4d901.exe startC:\Program Files (x86)\D4EAA\lvvm.exe%C:\Program Files (x86)\D4EAA
        2⤵
          PID:3928
        • C:\Program Files (x86)\LP\02F8\D34E.tmp
          "C:\Program Files (x86)\LP\02F8\D34E.tmp"
          2⤵
          • Executes dropped EXE
          PID:2244
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:432
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2228
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1020
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3640
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:4028
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4084
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:3352
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2908
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of SendNotifyMessage
        PID:3140
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:2872
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of SendNotifyMessage
        PID:1240
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
          PID:444
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:1604
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
          • Modifies Installed Components in the registry
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies registry class
          PID:3564
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
          • Suspicious use of SetWindowsHookEx
          PID:884
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:4372
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
            PID:1152
          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            1⤵
              PID:996
            • C:\Windows\explorer.exe
              explorer.exe
              1⤵
                PID:2508
              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                1⤵
                  PID:1428
                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                  1⤵
                    PID:932
                  • C:\Windows\explorer.exe
                    explorer.exe
                    1⤵
                    • Modifies Installed Components in the registry
                    • Enumerates connected drives
                    • Checks SCSI registry key(s)
                    • Modifies registry class
                    PID:740
                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                    1⤵
                      PID:3928
                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                      1⤵
                      • Modifies Internet Explorer settings
                      • Modifies registry class
                      • Suspicious use of SetWindowsHookEx
                      PID:492
                    • C:\Windows\explorer.exe
                      explorer.exe
                      1⤵
                      • Modifies Installed Components in the registry
                      • Enumerates connected drives
                      • Checks SCSI registry key(s)
                      • Modifies registry class
                      PID:4008
                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                      1⤵
                      • Suspicious use of SetWindowsHookEx
                      PID:4980
                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                      1⤵
                      • Modifies Internet Explorer settings
                      • Modifies registry class
                      • Suspicious use of SetWindowsHookEx
                      PID:4288
                    • C:\Windows\explorer.exe
                      explorer.exe
                      1⤵
                        PID:1104
                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                        1⤵
                          PID:4032
                        • C:\Windows\explorer.exe
                          explorer.exe
                          1⤵
                            PID:3916
                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                            1⤵
                            • Suspicious use of SetWindowsHookEx
                            PID:3848
                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                            1⤵
                            • Modifies Internet Explorer settings
                            • Modifies registry class
                            • Suspicious use of SetWindowsHookEx
                            PID:4244
                          • C:\Windows\explorer.exe
                            explorer.exe
                            1⤵
                            • Modifies Installed Components in the registry
                            PID:4276
                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                            1⤵
                              PID:64
                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                              1⤵
                                PID:4364
                              • C:\Windows\explorer.exe
                                explorer.exe
                                1⤵
                                  PID:5056
                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                  1⤵
                                    PID:2704
                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                    1⤵
                                      PID:3480
                                    • C:\Windows\explorer.exe
                                      explorer.exe
                                      1⤵
                                        PID:4648
                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                        1⤵
                                          PID:3908
                                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                          1⤵
                                            PID:2108
                                          • C:\Windows\explorer.exe
                                            explorer.exe
                                            1⤵
                                              PID:1048
                                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                              1⤵
                                                PID:1264
                                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                1⤵
                                                  PID:4640
                                                • C:\Windows\explorer.exe
                                                  explorer.exe
                                                  1⤵
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:3928
                                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                  1⤵
                                                    PID:1248
                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                    1⤵
                                                      PID:1588
                                                    • C:\Windows\explorer.exe
                                                      explorer.exe
                                                      1⤵
                                                        PID:388
                                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                        1⤵
                                                          PID:2124
                                                        • C:\Windows\explorer.exe
                                                          explorer.exe
                                                          1⤵
                                                            PID:3620
                                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                            1⤵
                                                              PID:2860
                                                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                              1⤵
                                                                PID:2992
                                                              • C:\Windows\explorer.exe
                                                                explorer.exe
                                                                1⤵
                                                                • Modifies Installed Components in the registry
                                                                • Enumerates connected drives
                                                                • Checks SCSI registry key(s)
                                                                • Modifies registry class
                                                                PID:3916
                                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                1⤵
                                                                  PID:8
                                                                • C:\Windows\explorer.exe
                                                                  explorer.exe
                                                                  1⤵
                                                                    PID:3252
                                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                    1⤵
                                                                      PID:4936
                                                                    • C:\Windows\explorer.exe
                                                                      explorer.exe
                                                                      1⤵
                                                                        PID:64
                                                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                        1⤵
                                                                          PID:2356
                                                                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                          1⤵
                                                                            PID:2528
                                                                          • C:\Windows\explorer.exe
                                                                            explorer.exe
                                                                            1⤵
                                                                              PID:3900
                                                                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                              1⤵
                                                                                PID:1040
                                                                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                1⤵
                                                                                  PID:1636
                                                                                • C:\Windows\explorer.exe
                                                                                  explorer.exe
                                                                                  1⤵
                                                                                    PID:3244
                                                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                    1⤵
                                                                                      PID:3376
                                                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                      1⤵
                                                                                        PID:4252
                                                                                      • C:\Windows\explorer.exe
                                                                                        explorer.exe
                                                                                        1⤵
                                                                                          PID:4932
                                                                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                          1⤵
                                                                                            PID:1816
                                                                                          • C:\Windows\explorer.exe
                                                                                            explorer.exe
                                                                                            1⤵
                                                                                              PID:3588
                                                                                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                              1⤵
                                                                                                PID:2616
                                                                                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                                1⤵
                                                                                                  PID:3152
                                                                                                • C:\Windows\explorer.exe
                                                                                                  explorer.exe
                                                                                                  1⤵
                                                                                                    PID:4304
                                                                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                                    1⤵
                                                                                                      PID:2148
                                                                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                                      1⤵
                                                                                                        PID:4440

                                                                                                      Network

                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                      Replay Monitor

                                                                                                      Loading Replay Monitor...

                                                                                                      Downloads

                                                                                                      • C:\Program Files (x86)\LP\02F8\D34E.tmp

                                                                                                        Filesize

                                                                                                        102KB

                                                                                                        MD5

                                                                                                        6d7f922d6214ef1996346395afd017be

                                                                                                        SHA1

                                                                                                        5594d286e8b8e46008426e15ffd53e86f4143d15

                                                                                                        SHA256

                                                                                                        4e58ef597c40404d3286c87cc13ea0563f4d08dacb4b40ea3d8b6744221898ae

                                                                                                        SHA512

                                                                                                        9dc8ac8d33268face5a007dce5cf5c7c1b749f1a656fdc70276ad431392978f47fbbae0e1d625040acc01641d9f7b5341d7b28b68169f39a1df789ea12654626

                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                                                                        Filesize

                                                                                                        471B

                                                                                                        MD5

                                                                                                        1d176c7fae90b26bc9918c4b89daf042

                                                                                                        SHA1

                                                                                                        9e860eaf7c0c6536268eb89081c75321c2536bee

                                                                                                        SHA256

                                                                                                        04f8b2a47cfa5d1c009320508e0567f700fcf00c3a7e6d1f3dba6a7e226fd0d7

                                                                                                        SHA512

                                                                                                        40dd7bea62d8057739390c0d05328f691e5d33c2c58f3ca8ffeb20b10d1368766e60110bc34f485ae967ef5a493c72813740836dc6a5c58d3c06f0e39b831bc1

                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                                                                        Filesize

                                                                                                        412B

                                                                                                        MD5

                                                                                                        7b75a4c28b30fef701409e4655470ab0

                                                                                                        SHA1

                                                                                                        8a5f8457c7345ef6810dfd5c2b419bb27ed45885

                                                                                                        SHA256

                                                                                                        3ab881ae2908edc7bfd7706c757aec8a630302eaf1e14eb8c285f1480d26e0c5

                                                                                                        SHA512

                                                                                                        fed276314c77f892dca4ab3750677aba6b482bb02d96cf7478151a225eeefd54c75c0b7df4a29057ee4ec79e673ffd3eee203d80ef5c1d6345c082f771f2447f

                                                                                                      • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\QDDM1QX5\microsoft.windows[1].xml

                                                                                                        Filesize

                                                                                                        96B

                                                                                                        MD5

                                                                                                        2415f1b0b1e5150e9f1e871081fd1fad

                                                                                                        SHA1

                                                                                                        a79e4bfddc3daf75f059fda3547bd18282d993f7

                                                                                                        SHA256

                                                                                                        3eff25035403aba506d0dbf69c76a22fa90ec66d2094cbf39bc5267a850902ae

                                                                                                        SHA512

                                                                                                        5d05da9ec1471dbf91f0c474c8db3897130543ff3c4da70724ce3a36adc38f628264c3dae4f54caef493f7593a0986a944dda0e19e947f3dfc34fc16fbd3e6bb

                                                                                                      • C:\Users\Admin\AppData\Roaming\872D4\4EAA.72D

                                                                                                        Filesize

                                                                                                        996B

                                                                                                        MD5

                                                                                                        fea253fd9e8fdf3a685798a30416f9a0

                                                                                                        SHA1

                                                                                                        8bde4dd93ab5daa0fb44f5f9a8fa62cb3e59c0e8

                                                                                                        SHA256

                                                                                                        c701d0c96eb9ebd5f99e6f875739cbebee944e9ef8ef2832d19efb828987f9a2

                                                                                                        SHA512

                                                                                                        1d9564cc8dbf9c4bfc3558fa815f84183bcafb1c42a6b1baede2d8d411cf6c05d0cfbe52de5933417001e870247795f9d35825d5179080664502e15a1602072e

                                                                                                      • C:\Users\Admin\AppData\Roaming\872D4\4EAA.72D

                                                                                                        Filesize

                                                                                                        1KB

                                                                                                        MD5

                                                                                                        f020b4aa40e8fa311ac46877a9afc5f7

                                                                                                        SHA1

                                                                                                        d3d2fddb06ba6dfb702f8c6cf8d47001bc0c1202

                                                                                                        SHA256

                                                                                                        b882af4908803033adbea78be476465854d8a1e12a4310ff4b75e62a1c1d67f4

                                                                                                        SHA512

                                                                                                        af37f98252e31eba86434b3879c9a1e415f2b6268e613634d18c47fb72d4ccd4345e34665620e8b7080bd81866d041ed65607259afa8ec61e99f4b17999e5915

                                                                                                      • C:\Users\Admin\AppData\Roaming\872D4\4EAA.72D

                                                                                                        Filesize

                                                                                                        600B

                                                                                                        MD5

                                                                                                        d53ed9afb63a520b46fd0654a38d8804

                                                                                                        SHA1

                                                                                                        6380a2d46d63d7a1591700b24e5a372958e42a20

                                                                                                        SHA256

                                                                                                        3ce49d2a0468dfce03ff15bb4544690b9a3cf8be51ee8254b5e1598ff598d2e3

                                                                                                        SHA512

                                                                                                        2798dccec4cabb8604a2c3c4174cd1d63f46b0b390fa7adf39ccbdd87fd06ef8970149c61fd4fa75a8d66be5e891b1d5404e50814120add755743ecafdf47d69

                                                                                                      • C:\Users\Admin\AppData\Roaming\872D4\4EAA.72D

                                                                                                        Filesize

                                                                                                        300B

                                                                                                        MD5

                                                                                                        0c99979c802b6232227d222507c7b273

                                                                                                        SHA1

                                                                                                        952bc12652c25553f8a41580c439f043720876a9

                                                                                                        SHA256

                                                                                                        93ee750f0df46bd3968d912257a25dd7fbbb754dd94e6520404ae1468423052c

                                                                                                        SHA512

                                                                                                        18d075137198a2249cb0d0e755a8114d38fe7b70cfa0e8770b4b1abb4d61edaf9629800694de0d209379c6544b084d747579f2f54e42aaf9b9a1d96d3f8e49d5

                                                                                                      • memory/492-452-0x00000175854D0000-0x00000175854F0000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/492-454-0x0000017585490000-0x00000175854B0000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/492-456-0x00000175858A0000-0x00000175858C0000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/740-444-0x00000000049A0000-0x00000000049A1000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/784-2-0x0000000000580000-0x0000000000680000-memory.dmp

                                                                                                        Filesize

                                                                                                        1024KB

                                                                                                      • memory/784-63-0x0000000000400000-0x000000000046B000-memory.dmp

                                                                                                        Filesize

                                                                                                        428KB

                                                                                                      • memory/784-166-0x0000000000400000-0x000000000046B000-memory.dmp

                                                                                                        Filesize

                                                                                                        428KB

                                                                                                      • memory/784-1-0x0000000000400000-0x000000000046B000-memory.dmp

                                                                                                        Filesize

                                                                                                        428KB

                                                                                                      • memory/784-218-0x0000000000580000-0x0000000000680000-memory.dmp

                                                                                                        Filesize

                                                                                                        1024KB

                                                                                                      • memory/784-514-0x0000000000400000-0x000000000046B000-memory.dmp

                                                                                                        Filesize

                                                                                                        428KB

                                                                                                      • memory/784-489-0x0000000000400000-0x000000000046B000-memory.dmp

                                                                                                        Filesize

                                                                                                        428KB

                                                                                                      • memory/784-392-0x0000000000400000-0x000000000046B000-memory.dmp

                                                                                                        Filesize

                                                                                                        428KB

                                                                                                      • memory/932-428-0x0000022570F90000-0x0000022570FB0000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/932-430-0x0000022570F50000-0x0000022570F70000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/932-433-0x0000022571560000-0x0000022571580000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/1048-580-0x0000000004170000-0x0000000004171000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/1240-373-0x0000000004E60000-0x0000000004E61000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/1588-617-0x0000026DAE1A0000-0x0000026DAE1C0000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/1588-614-0x0000026DADD90000-0x0000026DADDB0000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/1588-612-0x0000026DADDD0000-0x0000026DADDF0000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/1604-381-0x0000020B77F60000-0x0000020B77F80000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/1604-383-0x0000020B77F20000-0x0000020B77F40000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/1604-385-0x0000020B78320000-0x0000020B78340000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/2108-569-0x00000222206D0000-0x00000222206F0000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/2108-567-0x000002221FFC0000-0x000002221FFE0000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/2108-565-0x0000022220300000-0x0000022220320000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/2244-369-0x0000000000400000-0x000000000041C000-memory.dmp

                                                                                                        Filesize

                                                                                                        112KB

                                                                                                      • memory/2244-370-0x00000000006D0000-0x00000000007D0000-memory.dmp

                                                                                                        Filesize

                                                                                                        1024KB

                                                                                                      • memory/2244-371-0x0000000000400000-0x000000000041C000-memory.dmp

                                                                                                        Filesize

                                                                                                        112KB

                                                                                                      • memory/2508-421-0x0000000002560000-0x0000000002561000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/2908-356-0x000001D9282E0000-0x000001D928300000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/2908-345-0x000001D927D10000-0x000001D927D30000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/2908-354-0x000001D927CD0000-0x000001D927CF0000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/2992-637-0x0000012AB71A0000-0x0000012AB71C0000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/3480-546-0x00000197CAC20000-0x00000197CAC40000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/3480-544-0x00000197CAC60000-0x00000197CAC80000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/3480-548-0x00000197CB020000-0x00000197CB040000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/3564-395-0x0000000004750000-0x0000000004751000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/3620-629-0x0000000004640000-0x0000000004641000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/3736-66-0x00000000006E0000-0x00000000007E0000-memory.dmp

                                                                                                        Filesize

                                                                                                        1024KB

                                                                                                      • memory/3736-366-0x00000000006E0000-0x00000000007E0000-memory.dmp

                                                                                                        Filesize

                                                                                                        1024KB

                                                                                                      • memory/3736-65-0x0000000000400000-0x000000000046B000-memory.dmp

                                                                                                        Filesize

                                                                                                        428KB

                                                                                                      • memory/3916-493-0x0000000004620000-0x0000000004621000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/3928-169-0x0000000000400000-0x000000000046B000-memory.dmp

                                                                                                        Filesize

                                                                                                        428KB

                                                                                                      • memory/3928-393-0x0000000000580000-0x0000000000680000-memory.dmp

                                                                                                        Filesize

                                                                                                        1024KB

                                                                                                      • memory/3928-170-0x0000000000580000-0x0000000000680000-memory.dmp

                                                                                                        Filesize

                                                                                                        1024KB

                                                                                                      • memory/3928-604-0x0000000003170000-0x0000000003171000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/4008-467-0x0000000004310000-0x0000000004311000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/4084-335-0x0000000004DA0000-0x0000000004DA1000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/4244-500-0x0000020E8A040000-0x0000020E8A060000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/4244-502-0x0000020E8A000000-0x0000020E8A020000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/4244-504-0x0000020E8A410000-0x0000020E8A430000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/4276-517-0x0000000002F00000-0x0000000002F01000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/4288-479-0x000001A31DA20000-0x000001A31DA40000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/4288-477-0x000001A31D620000-0x000001A31D640000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/4288-475-0x000001A31D660000-0x000001A31D680000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/4364-528-0x000001F298520000-0x000001F298540000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/4364-526-0x000001F298120000-0x000001F298140000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/4364-524-0x000001F298160000-0x000001F298180000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/4372-407-0x0000021C872C0000-0x0000021C872E0000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/4372-403-0x0000021C86CF0000-0x0000021C86D10000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/4372-405-0x0000021C86CB0000-0x0000021C86CD0000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/4640-588-0x0000018D4DA60000-0x0000018D4DA80000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/4640-593-0x0000018D4DE20000-0x0000018D4DE40000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/4640-590-0x0000018D4DA20000-0x0000018D4DA40000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/4648-558-0x0000000003150000-0x0000000003151000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/5056-537-0x0000000002E00000-0x0000000002E01000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB