Malware Analysis Report

2025-01-18 01:37

Sample ID 240613-kev3naveln
Target .
SHA256 b00a6f2d018e90bcb960cc79e01704724ff36fb7b4af0fb1cdaa7ff2d1029fad
Tags
score
1/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
1/10

SHA256

b00a6f2d018e90bcb960cc79e01704724ff36fb7b4af0fb1cdaa7ff2d1029fad

Threat Level: No (potentially) malicious behavior was detected

The file . was found to be: No (potentially) malicious behavior was detected.

Malicious Activity Summary


Suspicious use of SendNotifyMessage

Suspicious use of WriteProcessMemory

Modifies Internet Explorer settings

Suspicious use of SetWindowsHookEx

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of FindShellTrayWindow

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-13 08:31

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 08:31

Reported

2024-06-13 08:34

Platform

win10v2004-20240508-en

Max time kernel

145s

Max time network

124s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\.html

Signatures

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1488 wrote to memory of 1476 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1476 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 920 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 920 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1488 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe40aa46f8,0x7ffe40aa4708,0x7ffe40aa4718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,15253760179578857524,17658876149767763875,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,15253760179578857524,17658876149767763875,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2000,15253760179578857524,17658876149767763875,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,15253760179578857524,17658876149767763875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,15253760179578857524,17658876149767763875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,15253760179578857524,17658876149767763875,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4344 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,15253760179578857524,17658876149767763875,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4344 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,15253760179578857524,17658876149767763875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,15253760179578857524,17658876149767763875,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,15253760179578857524,17658876149767763875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4256 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,15253760179578857524,17658876149767763875,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,15253760179578857524,17658876149767763875,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4464 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 community.akamai.steamstatic.com udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 community.akamai.steamstatic.com udp
US 8.8.8.8:53 community.akamai.steamstatic.com udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 439b5e04ca18c7fb02cf406e6eb24167
SHA1 e0c5bb6216903934726e3570b7d63295b9d28987
SHA256 247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512 d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2

\??\pipe\LOCAL\crashpad_1488_TFTHMWEOGNWVOIIF

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 a8e767fd33edd97d306efb6905f93252
SHA1 a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256 c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA512 07b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 0dc5d5b1d18d321cafbbb32d1196121e
SHA1 a54adbd2b5c02f6070ba98d5002cbf18244ee316
SHA256 63befbd9dbf67757218cc710448d88c83add555db70221abf2b17108f2efc71f
SHA512 93b8909fb594ac5aeb2d03b574412f1f5f505c35d7001feefd0364509cd6fa25b29fa7aa0450087905109bfb17d597b7cbfe04b8ed2d348d4971191d72d6f95b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 304133181fa1301d431e070ded15787c
SHA1 eca9295d955d6450a47694b6b5074e28d80796b7
SHA256 053407f874242d9fe4d0a50933733b9ed0faeb9a76c9e27ea793710c9ec7c3dd
SHA512 78e5dd144893849d0f03cd75b6e3615ea76297662495cf9275cba0d580d92c0a31f9d08fa9e2be4805d6e20c7728637522a9f990a7ab61d9971daeb13bae7cf5

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 94aef5906c6e77e9aab1ec89b3043d23
SHA1 50e609cdcb6e6f52d26c1f9b1fc09789e1b83678
SHA256 e53323cfd28e2e3adae7ca19fa7cf77077a61fe6d7442c9dc3461cc9330e638a
SHA512 969ce7565ea95e2dc510495479e829766db2e1d9f0eb05264889520aabc3a289192f1721939fe39384d8bce88e4b94baf72bc9a6babf056c04a275ba46bd7ac9

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 08:31

Reported

2024-06-13 08:34

Platform

win7-20240611-en

Max time kernel

134s

Max time network

128s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html

Signatures

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000d2fa93dc3ff253d45f51d94861b88a87c6039a0f99fdb72447efcbea855b707b000000000e800000000200002000000084c6278104ed5412be214de8e5f72b9c5707b641e76eb77e962893f5e609fa1520000000cb3865db8a6576a6f9276c5cf34316ef574f5ec734aa0add113b29d850506bc540000000e3865d1833d8606a4b0f04f80985036312444c6df0d541f308374cd3d97f01b265bb2df9716151f973196a3de751345e225f40133f40991ce84f3ff169d99797 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 405e5d356cbdda01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5C8CBD31-295F-11EF-A5CD-D671A15513D2} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424429370" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000980048d73874abe9f02d61a2444054e52462120f7fd70c6c5a4ec5503459db8a000000000e800000000200002000000062d46956c18755de0e823f9991a31a64dbf035d9c28f942dbe6e9c8cc1937663900000007c41f0c234d3805f7cc74e41d12a0ce3d4ec18f6db118de8738047b2c1d563a910075c090039df2a8336e862bf9741d8048bd0d5dbbe1447fed7323fb5b13d100feee3cc10b549f8ffc30963252920d4c42efb115ff6c898095517422835f80a3fd004a3fbd0d7e2006c602c994cf0a865b9485afc5d3c41bf67c0d1455790ba95c90af7b33e428facef7409636e5a354000000087e29fdc5cd78ed59047ac477cc669154c7bca5596ddba7c6c07904bed673c9b642349d76269a2ae6e322bce21dac177ccaed6c6974a70001a7875e5c5c4c100 C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 cdn.akamai.steamstatic.com udp
US 8.8.8.8:53 community.akamai.steamstatic.com udp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.152:443 cdn.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.152:443 cdn.akamai.steamstatic.com tcp
BE 2.17.107.152:443 cdn.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.152:443 cdn.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.152:443 cdn.akamai.steamstatic.com tcp
BE 2.17.107.152:443 cdn.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.152:443 cdn.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.152:443 cdn.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.152:443 cdn.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.152:443 cdn.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.152:443 cdn.akamai.steamstatic.com tcp
BE 2.17.107.152:443 cdn.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.152:443 cdn.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.152:443 cdn.akamai.steamstatic.com tcp
BE 2.17.107.152:443 cdn.akamai.steamstatic.com tcp
BE 2.17.107.152:443 cdn.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
US 8.8.8.8:53 shared.steamstatic.com udp
BE 2.17.107.248:443 shared.steamstatic.com tcp
BE 2.17.107.248:443 shared.steamstatic.com tcp
BE 2.17.107.248:443 shared.steamstatic.com tcp
BE 2.17.107.248:443 shared.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.248:443 shared.steamstatic.com tcp
BE 2.17.107.248:443 shared.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.248:443 shared.steamstatic.com tcp
BE 2.17.107.248:443 shared.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
BE 2.17.107.243:443 community.akamai.steamstatic.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\Cab560E.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\Tar569E.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a73182781ab7fd2dc73f53d7a4937f39
SHA1 975365cd989d2a75531307635baed9bcac9843d0
SHA256 ac224b2f7f7cd700b4c87d7da343b0c83ab7401709e0829440f0dd25eba61edc
SHA512 5d4813e65901a99a957d5c691413af3f6bca030f2e5e637e4a053654de2a5337ca955b3be845f22810581a388908e436485002f79aaa74019fb6b1ad6d09d9aa

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 54666a3e2aa4628e64e53a86d86ab112
SHA1 61336cab8bee8b91bb6f257d73362df1b198ee1d
SHA256 c6d6c8a8f51254b1a42d2601a4e976f5e28ec9d3c6edb128b41c8042a6cd4dae
SHA512 32bd8b258124f2a1eb1ba38fb85a2636b2896ee4a3db1ea98f18678a767839a773da4e5795e90cafdab9e940d7e404a6b84df833d1e42cc209ff13b6fad6d7cb

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ff9f10da2e67e007e1fbf7fe40151750
SHA1 9b9381220029980e0fbf777abd8d746588c7e8dc
SHA256 a5e4ade9839d7a12dd8ce14aac4762690becb5ba013c2a8fd2e064fb869f1736
SHA512 58a8bc564ed0bfbb9c2557bc06cc1f37e45d91839db744454a98495d7994214c4097a83f8bdc41a990aaf497c6616f9b50984b837ec5e6f09269a85e9ea18842

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 6d835851f1c2b4e08079fb1ab865a532
SHA1 419362249dc3047f85cf57bc591041308214c7d4
SHA256 5c3f185d41798a08d1b41e11a466fcef21cbe712e9ed19ba0dcfc3cd3e4bc94b
SHA512 585436671b42d4154ad571485512bf5dc1563d2a0f83ff0d1053d6eb0ad5e0e7c7a347016f4a207c83b65ff856e9d9248cbd3fc069148541ecd22e558be48832

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 68d9bef7e2ab30bcf0f5e4a9b83c6b68
SHA1 2918012721750cc9ffc8d5eeafc5c90524e958c5
SHA256 a8ee7a4b40e67bad341880cb63746d9557f959a44e3215a37332e6a1637ca7dd
SHA512 32d68f9e737f5d3a55a8ee5a54124108fdf699f419dc9a8f514530fa8b009ec94cbec293544139d24eff51621898e9c2d98a37df1d268ba86cbc9879163485f5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4720c668473f8ef83e183654c248c182
SHA1 3bdc4a7619ccd35c3af0ade80c04036962747725
SHA256 ce926d7231b8fb6a9fb36d92efad0c4f52d40f084df14f83f8fe5031694363e3
SHA512 b9daa365d2bfaa1684a7fac22a73cfa67b549798e6e7550abdd8807542d418bc1f2408198edbdf11a22a931b8a0775180483dc3ff9b4a2694752863a725ab6c0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 56bc77bf51c9b449484a03265806f49e
SHA1 14bbed80d085eb9851f18f896c3dc9497194acf4
SHA256 c30cdb5ef1c17b0f81a253f16081f478a4c975e86926645b0421c9ee7dcb06f0
SHA512 b8fb3fc4861552b91f6718769d6fdfc554f0c2ac682a98e7b34bb8e2de6fc0ff485812401e845e40e8dc29c8e9c4cc4a8da816510830032d2b80e64566cd3271

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 40ffad446b3db79717b60bffe7e3cae8
SHA1 dd4e5a3dbcd2590091ef0fb1f176bf9e1f239bab
SHA256 de5b90aa274ed3b11c2c97a6367351e41f84c5795362c85d5054870d19960b90
SHA512 e017ea5afff26f139c20e91315edbba91cdcea6a74859addf6aae94db5ff2492f355c2213d68fabc35a1796acc64d75e2bc3be58727cfab43dcf630ee0c33992

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 cfaaa214d5245ca1d33ab5bf962e3d4d
SHA1 0fc26a440e319483bf6d318f7ca8d1d0498e65e3
SHA256 5ad06ee6cbfe672548ecd17c302c8969270e306940d94f8e97d8a20fa431966e
SHA512 404646e85e958bfbab653b44c18717dc5ea0a0562ce795f7b79f69ab0fb964e8a983a17cf5459c5a705065d70cee75cc3dc38b91e5ecb13570275ef18358fe73

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 360af78aa52f621ab22f8d06e6a10b10
SHA1 2fc7ca02f01f2b0937e43de3a9d01572710f47e4
SHA256 b71eed5375612d39dc7e63cb7e88ce0985360e76851994de12c570268ea375ab
SHA512 240b3369e7f91103c6042dbe8ea710b01f5f3dfa763f9239db8c79394263b5169b7c6baa9cf4d30d8d6eb339563f63fbd64931e2cd0bdcdb4275280dc4f75eb5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 01ccc4f7463f32ac35bb836c878b6a34
SHA1 469862a4a37fe82d56056f640fb7e2368ff78e54
SHA256 67e231bbb4827483230a809700389f2d9627176fc11b50639814546612266258
SHA512 fff7aad9160b81ed0c707930d4a9f90f71c602d052cf07bf91b75cb9540c5ee013725c1cdd3126da9d7103669636648a11dc787fa75b91532ae66376dd6571b5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 063bc21d28e0150486aaa83004afb6e3
SHA1 7a8cac435658183026cdfb865f6d1fa19743b230
SHA256 23ae253ecc17d86b20d5e453eafe561f3b4b3b236ec23d825e789f1cc6a6c7da
SHA512 b85d51cf42c24bd31ddc4d2552faf2f0c7d2fd7561d131ac969009e277773f8c160484ddf01aa27a19678ed88f9e94afa59beb94cf73126a7741a2c89c071070

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b8560eaeaf7e28b2695ec282c7bf6820
SHA1 97a19194ee724755d2effc0407d4db3690386719
SHA256 5954914f86232a32e89bdbbfef978bfa2a96a7a260d812fb8a44928dfd363183
SHA512 3efe02b5c94305edb3eafba6597817c3ab71079228bf6c7fba2745d9539816cc1e031cf5e1beae1d0b15f05a8f880333c4aa99ae530dc36b8977672489ee1f43

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9f6d82449c2879509fb2bc410239e90f
SHA1 c19fa368279f00733f945604bf639aebd125f8b0
SHA256 3fae3dc095d40157ad785d7bd74d392e58ab3cb6b68327ab821cf04121b20209
SHA512 1abaf428b6e26b90b25497b194b80c7db143573a193b523c92cdb9c713ef277a508f5db81ee50878a77d7990551f795bab38ec697165b20d8e58e88ebb09e7a8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 adc71a77a12f9815084d3f1286a730c6
SHA1 8fb4548695f94cb5430b301aba0e5a38ae5d70a0
SHA256 0b55ad529da33b3782023797c7d71edc9dcc98da848eb536b1216efbdd27e7e0
SHA512 f515ee01755bf3bf5124bb60aba3884ff1d18c20d8a507ffdb209c91b43a04869866210fe91f038fc30706149355d6816a20e2e380832f6754e9a985e7255b66

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9cea0c2a9401ef51f56926596ae10150
SHA1 92be2b3bfb030ad0fb499da38e95e0dee50a4b9d
SHA256 6477d0d33d2891a4c9a1539ec9f012e052ae8010edaa3a83de8b2dc043e56ca8
SHA512 3196c6fea53985271031eb7a621cf1557199bcdfcf38a67945991580d0fc240e1f137615cbe881ac141bfef97ecd454f6c958eed4d9fc6dddb7d0e1dadcb00b3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e5c9135e288f8ed027f0a8e77cbc7539
SHA1 9316f7b78a528a179da06d53437563688c9bd535
SHA256 d180ffdd7d1e8aafcfe644aa21d3abbabcbb3e51b9b2a136b766b3784a784b11
SHA512 c84f5709b6c473fbdd2557d2f291f8e9ea187afa3aeb9b49d5f6eb429d967a507bd9ec553a60690653d0dddb0a7a73e3c931706f721757cf09451cb844b4d183

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e02481649c3fc478cc5f7b3260dd5e67
SHA1 62893b24f88b935b4ae1e6baeb23cd857e72fcaf
SHA256 d345030d4ec69241a4be09b33d3bf7eee84588a5b50df8434c2718595194400c
SHA512 24c3cbab04586ee63ff3303532b457f7ea613f47d84b7aada68f9093006e508f0721ca91c6d197b124862ee4f445c7952daf1b67194eb2b868de12afae3be0d3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a7a027c186ab95a0cfc6326ae2997ee4
SHA1 227ac4eb13194a12d400464083bc7a4608491acf
SHA256 ee6a16b2b9e1d7f6e68c65fe1a0d3c7a2675d39bd5d535a1321f582b4f91102c
SHA512 6d54fc0e6eb9c915431599b54c8295a4f1b20c186dff97ea478d3f5efc0b73a15fc625b08b9cb544ff6f6e7c3eba657741455f0f161ccfd518ac970c6b0a38bd