Overview
overview
8Static
static
3BedrockLau...28.zip
windows10-1703-x64
6BedrockLau...or.dll
windows10-1703-x64
1BedrockLau...er.exe
windows10-1703-x64
1BedrockLau...er.exe
windows10-1703-x64
8BedrockLau...er.dll
windows10-1703-x64
1BedrockLau...Ex.dll
windows10-1703-x64
1BedrockLau...ck.dll
windows10-1703-x64
1BedrockLau...re.dll
windows10-1703-x64
1BedrockLau...PF.dll
windows10-1703-x64
1BedrockLau...it.dll
windows10-1703-x64
1BedrockLau...er.dll
windows10-1703-x64
1BedrockLau...ns.dll
windows10-1703-x64
1BedrockLau...ig.dll
windows10-1703-x64
1BedrockLau...ml.dll
windows10-1703-x64
1BedrockLau...ET.dll
windows10-1703-x64
1BedrockLau...rs.dll
windows10-1703-x64
1BedrockLau...ng.dll
windows10-1703-x64
3BedrockLau...og.dll
windows10-1703-x64
1BedrockLau...er.dll
windows10-1703-x64
1BedrockLau...on.dll
windows10-1703-x64
1BedrockLau...on.dll
windows10-1703-x64
1BedrockLau...on.dll
windows10-1703-x64
1BedrockLau...el.dll
windows10-1703-x64
1BedrockLau...rp.dll
windows10-1703-x64
1BedrockLau...rp.dll
windows10-1703-x64
1BedrockLau...er.dll
windows10-1703-x64
1BedrockLau...rt.dll
windows10-1703-x64
1BedrockLau...config
windows10-1703-x64
3BedrockLau...er.exp
windows10-1703-x64
3BedrockLau...er.lib
windows10-1703-x64
3BedrockLau...er.exp
windows10-1703-x64
3BedrockLau...er.lib
windows10-1703-x64
3Analysis
-
max time kernel
630s -
max time network
635s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
06-09-2024 20:33
Static task
static1
Behavioral task
behavioral1
Sample
BedrockLauncher2024.8.26.28.zip
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
BedrockLauncher/app/BedrockLauncher.UpdateProcessor.dll
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
BedrockLauncher/app/BedrockLauncher.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
BedrockLauncher/app/BedrockLauncher.exe
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
BedrockLauncher/app/CodeHollow.FeedReader.dll
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
BedrockLauncher/app/FolderBrowserEx.dll
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
BedrockLauncher/app/HtmlAgilityPack.dll
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
BedrockLauncher/app/HtmlRenderer.Core.dll
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
BedrockLauncher/app/HtmlRenderer.WPF.dll
Resource
win10-20240611-en
Behavioral task
behavioral10
Sample
BedrockLauncher/app/ICSharpCode.AvalonEdit.dll
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
BedrockLauncher/app/IniParser.dll
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
BedrockLauncher/app/JemExtensions.dll
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
BedrockLauncher/app/Markdig.dll
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
BedrockLauncher/app/MdXaml.dll
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
BedrockLauncher/app/Microsoft.Windows.SDK.NET.dll
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
BedrockLauncher/app/Microsoft.Xaml.Behaviors.dll
Resource
win10-20240611-en
Behavioral task
behavioral17
Sample
BedrockLauncher/app/MimeMapping.dll
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
BedrockLauncher/app/NLog.dll
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
BedrockLauncher/app/NLogViewer.dll
Resource
win10-20240404-en
Behavioral task
behavioral20
Sample
BedrockLauncher/app/Newtonsoft.Json.dll
Resource
win10-20240404-en
Behavioral task
behavioral21
Sample
BedrockLauncher/app/PostSharp.Patterns.Aggregation.dll
Resource
win10-20240404-en
Behavioral task
behavioral22
Sample
BedrockLauncher/app/PostSharp.Patterns.Common.dll
Resource
win10-20240404-en
Behavioral task
behavioral23
Sample
BedrockLauncher/app/PostSharp.Patterns.Model.dll
Resource
win10-20240611-en
Behavioral task
behavioral24
Sample
BedrockLauncher/app/PostSharp.dll
Resource
win10-20240404-en
Behavioral task
behavioral25
Sample
BedrockLauncher/app/RestSharp.dll
Resource
win10-20240404-en
Behavioral task
behavioral26
Sample
BedrockLauncher/app/Semver.dll
Resource
win10-20240404-en
Behavioral task
behavioral27
Sample
BedrockLauncher/app/SymbolicLinkSupport.dll
Resource
win10-20240404-en
Behavioral task
behavioral28
Sample
BedrockLauncher/app/nlog.config
Resource
win10-20240404-en
Behavioral task
behavioral29
Sample
BedrockLauncher/app/runtimes/win-x64/BedrockLauncher.TokenBroker.exp
Resource
win10-20240404-en
Behavioral task
behavioral30
Sample
BedrockLauncher/app/runtimes/win-x64/BedrockLauncher.TokenBroker.lib
Resource
win10-20240404-en
Behavioral task
behavioral31
Sample
BedrockLauncher/app/runtimes/win-x86/BedrockLauncher.TokenBroker.exp
Resource
win10-20240611-en
Behavioral task
behavioral32
Sample
BedrockLauncher/app/runtimes/win-x86/BedrockLauncher.TokenBroker.lib
Resource
win10-20240404-en
General
-
Target
BedrockLauncher2024.8.26.28.zip
-
Size
53.0MB
-
MD5
5349f41476301fef490cf7c42a4d2a37
-
SHA1
3dc16dfa2c2ed0d7789e059af099efa906142189
-
SHA256
8a57aa6477fb83df5b4cc1999aa5e98e8380632e38ccad28ffbc922bc6bdfedd
-
SHA512
6e267edb02b27f347969f74cd87594b2bb4944af89882c37b28d8cad92ef5ad97c0cdfd6a036e27ae2f44284b15e8c78a01ed499e22f4ccda4b0f60bb6f5846d
-
SSDEEP
1572864:plncbCOTAtKgoOqo0rYL1u0Oa09PrjnCClny+l2:vnsctKgZfHu0+FvRlyh
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Drops file in Windows directory 5 IoCs
Processes:
MicrosoftEdgeCP.exesvchost.exeMicrosoftEdge.exedescription ioc process File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File created C:\Windows\INF\netsstpa.PNF svchost.exe File created C:\Windows\INF\netrasa.PNF svchost.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdge.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Mfg svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Processes:
browser_broker.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies data under HKEY_USERS 4 IoCs
Processes:
chrome.exesvchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133701285517853379" chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BingPageData MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\EdpDomStorage\Total MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$vBulletin 4 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\EdpDomStorage\bing.com\NumberOfSubdomai = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 079d08d99c00db01 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\EdpDomStorage\www.bing.com MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DomainSuggestion MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 4acae2dc9c00db01 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DOMStorage\bing.com\Total = "1663" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\NextUpdateDate = "432467408" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "395205405" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BingPageData\RulesFileNextUpdateDate = "431817047" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DOMStorage\Total\ = "643" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DOMStorage\bing.com\Total = "651" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DomStorageState MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DOMStorage\www.bing.com\ = "651" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "395205405" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Cookies MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "268435456" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$Telligent MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$vBulletin 3 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\EdpDomStorage\bing.com MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DOMStorage\www.bing.com\ = "23" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 4820 chrome.exe 4820 chrome.exe 2888 chrome.exe 2888 chrome.exe -
Suspicious behavior: LoadsDriver 10 IoCs
Processes:
pid 4 4 4 4 4 628 4 4 4 4 -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
MicrosoftEdgeCP.exepid process 3584 MicrosoftEdgeCP.exe 3584 MicrosoftEdgeCP.exe 3584 MicrosoftEdgeCP.exe 3584 MicrosoftEdgeCP.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
Processes:
chrome.exepid process 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exepid process 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe -
Suspicious use of SendNotifyMessage 26 IoCs
Processes:
chrome.exepid process 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exepid process 1732 MicrosoftEdge.exe 3584 MicrosoftEdgeCP.exe 4028 MicrosoftEdgeCP.exe 1052 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4820 wrote to memory of 404 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 404 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4236 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4004 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 4004 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 1308 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 1308 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 1308 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 1308 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 1308 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 1308 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 1308 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 1308 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 1308 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 1308 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 1308 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 1308 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 1308 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 1308 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 1308 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 1308 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 1308 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 1308 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 1308 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 1308 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 1308 4820 chrome.exe chrome.exe PID 4820 wrote to memory of 1308 4820 chrome.exe chrome.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\BedrockLauncher2024.8.26.28.zip1⤵PID:588
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4340
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb554f9758,0x7ffb554f9768,0x7ffb554f97782⤵PID:404
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1748,i,4891443725106980766,2903815310864991522,131072 /prefetch:22⤵PID:4236
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2028 --field-trial-handle=1748,i,4891443725106980766,2903815310864991522,131072 /prefetch:82⤵PID:4004
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2076 --field-trial-handle=1748,i,4891443725106980766,2903815310864991522,131072 /prefetch:82⤵PID:1308
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1748,i,4891443725106980766,2903815310864991522,131072 /prefetch:12⤵PID:2252
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1748,i,4891443725106980766,2903815310864991522,131072 /prefetch:12⤵PID:1880
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4428 --field-trial-handle=1748,i,4891443725106980766,2903815310864991522,131072 /prefetch:12⤵PID:1280
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 --field-trial-handle=1748,i,4891443725106980766,2903815310864991522,131072 /prefetch:82⤵PID:4980
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 --field-trial-handle=1748,i,4891443725106980766,2903815310864991522,131072 /prefetch:82⤵PID:4764
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5000 --field-trial-handle=1748,i,4891443725106980766,2903815310864991522,131072 /prefetch:82⤵PID:820
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5360 --field-trial-handle=1748,i,4891443725106980766,2903815310864991522,131072 /prefetch:12⤵PID:348
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 --field-trial-handle=1748,i,4891443725106980766,2903815310864991522,131072 /prefetch:82⤵PID:5036
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=864 --field-trial-handle=1748,i,4891443725106980766,2903815310864991522,131072 /prefetch:12⤵PID:3124
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4468 --field-trial-handle=1748,i,4891443725106980766,2903815310864991522,131072 /prefetch:12⤵PID:1028
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4448 --field-trial-handle=1748,i,4891443725106980766,2903815310864991522,131072 /prefetch:82⤵PID:1744
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4516 --field-trial-handle=1748,i,4891443725106980766,2903815310864991522,131072 /prefetch:12⤵PID:520
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5672 --field-trial-handle=1748,i,4891443725106980766,2903815310864991522,131072 /prefetch:82⤵PID:2056
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=5692 --field-trial-handle=1748,i,4891443725106980766,2903815310864991522,131072 /prefetch:12⤵PID:3472
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3588 --field-trial-handle=1748,i,4891443725106980766,2903815310864991522,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=1516 --field-trial-handle=1748,i,4891443725106980766,2903815310864991522,131072 /prefetch:12⤵PID:1896
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=3040 --field-trial-handle=1748,i,4891443725106980766,2903815310864991522,131072 /prefetch:12⤵PID:1052
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=5428 --field-trial-handle=1748,i,4891443725106980766,2903815310864991522,131072 /prefetch:12⤵PID:4904
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=3036 --field-trial-handle=1748,i,4891443725106980766,2903815310864991522,131072 /prefetch:12⤵PID:596
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3872
-
C:\Windows\System32\SystemSettingsBroker.exeC:\Windows\System32\SystemSettingsBroker.exe -Embedding1⤵PID:3404
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s RmSvc1⤵PID:516
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s SstpSvc1⤵PID:3208
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:4168
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵
- Drops file in Windows directory
PID:4000
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s RasMan1⤵PID:2728
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s RasMan1⤵PID:4308
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1732
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:2340
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:3584
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4028
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1052
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:4664
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:2252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD52d6221862fbfed72cac86bbc3b918542
SHA10b225105786528ac75020e734bedc281f2619bf1
SHA2569db896e75d70071bc096aff42ee9a928cb15bd3714b40224d6194f14572d0a2e
SHA5122cafb0c8b9664064ba295e4786763fb48d03f0fa7e9bbc24f8246986ba4e100f371e5daa5a9a1dd08888308d0914aeb17fbf7be2848009740048305431ded191
-
Filesize
18KB
MD52e23d6e099f830cf0b14356b3c3443ce
SHA1027db4ff48118566db039d6b5f574a8ac73002bc
SHA2567238196a5bf79e1b83cacb9ed4a82bf40b32cd789c30ef790e4eac0bbf438885
SHA512165b1de091bfe0dd9deff0f8a3968268113d95edc9fd7a8081b525e0910f4442cfb3b4f5ac58ecfa41991d9dcabe5aa8b69f7f1c77e202cd17dd774931662717
-
Filesize
2KB
MD50385aa60b7b66bcc02d000825b04a3fa
SHA14ff11d1e93aefe16bf12de2bf5244b18b7543dc3
SHA25656c25efe89e2a12d6eba963ab654154ee42443a10e6bb155582ed12bff885c75
SHA5122a8e7acd01e0b518bc90838863f3cbc44b927a11435214631c99ea878b2062a49f3c88a6fe4437415a8001ecf49f410c400041aa4f6217a2eef5ae810e5e1f3d
-
Filesize
2KB
MD546c34034b9717dcdd7caaeb4b20bf7ea
SHA10e6e4edef9b11d8c4f7d3032fc332b1382bca128
SHA25673137c69c05412c877df907821b06b0be546ad5b5b342021b49a12d56c541068
SHA51255c7918f15bf0844750e4ad6cf15f8e5a7882da76fec978f5671811f768ec1b936b8d5731dc24b0b61fb6a58ea71a4ddd157d7d7e3c0c782263bcfc84847214b
-
Filesize
1KB
MD5ec942f65a5b630a8beb7ef09dff0a396
SHA1d0c39711bab911580e651cd1c715a132e0295d5d
SHA256251c310e8cccf46b3c189f6f7e6884eafb11b3a3a8af439cc1d0c9e34440411e
SHA512076518d4a44226a1500f7fa57073420709fd3c223ee1759878d0c187a4ab0d3a883968ecf04d7c61a8b0d9cdd856c4aebc5baacf1868ca45c7c9d4226b8bcbf4
-
Filesize
1KB
MD50c7eab8e6027fa6f0213b2c2f671a544
SHA147c811161793425ad1c517e574f98fa2c3ebe685
SHA256100189b4acf337425424c51c03a1cafa51f4c3b2449bc0f4ac49ad24db90582e
SHA512b8966eaa8704b9576c70c53369359785aac09cc24495538e87ca6fab99057a97e28b8a28174530372c46b93d2fba127e7c9a466449103d92036670cdd0a715f2
-
Filesize
1KB
MD5d8599abe5447c4be3c86c3f7705f118d
SHA1ec52a688654e659ce7d27196ad18d5637d4ed6b2
SHA256744318f2b7e50eb93c795b67ce00b2113203dc9dedb55c012c85d5028ed7d73b
SHA5125ca29ab781df075735ef4e75285a8e191520ae2d80ce7977f55aaba3d42f0e043bba8ff1da01d586ca7d8460eee6a8a59080c00d58f0966cf701a7a7a70795ff
-
Filesize
1KB
MD5a5578e46c42048fe8fc086bbd02d1b46
SHA1bd5823d294c56001463702ad485001c6eb8ac5f1
SHA256a0f4781eb0406cd65be80f32ef90eb2d82423200ff0043d21be9a0f4f5bfedbb
SHA512de4df9dd07c4510c17810a7c524a3c4a97a4c6d463310637f4bea3d65f8310d2494740a0f3e7c4ac2e56d953d3c9ad8524f4339fba495a9a1afd961e8b75af98
-
Filesize
1KB
MD5750fcf431a914b4c373d0e9b02050b95
SHA1b632b22cdee0cf45ee6862785480223e7dd6d48e
SHA256c0225d8321b3d7b2f5657deed9d2a694a3399b8208bed83f60ef31b75231c22c
SHA512e57cb68d4abc2e55640349ee3e106fadd87718b801dd39ea0f2ee3b5be072939d84556b88dabd16fd2171a84d3f35405bddaeb51a3de0178bbc758402c096a6f
-
Filesize
1018B
MD58b9f001c91099f472399c2e43f62d8ba
SHA1a7f1d6cd72086dbc22ed33fecd6953bd8f18e721
SHA2568b119346a5031be2d1c2c2afb366acfe98b1d7fb031635a4c6df3591a8a0102c
SHA512b93e4faa1210cbea8ad84265fef084962f604e0e6a3207afccc44254675be4388cf4b776ec3138fa97e94960fe882ce64c05a4aebf8b5a482f372880efa0a5c3
-
Filesize
1KB
MD5d58a4ae58a8d53c4e3b6ff0be92b3ac6
SHA16f33c6aab182306883a2dee868a39c3e49380b48
SHA256dbcdb47b3339c4a014b3f8431c7fe1a6c3cd111dd4281476ea3d6d7790754778
SHA512808cbc66090538b962aabd5307251bbc895fb37ebef398a48a3886fa4e0be1f560379e52514dbc2012b2d66ed1666ce559e2d8601c7b0d01756d750a0bab33bb
-
Filesize
1KB
MD5f2c9beb4ed4818a38326d9423988d64f
SHA1b8e42ee7bec38dc32bf7642d2475466508fc22c8
SHA256a6064773e5b8b68ca6c1b4b2da45deb1bc06a0b26401cba04e0641dd0e5266b0
SHA5127325ebfe652fd4533a3247950c34fdd1a744ff0c1afc215496387d165c2f6ff12b43ea1179981a9b7a8dc555d38cd4787439fe909a1fd39656c78848401425a8
-
Filesize
1KB
MD5344a8b654b81c193008a0dc814ea33dc
SHA1ee6f673ae768436cf696eefba279099085be432d
SHA256f75baa73a40427aca8511fdbdb32098888cce580ebe7f3eb09dfc77ee96bdda1
SHA512e561a5c4ea40e2d0348ff783a8de215c46e6cf48b1b523e4bcdb14ba28fc6a9a0f1f380440e72cf44b1325bae85ffee708e07f86055536800ed4d5a7aced5db7
-
Filesize
1KB
MD54f18c9651fe54f8e81d99efb9cb11d26
SHA17ccf047255a0e658fac6c5c468a35d893fa741a8
SHA256a1b1ac556101209e591f16bf9cfd1cb5193cf5cb913cb4b026a0687a95d4f6f0
SHA51299965845cebc0c6f892734102737cc24cc88fc01e112e3699748855709494caacf72a1d70e4b787eca9c6eac775e58637105862b609808e587321c7a5e6509b1
-
Filesize
1KB
MD5877d1a9ff0d0d6c2c93dde3ab29873c4
SHA1eaa572cde85969d1effa5961af2755ca48f34757
SHA256fff222f9c1c6f488a88b15169776e8ec32e8d0aea5b8004a3965977cfc2b8e7c
SHA51281e085efd2a1515f33497374e9cc55fcb3358c32fd2a85338d338367d1fc52c0421583e397fe0f8169e0b5def4f276fc9fd924b1725838d7bcd92dc3b98065e3
-
Filesize
1KB
MD52e10d9ed780fd4267d5f690ec4b3258a
SHA1ffb1ed6a59a21e50c3eb5649237b951174b98ce6
SHA2564d19a2ef6afa7d2175f704d77ee0c986b0e93df83acaa34863cc40dd67517bd5
SHA512b03b5fb0d1fd1c7a6b6a32f5342b26320419b952a8b14b33af958c4520ffc4a604d0104672a53acff393db9569636da5b7d65e4718a4fd4185e082bfb43aa835
-
Filesize
367B
MD5abbacd58ef8f962beac129f9479df509
SHA133a3df51925b551cc88407b471459b2f9abf84e5
SHA2565737a0d22d01b2c5472e79e0bed2ffc1a673d8954c15beb63ec67188578d221f
SHA51298e799e4bd3fca03eebc724400dacb9792207c55789ee2ce8c40811e6339f0ef1701659b486c08c7574f3e9e1cb5d7440093d37a94e5978d4dead736a1721062
-
Filesize
1KB
MD5c3ad88de2b49d0501d56d4e1214826c0
SHA1f121fa5b409d28fbe43eba98016a83967b9ec471
SHA256d0e5ed138f1b3b6fcd8321350b75f04a162e2e58bf5d7fb4ecbc64a9b17f3ea5
SHA512d43b2d85866b7cb40b20bccf7e3d7a51e7c368143a4d8bbf596a85e8d8558c37e9800635e86e9521b93ec45997acf38d22857582b74a8381879a3df7fc8dbcea
-
Filesize
5KB
MD542b89479efc390906544b8331b92892c
SHA172070ad14f94abc531294f3ebcefd2cd654f7095
SHA2563305aec34f7e5be72bec41d9eacc04a5501e0c448159635b4af6790416a23b20
SHA512d8afcfa7fc2462d80cd3e8b182c19744a2c10fd171c63998885813e2bdef4b3ca31c97c4af897991dc97f0fab1691ae58705d8bf427fa4c814020166b5e388e8
-
Filesize
6KB
MD5c30f54beaba940fd79cd9856eee8b742
SHA1dac4075990ff8fd5a170f4f4c2d00e7d037c627c
SHA256b0528f324d1c729c7c72e848a8220bebc5a44c51373555d1621ecf3eecbb77a3
SHA5126b84727ab3daba6d25c18b11e03f49413e3dc731d6604735d62e57f6fbd113c518436c90c81c1e303b280d9d6c28f783b364f318aaeafc99fc4ee080d13e6572
-
Filesize
6KB
MD5471fd7e19b2a6eba5ee2736c62c19186
SHA1d57c6a0b1661e8adcb78e5b7a7c91b4750b1d83d
SHA25630bc11ecb7c616025664991331e97a136d719e02e7837b357a24f5ea5ed236d7
SHA512ab9b0596438f67b1eb3d64a78d59397ba014f9cdb2c5d51fd4db8b0fc21798f3b01b52b32e46ff2ae36ab1622e22646adf0f043111f6c81c645ef03ac417f2e3
-
Filesize
6KB
MD50c0466b685e0283e4c4ac1b5afb3e355
SHA1cfedfeb089426c7ed2812d409731200905e7af09
SHA256f349650ca1b848e10affbc09f990f3bca474a059e6e5a422753c2ad5d3c637cf
SHA512957cd514107f0246af9cd0f9f271ef16aa848b8cc22cbfe5a85fce958c435a3fd53d8a645bce79aff001bfb88a429022051aba286fc1917eaae906fc83d95eb4
-
Filesize
6KB
MD5246431bed03a56751a10e76532bc675c
SHA1ec1cdf4a0443aabe93739f3bb86690338de6f251
SHA256881424e79fdaa8df525acb0a2aac41f5cc4049784c5df0dfb3a4ece706cbdbb4
SHA5122ea2f522ce9692b8daf6ca80dbec9b3d5105ec7c5373425f7297c8020f0904e4f9b3abb4a87111b56fa163f49b0ad73c6831b402df98341bbf9a568c3aacfbcd
-
Filesize
12KB
MD5db30440b8ad7e855bbfeef4a9c4c0d2e
SHA10c95ddd277524511fc1a93f5f8350290773ed190
SHA256ef298943b22d842859c235f59af0ce0906f0c5f7238f1783ed0102e95f05cf7a
SHA512c51885bded612f765d2a545653ac6143c66b996fddf599a3b7d8e4dfe3451ef3b030b27b81978f788f528f0804ecbcb8a2223afeefe4d281b8cfc61b79c00580
-
Filesize
303KB
MD51baaad5a2fa0960e65e6c6cc1330b67d
SHA1673f718a028ed80748964b0dfedb63c7bfaf1c45
SHA256e7255ca02656a3a1913e05e413cc794baf0c34d6b549b1949af002696de69dd8
SHA5122d275c448beec3b5c5432e87cb7533bfbc06c80835b8b068dab885fd4ba74ac2677a8ed42b32f146e2d889e046c1add1eea1c5d747dd7b2fd8b0c5920fdade3e
-
Filesize
303KB
MD5c72ae20b6d07ba6e738e5621b903657f
SHA170e89c1434baa4bbe87e46199885710e4dfe8eb3
SHA256fd4ec5108dcc3da4dccd782e63ce99226dab2268effa3f084d7b09d16ed314fc
SHA5129b1b621836896c01928098c2ca2f51b3e1b2a2956c297c2f9f10951160ff48820b40c479bd481351ab76d2be8bd2af56cf35b5dc7367684c161b33e2a08be297
-
Filesize
303KB
MD5b68954efaae0a935a4f3c60d4021c35e
SHA15aef9ceafe321ba2f26653c80956d339635f20a2
SHA25652d7dc6575e158bc56df752661be1ac8d36d29c846f7d8117f5ea9d1e17a21f1
SHA5128f5ebaddb5bde62842d7f846fd6571d455d22d450d3be217374c3a5f915611d005cb97e33c3423ee26287a873cc1eeff1ef66a41d82438992d7b6356954bb846
-
Filesize
303KB
MD5b6da008f2abb6ec9b616460d650a1974
SHA18b3ef91ba0ca040795326171d36f1a3f3f94c35d
SHA25693a38ec3383e186dbc24e38877bd36b6f91888a5ec847b464659280b226b36a2
SHA512e4131b67e249520027739f3c5f71ba6298271794b6aa3aa6c275cc4ccfeeed85d592705f041bce45ba2e277ff397974a4e50b530f530d8ce63b7dbd98a6d6d5d
-
Filesize
303KB
MD5de75a4d25c291100edec7ae593358e1a
SHA13c41ff8f2742f0c5d8bf8bc97b5a791e0fc9d520
SHA256faefe718f6d4600f464a1b562f84dbbe4a750d190a9f51dc648ae66cf7e6d52c
SHA512f344c9ee4f9e4730e99ed9ba76017ffe83a19bbcbd0e3a349e810e941d48c2452ad56840dedb51ed831c13a96e4e06c4ad192f3310e14d72abff938b9723ebbf
-
Filesize
303KB
MD502de6a6d48594b88640e72f9d819cb83
SHA1d8f799fac2c6bd1421f2f6bf8351af74202bee03
SHA2561c27d6cc22a0afcb83ead97c1ac8b9e989228c40058caad21e7f54e1dd22e7d3
SHA512c6273d48d26f7df5fd14d86d336386e76d8bd16b66ea60395db3979e051737e12a2fc470844e4e0d068ef3f834e051b8d812c0bb5acebb74745ddb0be82b5929
-
Filesize
303KB
MD5b53444a91c00d10ceff37503bd8eb1e4
SHA172b2997b1212fb748054d483b3e92824dce80a88
SHA25604d380268c2e37a2bfa27dd71ab8af16654175b2fcfb5aef16910b959ed66410
SHA512774254dff79d6b8bd60e82f2876da863af347c471af7e93e5d0a7cec570860f9fd811dba1423bd83cfe87dc3fd9b741578b9b41a4b23452b5d2b368117adc2b5
-
Filesize
106KB
MD5e912868adb3e1185e9b1d362e1caa6f3
SHA1ae34905775bd644e1aa3cf5ceed7aa69b552cf37
SHA256243ca28d7461aa0e0c8c7b44fccfc6058a82f3dc310ec15220a7377745c31167
SHA512d74cee83c6522596ff688b7a4c31a3c4ed641d39a1561f475b41b077a5faa9be9fde19f82a4059f721baf773e2987f9562efba923e285ef0c1a94016dac7e396
-
Filesize
105KB
MD53b14fa29c0c4164adbaca415519a41f2
SHA1b99995cb77a5fda6cf8e8c98c62ae46ec8dc0fbd
SHA256fe8d84c68a12c650899a595206dee4381c10aa82878930af9995cf67f84ff1c0
SHA512450d2749406c03039fd38f86669829c3ff98b6bd8a4838d694681bbca3c0b11c28ff5e1181307a72e5a119a32b2f07c6d60dfed3ec24f4c7876d84f83dc103fd
-
Filesize
93KB
MD5021ea324583c83906a07c6d70d0cf098
SHA179cfe98bc31eb624cb529dd4d409f580ce753d9b
SHA256e303e4d0d144670216433da4fd2af29b470892aa44930532b065cc786a79a437
SHA5123dbce8320fa1b2464f42638b102c4157cb0a406492b2abe4163069112511fa9dc44ad3ee7ccb1106e21d6f128397df3689b81d14b33a7c8ad625f0f55de99d47
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
74KB
MD5d4fc49dc14f63895d997fa4940f24378
SHA13efb1437a7c5e46034147cbbc8db017c69d02c31
SHA256853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1
SHA512cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\P0JFXRVZ\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize12KB
MD5c7f24a11fafaa9cac748e24da6396e1e
SHA174c01fa55c1fda0678e32e219752ab49bb585944
SHA2569765f2828a44a0dc7faa40e3d6dae9c397f900f06d2b132aa964c82d49d81a68
SHA512d1b905e7284613e6a614f1aa83387658a1d8a000a9f422e406b05a89fc517cc53e24907c26be05f544de69af274e326ddbcdbf4b46dcdee990851a8a02d3a1ae
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize8KB
MD570079e2411a64e8f153fc19d313074e0
SHA121d1ba94a69615e411060412979e985442a6fb76
SHA256974211229ad9bb7f7143518dd642b8f9e3e6ea3f509b716e23332227cede2d17
SHA5126d6b985754cbc7d0aa4f0103829c805e98f8d376e12e5d6fec8ec3d21f67b29ee4a2a70f71c40cbe9776fce4752ec1656ee6554ae2571758294df6991ba70fe1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize10KB
MD517668dfe5320774d3ae33caa590af5a1
SHA183de7d3cb2e51769bd12b8323001be1d7701e401
SHA256a2d48df88c3f659d7e32b738c0c42d2d3539cc5d8453078e060c942f7a55b175
SHA512420c3c39c1b6c1f7101483bfb3c08445093822f6b0005f6107df3ffa34e028756fcd7a4b390d08c0625092b53ce2b67f75a77476f236ab301db2ec2d5d575205
-
Filesize
14KB
MD5f654d39c122655b90b7ca2d070b1e07f
SHA19addae29b16102d6a63423134c994b76f235fcca
SHA2569446e875edc6ce76c2be2597c97eb26d834541299c0117b2f61cc7edf164d218
SHA51222e45d9f8d0eba76f4c2f684872c76bcfd4b625228630e2b5c1d7f0a9e3ef895c8d72b2d2c775b43c9a7e2aad1d061092974c546da22534356745393b8586e8a
-
Filesize
22KB
MD580648b43d233468718d717d10187b68d
SHA1a1736e8f0e408ce705722ce097d1adb24ebffc45
SHA2568ab9a39457507e405ade5ef9d723e0f89bc46d8d8b33d354b00d95847f098380
SHA512eec0ac7e7abcf87b3f0f4522b0dd95c658327afb866ceecff3c9ff0812a521201d729dd71d43f3ac46536f8435d4a49ac157b6282077c7c1940a6668f3b3aea9
-
Filesize
6KB
MD57976126e8a874f34cf95425309d1903a
SHA16744e862142030e81e5e4132c32fce6d62268ed0
SHA256c77bce0deaba5531d1a053b126edd5d3ab723674f3e82c54b0d212cb5f118a5d
SHA512439e7bcd305316eaad5a49949b41f56ad337002b8d298e5c16cf72d10b6c1e91d1947074198a1c76c579cd37e71346142dedbefe81e3883d10868ade85a0a003
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e