Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
19/07/2024, 19:26
240719-x5x16awdjp 1019/07/2024, 19:22
240719-x3gamawcjq 819/07/2024, 19:19
240719-x1lsbszapb 819/07/2024, 19:16
240719-xyvx8azajf 7Analysis
-
max time kernel
105s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 19:19
Static task
static1
Behavioral task
behavioral1
Sample
zeta-updater-1.0.1.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
zeta-updater-1.0.1.exe
Resource
win10v2004-20240709-en
General
-
Target
zeta-updater-1.0.1.exe
-
Size
3.1MB
-
MD5
b10ed91a7fe5a422d9c2f9aff5696a19
-
SHA1
c83105f812109e5f6a26564c197f49d61b2ef403
-
SHA256
94c0a829b34030f4b279c794962627eb422cd3ce3f969eb8ca330ca0c9f82635
-
SHA512
fc0d5149ce62ba67755732e5a0004a158bb36ec4e166fcbd734a89c9bde855e71ccf06ee5c7ff9df0834397178c90b9da40769b0275ea487d41c8201f7007c25
-
SSDEEP
49152:5wSHmvR05JIoEe/avRAvUP5v8R3Lkvrd2o8FEOrJUjnjv/kFE2fSAeFa5J9dxSFw:bOAvsU0D/IE5AeFWxxSFw
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 10 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 2872 loader.exe -
Enumerates connected drives 3 TTPs 20 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHos = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings taskmgr.exe Set value (data) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHos = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2990742725-2267136959-192470804-1000\{6B4AB777-E37D-4EB4-B1F7-A5533CCC274E} explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHos = 6801000088020000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHos = 6801000088020000 explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2990742725-2267136959-192470804-1000\{5276D664-431A-4C42-9938-CF48F35784A4} explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2990742725-2267136959-192470804-1000\{BD555684-010F-48E7-92F2-E803D08D62F0} explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2990742725-2267136959-192470804-1000\{FD683431-ABC3-43C1-8BF2-B8F260CB685D} explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHos = 6801000088020000 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2990742725-2267136959-192470804-1000\{4B8785DC-1835-4F97-9410-CE17D56005DC} explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHos = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2990742725-2267136959-192470804-1000\{1FE9509E-071B-48DF-9CBE-6C00873C369A} explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 544 powershell.exe 544 powershell.exe 544 powershell.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1840 7zFM.exe 2508 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 544 powershell.exe Token: SeDebugPrivilege 2508 taskmgr.exe Token: SeSystemProfilePrivilege 2508 taskmgr.exe Token: SeCreateGlobalPrivilege 2508 taskmgr.exe Token: SeRestorePrivilege 1840 7zFM.exe Token: 35 1840 7zFM.exe Token: SeShutdownPrivilege 3284 explorer.exe Token: SeCreatePagefilePrivilege 3284 explorer.exe Token: SeShutdownPrivilege 3284 explorer.exe Token: SeCreatePagefilePrivilege 3284 explorer.exe Token: SeShutdownPrivilege 3284 explorer.exe Token: SeCreatePagefilePrivilege 3284 explorer.exe Token: SeShutdownPrivilege 3284 explorer.exe Token: SeCreatePagefilePrivilege 3284 explorer.exe Token: SeShutdownPrivilege 3448 explorer.exe Token: SeCreatePagefilePrivilege 3448 explorer.exe Token: SeShutdownPrivilege 3448 explorer.exe Token: SeCreatePagefilePrivilege 3448 explorer.exe Token: SeShutdownPrivilege 3448 explorer.exe Token: SeCreatePagefilePrivilege 3448 explorer.exe Token: SeShutdownPrivilege 3448 explorer.exe Token: SeCreatePagefilePrivilege 3448 explorer.exe Token: SeShutdownPrivilege 5064 explorer.exe Token: SeCreatePagefilePrivilege 5064 explorer.exe Token: SeShutdownPrivilege 5064 explorer.exe Token: SeCreatePagefilePrivilege 5064 explorer.exe Token: SeShutdownPrivilege 5064 explorer.exe Token: SeCreatePagefilePrivilege 5064 explorer.exe Token: SeShutdownPrivilege 5064 explorer.exe Token: SeCreatePagefilePrivilege 5064 explorer.exe Token: SeShutdownPrivilege 544 explorer.exe Token: SeCreatePagefilePrivilege 544 explorer.exe Token: SeShutdownPrivilege 544 explorer.exe Token: SeCreatePagefilePrivilege 544 explorer.exe Token: SeShutdownPrivilege 544 explorer.exe Token: SeCreatePagefilePrivilege 544 explorer.exe Token: SeShutdownPrivilege 544 explorer.exe Token: SeCreatePagefilePrivilege 544 explorer.exe Token: SeShutdownPrivilege 916 explorer.exe Token: SeCreatePagefilePrivilege 916 explorer.exe Token: SeShutdownPrivilege 916 explorer.exe Token: SeCreatePagefilePrivilege 916 explorer.exe Token: SeShutdownPrivilege 916 explorer.exe Token: SeCreatePagefilePrivilege 916 explorer.exe Token: SeShutdownPrivilege 916 explorer.exe Token: SeCreatePagefilePrivilege 916 explorer.exe Token: SeShutdownPrivilege 916 explorer.exe Token: SeCreatePagefilePrivilege 916 explorer.exe Token: SeShutdownPrivilege 4668 explorer.exe Token: SeCreatePagefilePrivilege 4668 explorer.exe Token: SeShutdownPrivilege 4668 explorer.exe Token: SeCreatePagefilePrivilege 4668 explorer.exe Token: SeShutdownPrivilege 4668 explorer.exe Token: SeCreatePagefilePrivilege 4668 explorer.exe Token: SeShutdownPrivilege 4668 explorer.exe Token: SeCreatePagefilePrivilege 4668 explorer.exe Token: SeShutdownPrivilege 4020 explorer.exe Token: SeCreatePagefilePrivilege 4020 explorer.exe Token: SeShutdownPrivilege 4020 explorer.exe Token: SeCreatePagefilePrivilege 4020 explorer.exe Token: SeShutdownPrivilege 4020 explorer.exe Token: SeCreatePagefilePrivilege 4020 explorer.exe Token: SeShutdownPrivilege 4020 explorer.exe Token: SeCreatePagefilePrivilege 4020 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 1840 7zFM.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2600 wrote to memory of 2872 2600 zeta-updater-1.0.1.exe 94 PID 2600 wrote to memory of 2872 2600 zeta-updater-1.0.1.exe 94 PID 2872 wrote to memory of 544 2872 loader.exe 95 PID 2872 wrote to memory of 544 2872 loader.exe 95 PID 2552 wrote to memory of 3644 2552 msedge.exe 112 PID 2552 wrote to memory of 3644 2552 msedge.exe 112 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 864 2552 msedge.exe 113 PID 2552 wrote to memory of 5084 2552 msedge.exe 114 PID 2552 wrote to memory of 5084 2552 msedge.exe 114 PID 2552 wrote to memory of 4072 2552 msedge.exe 115 PID 2552 wrote to memory of 4072 2552 msedge.exe 115 PID 2552 wrote to memory of 4072 2552 msedge.exe 115 PID 2552 wrote to memory of 4072 2552 msedge.exe 115 PID 2552 wrote to memory of 4072 2552 msedge.exe 115 PID 2552 wrote to memory of 4072 2552 msedge.exe 115 PID 2552 wrote to memory of 4072 2552 msedge.exe 115 PID 2552 wrote to memory of 4072 2552 msedge.exe 115 PID 2552 wrote to memory of 4072 2552 msedge.exe 115 PID 2552 wrote to memory of 4072 2552 msedge.exe 115 PID 2552 wrote to memory of 4072 2552 msedge.exe 115 PID 2552 wrote to memory of 4072 2552 msedge.exe 115 PID 2552 wrote to memory of 4072 2552 msedge.exe 115 PID 2552 wrote to memory of 4072 2552 msedge.exe 115 PID 2552 wrote to memory of 4072 2552 msedge.exe 115 PID 2552 wrote to memory of 4072 2552 msedge.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\zeta-updater-1.0.1.exe"C:\Users\Admin\AppData\Local\Temp\zeta-updater-1.0.1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Roaming\zeta\loader.exe"C:\Users\Admin\AppData\Roaming\zeta\loader.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -c ./C:\Users\Admin\AppData\Roaming\zeta3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:544
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2508
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1404
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Roaming\zeta\loader.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1840
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff8bac146f8,0x7ff8bac14708,0x7ff8bac147182⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2012 /prefetch:22⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4576 /prefetch:82⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4576 /prefetch:82⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:12⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2420 /prefetch:22⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2440 /prefetch:22⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2424 /prefetch:22⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3708 /prefetch:22⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2280 /prefetch:22⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=5724 /prefetch:22⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=1996 /prefetch:22⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=5964 /prefetch:22⤵PID:3624
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4120
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:884
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:1508
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:4564
-
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3284
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3448
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:544
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:916
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4668
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:2988
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:2044
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Modifies registry class
PID:4128
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:1868
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2756
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:1748
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4128
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4136
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4120
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2480
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:3908
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:1972
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:1748
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:1304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
418B
MD5eed4949c9405e34cda7281bfe0a64670
SHA1c22f16a0dae4fdf8d20b7fc83309a69d21e33ceb
SHA25611a16adf1d0a523b12eaa7f5fe85714b563e8fd0d39e474366be2010a88484ba
SHA5128c1b389311f8cc8f0341b2915da346709594238b82135df46f47b974f69845d5382302c0688155eae2825730b017a4ac6d48dc8787241898a01b7bb08a0448e8
-
Filesize
954B
MD50f2dabfef3902e9d0121cbb4cae26e8e
SHA1ad59e26d1cf92961bd406726161acebe150b5300
SHA25653160bff15ef070d6e1f3917c363ed157182baa6c6b131c678a1f2c411c64220
SHA5124e9b93ef5e352ecc93ce4339452d8263d4092ce999a8c2619362507b36f7565c709464eaf7d9a129196aac4d095aca7aff1ced22163c73263b77e673bc83fc39
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\1ff5a745-f5c8-4baa-bc55-d0850c647ab0.dmp
Filesize900KB
MD5ac901417bbd0274cb59face7fffe7d47
SHA19ab7341db1e79d3b484aa84199dbecdae779b972
SHA256bdc93b3c87f6b2f42ee710783d786482a038257e93a206074f2275bc434e18df
SHA5123ee867ebdf1521d63ec9cc3da0378d9908257799da45a3858666a478c92e471b796c09a4fcc68a2335736123e426b8b79187dba0650871708e250e6fe09d9e73
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\2bb8865e-e3b4-41f2-92d2-273dd4ab7aa6.dmp
Filesize892KB
MD5e02780178116c983bcc8adfa6d003503
SHA1168987af0ef14e57eda0da65c24ae73d7de96043
SHA2568ca6fbf4f34d12691bb00e55e1f280088b81a5e011e85ad74f4b329358b755da
SHA5120e6a47c2a110297fd5b8f308534b3a0de75ecea7f1db4bf7eac583769be476ba3b40f64b17f0b0f11f3814da23cc1766daa7e860c23e5fa07653641a18d29f56
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\3e174a3f-0843-4bb8-9bbd-0fe2cb643053.dmp
Filesize900KB
MD59f6d5ebb96151ae432a1008ddbd3214d
SHA135b53b66bed81802fa97451148c93f82c48f205d
SHA256b3c001c7bb033ece06dfc819bde332bab4d6191fa49a31f0fb72e43f7ccb2c16
SHA5129d0ab559bf5d99448142cb6fa859c40e9d1fa9c0dca60fba6024796c5696e98dbbf66e8bdaa409c7fa0bc29a59cec928be76ea6a89389030be42ab73a5831f7f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\42f703cf-d1a5-4c17-a58b-c89a53512c94.dmp
Filesize892KB
MD51692ccee6ebfbf2d9aace488ea642fad
SHA1ab90a0105a9187ba8321253e3e7c01f29dc354a3
SHA256b26a2c28a0e86669a869c2bf5627bec0890c1709b23dcd9a2c19f4dea94dbe8c
SHA51296b1305051980ed1b29de873d1307802dbee1720bcdeb8df220411e9d38c71e6d18960ab2cb83c26c269aa47995021e9c9af8306261e488181c55f0dfb1bbf12
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\7aed2ab2-3327-46ea-88b6-e9c9ef5745a2.dmp
Filesize900KB
MD5afba93515e2b13b0ae4037ceb2abe1ab
SHA12724251e3732fe65bad480a9bfcafafe0b0455da
SHA2564f98029332e8e8171b566157ad3a00f6ffcac066b645178f318723d3d1fef059
SHA5124dfd1e3d59507c35f7080b1eaf3aedfa53a6f5e1c7e992536bcbb7f171062273c0bd7553b3e1a8c92f339931f916cc594d56fd89f68cf3f65ada0ff9b707bdf1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\960b662d-1c1c-4eb0-b0d8-37c08469a906.dmp
Filesize892KB
MD5ac752b451db8a3ec56ee0ac7870af674
SHA154e80c063d55d571d0def42855fc64fc1d7c7b3b
SHA2566dcb007e7fb1223611c1343cd2e991d41ec9fc9d21f17e2b9f22f41b59e9237d
SHA51282643f7c04b51884a3b9da00b637a80a39ab3897f1379e9f35658a68f4126dec6b791d762e199f55fd43653865641bc0e47120be602ffc42197d269f6a9f9072
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\9b275769-2de2-474a-b428-06b2d54f47b3.dmp
Filesize6.0MB
MD5000cd5bd4d2c6665126dafb6b36f986d
SHA1006b06da63cc28c798f789ff226e95c51022ae2c
SHA256168e96b0074a6849c98232452964bf65899c4748b3c4d499cd772cadc9140a4c
SHA5122c3fb2647d7154d06acc5c05df0751815657b06b4d1154d6796f0b25afad768f13746dcae77873ebeb27112ea14114ef56a8c1234f23ad5c45a8a3e6289e01b2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\a78039d4-7255-4634-a606-bebe1941c538.dmp
Filesize892KB
MD5aa2739c10a2c1484d075d905295dd34e
SHA110e3ebcabc86f9ad3bee4f0c85699179189bfe24
SHA256c0392ec938d8d6a796a8b0ffab04b88e126b53b05c0219d856b0b0d09f65cea6
SHA512cb1d761eb5953d5181cab20e64a6a49a6c268f6519d15f79eef0d95e1b0b84ba308135bb7fdad3871aba40a02583714600639b631fc26e70a23640f0349c591a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\b5f58582-b27e-420c-a93d-df5b4227b1a8.dmp
Filesize892KB
MD5c5108a4a8bab0250a2c9197445a7f7e6
SHA1bbd3bba54ee93a3e73d69d89457b76c4f20b5a6f
SHA2560a26005fa4be6a82d4d6b055b5879390401c1600b1ae70e60219529183c1a813
SHA51281bcbf6cae89436e519eb6a946b46c86fd6e453934ad0bebe4b03b9ebb93c77b5683497f503a96d00f31b1d73e5c8d086f290527c8f72449ea9a482526dfe6a5
-
Filesize
152B
MD5561de06bc703372142d3661d2a4d76d1
SHA14c1cbd1e539174eef286afbc9c46e8d0d0497a37
SHA256af4d3f8b412e702e00cd145a2c4afb6905319630fbfac09f19b1245276866e74
SHA512e2efcf1c62877320bbb65968f62d7eabe9813d49971ba1cf50f6690a82543909ac1bbebf78be4be18423dfaeda93e0d5deef10da4d45bd8ddd9a7ca44b2ff1f5
-
Filesize
152B
MD55a8ea2426e2eb4c51bb6b2231d2e5256
SHA122b89c25d965f91e578049320d223d9bfc949ebd
SHA2566c32138c6fd4995ed5048b9a963888d5f821acedf5b0a2d72b336fb409e2c345
SHA512ad9a7e16774a267fee89fb6b654ab26408106c1202b3b4416ff161df7df8cf18f46fc0d4db275e3f3d372c825d7b5df89701132e5f3e27fb8cb894b6947812dc
-
Filesize
152B
MD502336ad37ca4dc668d663c5b13cddaa2
SHA1907f28ba9e252b285f7f3a046cad60f984ca0acf
SHA256dc058cb9fdf8d4f01c54a1329d1fee5312fb72ac01264f457987dd371ba9467c
SHA51243206e3a1b43f31ede510dac984ffa31266de96313998b57642b8c4f9f16a882b658d6a5aeeb9d17484a00232f3fa464a657eac303a7cb507a4b5c693f0adfaa
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD5dfc7ff47b07e18f67ccfb4f60a49dd8a
SHA10b8b50df256b14a01bb52bbb688d4b51cb20669a
SHA2569b8e5770ae19435d8e1fa2d5814f0cadda96d9207b598a90009c357f7d4d9518
SHA512163f50f099deb53b7723d3c629e39bd08b20c0c28fa2d75edf923babdc106e3c16fe25a7b193f27b738ec9ff8bbd6b5295cfb66af399e2bf7b0851a108578004
-
Filesize
5KB
MD55a4f9d8b60754f97cf3ea1c26535f422
SHA104cdfd74ad9ea8da5c629dbd212a967159e32eb2
SHA2565dcdd5843fef8762505fc027b234ad0ba6c9ebeaa15dfae7ff1f1b06510f0ac0
SHA512753154eda132a43a78cb58c19a79ae718c81776c87cad697d2a0bce6f1b75722e19c479105fa6235a9b788634e38da5522fb9f02d1c7b7693a5d023aee75bf20
-
Filesize
6KB
MD555ec42e8b249b2f7d856049bc9b482dd
SHA1ae6bfe2efdfed3aca8fd78de1dea6bdcbb681d5f
SHA256d26874baee78533d28536eae150539b9682b11d9a56a151d334ea61e00eea5fa
SHA51272059a646d4a9ebe311bf43f83e6058375d3201bc95f22565341aae7c28c576f8a61df726e4820ae5998fbc92a395e2c9209e4792954b4b0f7d18207437a34df
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56bfe2942c6d4adc29d69919b181928d2
SHA17fccc8be034f7fa3fcc7fe85ee095fdf8ef17f1d
SHA2562895670d52a215bfed01a28c587a82c60e2f072c68be1a8a2912784e3c429b81
SHA5122683d1282db0ce518469b4031b22923f8a31681bbbbdea5ba45010a4eb6b222e4271811a3d5e7e8b2f82162167358e500de9b549c858f553e0e2d5932855fa9f
-
Filesize
11KB
MD5cd0d05fdac8ae43c63c7d722c68b0a22
SHA17b4e860a4996dbfaf182224bdea9cb86d170a266
SHA2569490a57a6418682a695ea5da91ec6c78b837d9840d8fee4192d0dccf8383e999
SHA5123caf6e16370bc91c921d8da18cee1a9b42a003773733b896373d70237551df731f9741817e7f1b4c123804e99cd878ec183121e113f3e2bfe599481498f80d28
-
Filesize
264KB
MD51221d926bf8090c3d1239c0afa5b2702
SHA1dd7437aff0a5ecff1529a5d7abb458456b888d3f
SHA256ef8fc650812fac335b8404ce7b1153c23c7f0ed91a90c1758fcd3dd550e3cd82
SHA512be9079d9a8d84fb4dcd227abf3baffa13992baecb72b28e52c8ed39e2144069367764c17c358b16c01824432150ef7d4404538b98c7531e0484ca2dfdeb34919
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4.1MB
MD5ab2242c4aba7518eecc26620cbd1d4aa
SHA1ba46c9820732a289cd30a25bfcfc1b3492a6dee1
SHA256b593c2f3d90d0205c1c465d8295514f8e1ec4df4acb3b45c844c72a9529e46f8
SHA5126c3f80b5e6628481a9cbb7c14e020c46c6d4ebb2bcabc5701035c47417000631e6d6c8b3650e0a60e6ad6d1a8e36d75c81e6b36c2539f522aa7cc72eec678472