Analysis
-
max time kernel
741s -
max time network
742s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2025, 14:37
Behavioral task
behavioral1
Sample
X.exe
Resource
win10v2004-20250217-en
General
-
Target
X.exe
-
Size
82KB
-
MD5
b201ce5dcb58284da7a5ef6294418e56
-
SHA1
27573051f80debfd74e1a72d27cfd29f58c76d7e
-
SHA256
188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed
-
SHA512
f282f9efa40ce5e753faf803079af9aae478711e6e2f3dcf09c744ae3e670c6ef0cb18b62c8e57ba825faef8c396dd481768ef0680681d4b1b80ad1c3433f11c
-
SSDEEP
1536:D2wgD0/WhgBpRCn3wtSD+bQ6QqTMj34Al6G4tIzOasNnP6UO:ywkeWQCn1+bQdjrytuOa6Sz
Malware Config
Extracted
xworm
127.0.0.1:36623
fax-scenarios.gl.at.ply.gg:36623
-
Install_directory
%AppData%
-
install_file
SolaraX.exe
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/224-75-0x000000001BDF0000-0x000000001BDFE000-memory.dmp disable_win_def -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/224-1-0x0000000000DA0000-0x0000000000DBA000-memory.dmp family_xworm behavioral1/files/0x000800000001eb8f-60.dat family_xworm -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "5" X.exe -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1228 powershell.exe 776 powershell.exe 1780 powershell.exe 2632 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation X.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SolaraX.lnk X.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SolaraX.lnk X.exe -
Executes dropped EXE 10 IoCs
pid Process 1516 SolaraX.exe 2716 SolaraX.exe 4448 SolaraX.exe 2184 SolaraX.exe 3896 SolaraX.exe 3300 SolaraX.exe 4416 SolaraX.exe 3472 SolaraX.exe 4100 SolaraX.exe 4976 SolaraX.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SolaraX = "C:\\Users\\Admin\\AppData\\Roaming\\SolaraX.exe" X.exe -
Drops desktop.ini file(s) 17 IoCs
description ioc Process File opened for modification C:\Users\Admin\Music\desktop.ini X.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini X.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini X.exe File opened for modification C:\Users\Admin\Searches\desktop.ini X.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini X.exe File opened for modification C:\Users\Admin\Links\desktop.ini X.exe File opened for modification C:\Users\Admin\Videos\desktop.ini X.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini X.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini X.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini X.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini X.exe File opened for modification C:\Users\Admin\Documents\desktop.ini X.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini X.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini X.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1479699283-3000499823-2337359760-1000\desktop.ini X.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini X.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini X.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\XBackground.bmp" X.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Enumerates system info in registry 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000_Classes\Local Settings taskmgr.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4532 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1228 powershell.exe 1228 powershell.exe 776 powershell.exe 776 powershell.exe 1780 powershell.exe 1780 powershell.exe 2632 powershell.exe 2632 powershell.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 952 msedge.exe 952 msedge.exe 2868 msedge.exe 2868 msedge.exe 2936 identity_helper.exe 2936 identity_helper.exe 3732 msedge.exe 3732 msedge.exe 1308 msedge.exe 1308 msedge.exe 1960 identity_helper.exe 1960 identity_helper.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 224 X.exe 4004 msedge.exe 4004 msedge.exe 2032 msedge.exe 2032 msedge.exe 1444 identity_helper.exe 1444 identity_helper.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 224 X.exe 4428 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 27 IoCs
pid Process 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeDebugPrivilege 224 X.exe Token: SeDebugPrivilege 1228 powershell.exe Token: SeDebugPrivilege 776 powershell.exe Token: SeDebugPrivilege 1780 powershell.exe Token: SeDebugPrivilege 2632 powershell.exe Token: SeDebugPrivilege 224 X.exe Token: SeDebugPrivilege 1516 SolaraX.exe Token: SeDebugPrivilege 2716 SolaraX.exe Token: SeDebugPrivilege 4448 SolaraX.exe Token: SeDebugPrivilege 2184 SolaraX.exe Token: SeDebugPrivilege 3896 SolaraX.exe Token: SeDebugPrivilege 3300 SolaraX.exe Token: SeDebugPrivilege 4416 SolaraX.exe Token: SeDebugPrivilege 3472 SolaraX.exe Token: 33 2296 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2296 AUDIODG.EXE Token: SeDebugPrivilege 4100 SolaraX.exe Token: SeDebugPrivilege 1152 taskmgr.exe Token: SeSystemProfilePrivilege 1152 taskmgr.exe Token: SeCreateGlobalPrivilege 1152 taskmgr.exe Token: SeDebugPrivilege 4976 SolaraX.exe Token: 33 1152 taskmgr.exe Token: SeIncBasePriorityPrivilege 1152 taskmgr.exe Token: SeDebugPrivilege 4428 taskmgr.exe Token: SeSystemProfilePrivilege 4428 taskmgr.exe Token: SeCreateGlobalPrivilege 4428 taskmgr.exe Token: SeCreateGlobalPrivilege 4104 dwm.exe Token: SeChangeNotifyPrivilege 4104 dwm.exe Token: 33 4104 dwm.exe Token: SeIncBasePriorityPrivilege 4104 dwm.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 224 X.exe 4932 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 224 wrote to memory of 1228 224 X.exe 92 PID 224 wrote to memory of 1228 224 X.exe 92 PID 224 wrote to memory of 776 224 X.exe 95 PID 224 wrote to memory of 776 224 X.exe 95 PID 224 wrote to memory of 1780 224 X.exe 98 PID 224 wrote to memory of 1780 224 X.exe 98 PID 224 wrote to memory of 2632 224 X.exe 100 PID 224 wrote to memory of 2632 224 X.exe 100 PID 224 wrote to memory of 4532 224 X.exe 103 PID 224 wrote to memory of 4532 224 X.exe 103 PID 2868 wrote to memory of 2932 2868 msedge.exe 136 PID 2868 wrote to memory of 2932 2868 msedge.exe 136 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 2328 2868 msedge.exe 137 PID 2868 wrote to memory of 952 2868 msedge.exe 138 PID 2868 wrote to memory of 952 2868 msedge.exe 138 PID 2868 wrote to memory of 4488 2868 msedge.exe 139 PID 2868 wrote to memory of 4488 2868 msedge.exe 139 PID 2868 wrote to memory of 4488 2868 msedge.exe 139 PID 2868 wrote to memory of 4488 2868 msedge.exe 139 PID 2868 wrote to memory of 4488 2868 msedge.exe 139 PID 2868 wrote to memory of 4488 2868 msedge.exe 139 PID 2868 wrote to memory of 4488 2868 msedge.exe 139 PID 2868 wrote to memory of 4488 2868 msedge.exe 139 PID 2868 wrote to memory of 4488 2868 msedge.exe 139 PID 2868 wrote to memory of 4488 2868 msedge.exe 139 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\policies\system X.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "5" X.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\X.exe"C:\Users\Admin\AppData\Local\Temp\X.exe"1⤵
- UAC bypass
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:224 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\X.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1228
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'X.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\SolaraX.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SolaraX.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "SolaraX" /tr "C:\Users\Admin\AppData\Roaming\SolaraX.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\How To Decrypt My Files.html2⤵PID:3500
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9535d46f8,0x7ff9535d4708,0x7ff9535d47183⤵PID:4368
-
-
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4448
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1888
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4932
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9535d46f8,0x7ff9535d4708,0x7ff9535d47182⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,5739851506218558044,6226668470655945502,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,5739851506218558044,6226668470655945502,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,5739851506218558044,6226668470655945502,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,5739851506218558044,6226668470655945502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,5739851506218558044,6226668470655945502,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,5739851506218558044,6226668470655945502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,5739851506218558044,6226668470655945502,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,5739851506218558044,6226668470655945502,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,5739851506218558044,6226668470655945502,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,5739851506218558044,6226668470655945502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,5739851506218558044,6226668470655945502,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,5739851506218558044,6226668470655945502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,5739851506218558044,6226668470655945502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:2240
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1716
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9535d46f8,0x7ff9535d4708,0x7ff9535d47182⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,18433774639469648992,17292295153097815167,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,18433774639469648992,17292295153097815167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2556 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,18433774639469648992,17292295153097815167,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2968 /prefetch:82⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,18433774639469648992,17292295153097815167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,18433774639469648992,17292295153097815167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,18433774639469648992,17292295153097815167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4348 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,18433774639469648992,17292295153097815167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3700 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,18433774639469648992,17292295153097815167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3588 /prefetch:82⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,18433774639469648992,17292295153097815167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3588 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,18433774639469648992,17292295153097815167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:12⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,18433774639469648992,17292295153097815167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3844 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,18433774639469648992,17292295153097815167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,18433774639469648992,17292295153097815167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,18433774639469648992,17292295153097815167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,18433774639469648992,17292295153097815167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4476 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,18433774639469648992,17292295153097815167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:12⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,18433774639469648992,17292295153097815167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2036 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,18433774639469648992,17292295153097815167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:4896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1504
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4708
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\How To Decrypt My Files.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ff9535d46f8,0x7ff9535d4708,0x7ff9535d47182⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,10066597106445057567,12597229558702125980,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,10066597106445057567,12597229558702125980,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,10066597106445057567,12597229558702125980,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10066597106445057567,12597229558702125980,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10066597106445057567,12597229558702125980,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,10066597106445057567,12597229558702125980,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,10066597106445057567,12597229558702125980,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10066597106445057567,12597229558702125980,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10066597106445057567,12597229558702125980,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10066597106445057567,12597229558702125980,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3580 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10066597106445057567,12597229558702125980,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:12⤵PID:2000
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3508
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3300
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4416
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3472
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x420 0x3e01⤵
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4100
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4544
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4104
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
152B
MD5f26c6527981fa81a83e126aa48a3474b
SHA1b1e454bd2eff22e1855e6f210a239c86d4b780a0
SHA2568d3b6a85a89b3a3d84ea7032bece4d826f7646acb5e41a335b337ec3b650298a
SHA512ba15a05a1c8c2219bdc00a212dba0e9fb8fd95946af2401d372cd7072ea78594b4036ceb947be6f455a0bf9ffbe14fc35bf49915ebe4baa6a3da42d34b740871
-
Filesize
152B
MD51af5f8bff816f07133802323434ce71b
SHA1f4996fcce06b6360fdde8ad6fcebdbd78ec11ddd
SHA2566a18d1399647df7b8e91fa653c4701766f9e1a453c45ae829e4b1e6904e8b24a
SHA51282eccc964f68d44162e03186471387056670ed11af57c929bef1064f5890b6a8f3234fffdacc820d330f5a333fbe62356dc9d729004947838084681c2e7b65d3
-
Filesize
152B
MD59551a0057362c3e3af4ad4a95d38f5aa
SHA1d498297c6c35f803271a532d0f37e4fc79ff1407
SHA256dcaa3d6d14ae1068ba5d3075a36ce5c6ef304d056e2d6b83bc33a14df3a5d547
SHA512f22e203748bb4f0ac5fd9a12d781b500eb438ac28383662a64c2aede8c23c0d0ab4f37710580e9aec4bb3b319d174584e5853f20f9500149be23d534eaeb0c8c
-
Filesize
152B
MD593be3a1bf9c257eaf83babf49b0b5e01
SHA1d55c01e95c2e6a87a5ece8cc1d466cc98a520e2a
SHA2568786fd66f4602e6ed3fa5248bd597b3f362ffa458f85207eaa154beb55522348
SHA512885b09dd3072921f375eedb5f0575561adc89700ecfbe999bc3e5ea1d7cb45e19d85c5e420f2c0a12b428742e1110e66f4ceecbe5a6badddd36cc9e0aff48e52
-
Filesize
152B
MD56738f4e2490ee5070d850bf03bf3efa5
SHA1fbc49d2dd145369e8861532e6ebf0bd56a0fe67c
SHA256ca80bbae3c392e46d730a53d0ee4cfecbbe45c264ad3b3c7ee287252c21eaeab
SHA5122939edf5e6c34c9ea669a129a4a5a410fbbd29cd504dc8e007e9b3b3c7fbb9bea8c14d6177ac375d0c481995774a02d210328569231cb01db07b59452333b22b
-
Filesize
44KB
MD5ef18b2b5ff7a989a354629fcfda1deac
SHA1ea273e1884e42cb4edefdc33c721a468ccd5d18c
SHA256a0bb8cdf0b3a44c275c2216954fc0a20fd6028912f8e28ad3540c614513997d0
SHA512c3c882d3fad21d5b64b66a416827695b4226057092ea3f03f9df9d233ee41c1f0bcc7844dba9fc7f1a836ddf22c5a06881099b13467d409b1edd440c9eaafdf9
-
Filesize
264KB
MD569290fb75e8659431ce6418ce6b0a1aa
SHA1cba7ddfd9432a67c0ec21aa391a82de597e74db5
SHA25685ad38e1dd410c56eaf942d86a03ed1be1f3b54261caeb6662884db90036e47b
SHA512f5cd4f57ff2881a0bea7aa1c9e0d4906930a26f5e7ee11356aaa2e39ed3c21366365d0678b99c4bb61c2768279e065323109f2d1448ed679dc464ea3377f637f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5942e1f28ecd4348b81072f0bded6db1a
SHA1db4676c6cdefd52a7af96fa40186fb65840a8e5f
SHA256d7c3dec9704b014ad0caf71b0df11efda50c7ca3e6fa33a46c1856b6adbabc1d
SHA512fec38054f48f6cb5017e4fb806f5e1197e782c266b5b287114cea1e235ef949a58cc3f75e7cae22bda44ee3c4c9f6b31b7222c049a73ad570e6de0569aefc102
-
Filesize
319B
MD5eb71eba2968246440464ba3a05696a97
SHA1336d08344a1556b552d318574e1334558f543303
SHA256dc68d2b6c439c58a7e908d99b8c91e05dcd5806970e48d36f1e568a119edd650
SHA512252d8cdeb9bb4cb4c50cbaf2ebd960bbcdaeadf48fef46ab01f4c796e9496e83277fe98662e988317cd77cfc7a662d659e908b2ee0f49bb34abc48a928dc166e
-
Filesize
124KB
MD51489205ee7a61f384db0925adfda7413
SHA18cec6b9795d7663b16d7ab0483e7710228ed5c3b
SHA25622ec2e116d45716db5da3e9d9290b811833860db998793ac6b91d2880fcb5dfa
SHA5120f2c434cfac305ad78da9bf9b0119590f051b52c1d5df5137d7236b2d0cdf91fd3a350bb8b6ed2935fd141ded9307988d56e8c26b4d602fc034ce1d023a10069
-
Filesize
626B
MD59534ed11129219f548a07414b52e3de6
SHA15c2b8b2e570fcb9948f2d86414ee74bc6bff3881
SHA25686d1266b35ede2cbf53852ddcacf0bcb6c8b52720bc5675b888fb264d2e13fb4
SHA5127854dacb8bc6e861a7ba45ebeac9ec866449818046c113ec4b0c771ad8b652fa09c5d82224a473060fa34a0bffaa650c41b7d95407c7dddac1adf19bad84c117
-
Filesize
334B
MD598f98850efb8d5439f75730e96a6b8fd
SHA16fac635518ce68dfecc159e496234ef97536f91c
SHA256a5a9d64c35bbd76b00ea281ef06b4d2f58f79d7c4e876e045859286d642a6fbd
SHA5123667011274f796d370900c7ff5225ae4c9229c662f10df326873f5a19f64070f4bae97d6fe0414538e22b760a002c8d711a8486aa79757c80dabae0ff1f56b62
-
Filesize
957B
MD575bd3a4182a062161ad175521e200308
SHA17bf870e6ad10259ac28637f20d5c7f80b66a8f25
SHA2562fc1a6396d7b48fa23da5643a58e5e513ae3e62a7f159014a5038cea2190fa5b
SHA512ae42994ddd9020d793cf4ff6c826eca9a6b5c9ede4198a7ddb4ea874e8abf45d9c8d0a507206157d087c5e20825cef4d910a665c01f26921fa31ea155702bbd4
-
Filesize
957B
MD552aab0312b6baee1c20dbea9a0282594
SHA1e31c9e111f5e5e48b1f964e6fd014904a650daf6
SHA256e100ef018a2d7773aaf0fbe3ebcee179423a376c816ecf4eefcfa2d3222c7f5b
SHA51291609ab56acbf1d535b4313cf43a006b4c6d13453ead7ed65354e0638b412d14748ba17da2c02d6d0716136901430a55dc3d4ff30ecc6c38d09f839f1d792db8
-
Filesize
7KB
MD53224adab59180036c309b68c02e7c6da
SHA13dd749f4a7ce2a6f60a2be5958b9d8ff912df3ff
SHA256f04fdfae793504aafe3ee8ede4eb56da5a704d0d3d1131c4360f55d4783618b5
SHA5129cdd2b27548345bcab8ddb6560039c373d1363c9c680d5145ec75273f0525ae5b679f996670e745866c5c82e5eb8b180b778d4ece7adbe8f87b86eff6f371d6d
-
Filesize
6KB
MD5bb6e10800db719fef7be1dd6564db5e5
SHA145541237f4573d3be609b352551201a55546b0ce
SHA256cc88126f7dcbc3b5c4d6659d818d1d22b1fa5acd27dc983845093c70b6ee58c2
SHA51280e6b679f9426593e73b18c0689608b86e368161f4a3f95915a8a469444e1af1cb23faac4cab6d3b881d85db05d526dabbbf517bf6689719a06069386334b319
-
Filesize
6KB
MD5e79262e0da61f782be9ff6b63eb2903f
SHA169886a7551d4ea0dd731b7ae9819faf688178ef6
SHA2563edcaaec1661756bad2df78470d53410527dd7d59fa6fecd7ea7435082b44eb0
SHA512265b20b88569e9c92ab067af3e78a7dcf56a10a80d329f9e2cb777ba2a76b0fdc7924780de9cf698303128d07bafaa49ba44f2b24655fe63d50a885234cbcd25
-
Filesize
5KB
MD50dae0d50be7f4def7dc456aee98ebf57
SHA18faba2499451d43e2001d8fd498ef5e53d8b96da
SHA25687487c626fa7197b841768f1700b5c869b8ce49a29c611a6b3f94599cf531fcd
SHA512476b01f7e9a2e3a2c31f616250fff60768d3df5d3fc365b367c59fc9bc6d598e7fa6b731ebbd131d6878d8afc3cde3a5035e41b097447d4089d5bf58e10480b4
-
Filesize
6KB
MD549c2d04aade6893bd6a0b82bde0ad0ce
SHA1fdf6bb5257f6d77af1787c2d99d78d9d9e0fffa9
SHA256cada4eed8ec9e175b0f824a95b0628fd22cc171f7ee2b9d93634280b53cc87a7
SHA51206099da972f4a540eeda9ced4b425da231cee5fe583468a0dc7c425442ea3316b62c7427760286b51d5cdafc71ab9cf26032bc22c320aee5ec75e0137fadfa09
-
Filesize
6KB
MD5ed76c9062a77d0649ce57b7ab9cf9079
SHA1ab2b3a0576c2d68127e172c0a3fe22d0938091e3
SHA25697a999901edb890796e1891a47f1f38026eca9b4e0917489aa463917f24c0e77
SHA5127bc013ae56f74fd7082006a01a056c3a96973c020d652755b10d55bfd3bdb13c98e9bb3731107c0186815ce00dbef549371fcc9508e2fdd84d5ccd229993a7a6
-
Filesize
6KB
MD57959f61c3bb4f9118066f0a959786c6a
SHA19ccaff9888720f09b888a380c4c6c1698d384514
SHA2566b2e7e13a6c3446ba6f214a4165fb044927b99722a1411a471fd58f8653f1d2b
SHA512e10ece66b5e7a8dda03da62dece97065e09500d695150302373a557e39bc95d010dbc6c65044bf5dcd142e2c45533afea4145242bf2df9702e026652175e2926
-
Filesize
6KB
MD5227b1c1cffc9d8d28d2ab772a6a4acdc
SHA13a70c360d3c0de75608e34a3fd88eaa31de655ce
SHA25630c3003edd39bb967ff052ac01abcdb8da02b201327fe54bc2a32ca60de7f61b
SHA512527c143b626b191c01bd6e4f758873a68c09cf3b78e3d2b694ef2778b4022f5336ddaccfafe85b01b1661b37a863bb64402b686d91c892e4d5d035eaf25122e0
-
Filesize
6KB
MD5612858a816b76c0330093f42b66335aa
SHA1f9798941f3e7fa3b80d5e9e075d106a4883ffeeb
SHA25616f90e6e306a6e704f945c535c3a8d3b2fd82c3b51bfa2e9fd556012081fb468
SHA512de8d90e756393308e6e15cab0516198a88a3c66d2ccf78a0ac9400f63bc6a46f107e66965f8bed2a5dd50948321c133cfa7dc13f81142945aebbcf59c6975845
-
Filesize
33B
MD52b432fef211c69c745aca86de4f8e4ab
SHA14b92da8d4c0188cf2409500adcd2200444a82fcc
SHA25642b55d126d1e640b1ed7a6bdcb9a46c81df461fa7e131f4f8c7108c2c61c14de
SHA512948502de4dc89a7e9d2e1660451fcd0f44fd3816072924a44f145d821d0363233cc92a377dba3a0a9f849e3c17b1893070025c369c8120083a622d025fe1eacf
-
Filesize
175B
MD56153ae3a389cfba4b2fe34025943ec59
SHA1c5762dbae34261a19ec867ffea81551757373785
SHA25693c2b2b9ce1d2a2f28fac5aadc19c713b567df08eaeef4167b6543a1cd094a61
SHA512f2367664799162966368c4a480df6eb4205522eaae32d861217ba8ed7cfabacbfbb0f7c66433ff6d31ec9638da66e727e04c2239d7c6a0d5fd3356230e09ab6c
-
Filesize
322B
MD51445349411706391f241fafa12284331
SHA1fa05aa2dd031a13d547229854e3c6b950f4980ea
SHA2563bd4ad57bdd791963021d83992d162bed4aba94b1062a8646eec4a05f9fdcc06
SHA5123f38f914fd43f362575efa7592d3f7c994dfb7560908dfad32b602d095e4d4af872afe41cbf41f994c9113a29dc9f425d4b612aacf6df8b7811fbf59a76336bd
-
Filesize
2KB
MD5554a9f52512c7c06c0518fe54867a4c2
SHA11bf4e53fa5e1528913713274927b83331857e022
SHA256c806471c24f02ac26143c42a552a9036256680bed3df7a98676ff885924c3961
SHA512bc61dbfc1c6c6549066e92de45d5be10983e79b1f848f80aef45a798474f8ad889a3bb81e9f188ddea2c54bbba629df386e7828f052318a4d086a761306f6f84
-
Filesize
2KB
MD54b777aba94e0d28241e9654d85eac308
SHA1199c323cea2a4c6a5363ff7ccc282ee83dcfdcf9
SHA256b78f24bec023dde9db7705d674b538203eb8c878ad110b03e4c3660928777e10
SHA512b2b5759c8ed350a5f253e606beff82e6b87c250eb123786f82000173b2875a1ca377e769e16a5a2e20a4372cad4b3e072cebc3c9d722eb0e1d4c7f5adf8622b3
-
Filesize
350B
MD587a34f34afcb90286866d2d23b45ca7c
SHA1df7a68852a9d58cf63c48947e817aed8469fda2f
SHA2568363ea728cd05e4c3e0babab814221572b5de7c0ca2177e097451b68262b75cd
SHA5129f7ee4dbad4e421acc8ccee9d6acd99e9b04120d63131ebc66594103edeb991ef98823731489c36a76361b984fd309cf84564b3cec7d636df0b53e2fc27ac6b5
-
Filesize
326B
MD5e211ad00c2f283223e74ac8ff26a6812
SHA1fb695719c90fd305f67324bb811667ef84b46861
SHA25610d2b404df00207df9f714010dc21206e43e38d2a5578bc5eab3830308ed7ce0
SHA51228619dddb6775a72fe2d6784c7a0981ee859ef4890dc09743728eb72d0e7e5bd9fb3dc1fce3537727ee75e94e7f7c388dabcd4a5700ca5f9755213c2a461400b
-
Filesize
128KB
MD51653dc587570fbbcba3bd158cd374df9
SHA11ee94e06ea2a5bf15042770a6b30db4b4ecd53ff
SHA25600cc437033691f4b8b30433135e6d51b86c7e639f1e9c7217860ca717150e284
SHA5125b572f26c81fe27c2a594c900170c81bb4d31787abc1709ffcfbbc56803378f6a3d5c35a54c12d7d74e583a2b8be4ec958cedc8eae5b1d8898b71ce6b07ee0d0
-
Filesize
16B
MD5589c49f8a8e18ec6998a7a30b4958ebc
SHA1cd4e0e2a5cb1fd5099ff88daf4f48bdba566332e
SHA25626d067dbb5e448b16f93a1bb22a2541beb7134b1b3e39903346d10b96022b6b8
SHA512e73566a037838d1f7db7e9b728eba07db08e079de471baca7c8f863c7af7beb36221e9ff77e0a898ce86d4ef4c36f83fb3af9c35e342061b7a5442ca3b9024d2
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\fd8013b7-099c-4517-bccc-be1ae07dd502.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
44KB
MD5ff8fd6a7e448c6d5681702d6aec07516
SHA15f3440cb0c60c44db4813adf3af8da9d48d36712
SHA256df28b3f44146c051d8aa8de56cdbbb53cae0b545c662749fa04eeb4a9ef1af16
SHA5129edc602c1aee95616c1fb31e1b6d978988e0d1751f40b7d9e50fa8fa0b8c7b66675e2f3e48b3aa614e83dc7fe4a12f5f30d3de036d9b2dd92a402fd0e08c09cb
-
Filesize
187B
MD593d6ab9e4bea84dc967bb1159e7f7d5b
SHA18677d2dd322ae927e861c49ebb5f64f69a04d744
SHA2561879493e8702a3b8f97f8275a72c3688e5ad606835e45b533b29937238c46888
SHA512e45749edd72afcd9519df9357a2500377901c8c95892410c78f74df3cded408ce3b884a1dadbb1990601de765341d10f7e5d7f871cbd5943220950ce0250563b
-
Filesize
319B
MD5f586da0339308b9aeaf681d393c61bac
SHA15c973b3ded1b21a9c6d75ed665073e8e1eeabf13
SHA2560ff199e5b8954c20ef9910e65215d161e3d66990ce4fd982021fdcf35c0ffc46
SHA512b38316f611b51575d04442749e1343267b7bcbaf3eb2a606cbd95e72750f602d09697e10353006a1345a7f456e0d8d47892abae7799fff2f25e3dd6547ea1394
-
Filesize
565B
MD5b77ec71c14c0075ddba1abb0f067183f
SHA1289344e88364b158f1db9d6ccfca373667e159cb
SHA2561d2551fdd90a2011ecf6824c9fe660b792df1a61977c2f1cc4cf3014777faeeb
SHA512d134c326d12b937189cff76c74fb71163b5d4e25fb7b4890778724846c5283748bcfc97bda8919b5399f35e2c74b1b1f013dbd3919c22a191a82db56b6875ef2
-
Filesize
337B
MD5c4795ccaad0c70b13853fc6c0e1bf2ba
SHA1675517206a5f86dde009109fdc69279022e12310
SHA256897f9e8ce12f02f54edefc9a1a89a322a81bd25288b89cf6b8195a3c5e0ea515
SHA512f8600c5e700106c6aa8a1722bfbc2d25be6ff730b70ff390407c23004eef9ee45923282547a375849a2ffc61c2c8cbefb7e23dc407b3c9ee0e7f1aaf4bb8bcd1
-
Filesize
44KB
MD56bc224b36a53930cb7f9c1629bb43bb5
SHA1aeb6dce0b8fae53875ed5dfa408bfc897aea4fdc
SHA256c9de4ddcb8e1b7377d63fbffb271e728788dc46eadb2cecfdff04edbbf309090
SHA5129c3083a04aa3176828c81b9db8fa10911cce8edaa7f3a9ba6edad701f0ba4b14d3d13a615e99d117ba403525df9beb57f2868e35784d52bb99b02f92c4d6872d
-
Filesize
264KB
MD573b86c735ad1a0f82897de221084313d
SHA1ca55bffb0d251a90d6e193ee4907baec41bb0bb8
SHA25666f7acbb9e1ced864135b798e4c9574d39dc0443ea469ab9cb92a479777a1a17
SHA512b70f276e12455d96ef4117b9c4e46c606108a1e08256097b6f9b790c7ddeb62c4c54133dc0d0219e563edfb40b078bf31173646586106eadea64e655fb73e5e4
-
Filesize
4.0MB
MD5fc97cd6338029e62ba2b912c0fdb0dd1
SHA1a2497f6391059f9e571b36b260926cc792f2e8f9
SHA2561846d47d1ecd59e7e002d24f95d95dcd0ea312f8f5f277867139eb9a8b1cd182
SHA5124bf4a3684b6c6be80e115ae38c7c1dd6a337e3fd76305f83458cf551422ee55cda942c1706c29cd55cb6d659e7f4fb54afef002df8d9c2f8400bf991846f793c
-
Filesize
22KB
MD51ac9e744574f723e217fb139ef1e86a9
SHA14194dce485bd10f2a030d2499da5c796dd12630f
SHA2564564be03e04002c5f6eaeaea0aff16c5d0bbdad45359aef64f4c199cda8b195e
SHA512b8515fb4b9470a7ce678331bbd59f44da47b627f87ea5a30d92ec1c6d583f1607539cd9318a5bccf0a0c6c2bd2637992e0519bd37acdf876f7a11ed184fb5109
-
Filesize
11B
MD5838a7b32aefb618130392bc7d006aa2e
SHA15159e0f18c9e68f0e75e2239875aa994847b8290
SHA256ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa
SHA5129e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9
-
Filesize
11KB
MD5a32351d455462c963289fdb1521248c4
SHA195919ec70b6c8cc59f172825a7cad3c3fc3a8144
SHA25611e907ee0a91efb4241f4b150971cfdaa22471ebf8d0d3a96a10fbffa6f84103
SHA51279082110a5b8138ffe5c06306d5f8372ad74e25e18a6033dfae92ebd1b552c074a1ee5dddc519f8b9d3a1e5167cd4b2be27acf2e3d175c78d03e2c4d74d31510
-
Filesize
11KB
MD52f6af0565efe54bf8752946b7c9042f1
SHA1401221e05c22f684b27cb119945552c4b56c0008
SHA256f65b3fcc81283c80399497a8ecad37f60413048c1964c5e9352d27d647b453f3
SHA5123a95da12307f256fd0631f28d178146fa8aee952f56f831e5e476050313c599f4add5806b01a020be55f3611c88d7ab752b12186e80504a8cc804234f0f0ff6b
-
Filesize
11KB
MD5419dd2759d614583959d26a432d59d93
SHA1b3594daf00639e0923a7ee4dfb82d5d91700a8b6
SHA256c451e99192770a644150a584caef73968c5d637c4b0e54f6cbaadbd09c8547c9
SHA5126a2d38bc283fe8c583208114d91fc75111638d509c0dadb5c5a811abab4de3070490614d378c7e367491bd19cccb26acd329fd2b71593f00e8e7e97413d938e8
-
Filesize
11KB
MD5d1fa762dfcc412955370ce45ee317397
SHA16fbcdd7164b29d71a3d94915024b9040f28db5d9
SHA256a6940b9b6396c189cd1383f7bcb6ab3dbdbea8133d1537ee4c2a793df25553e1
SHA512160c6d3ae693ef7b48544a9960433df43a0b957111872f0c95bc3e28637d6a27618dea71199292b5f87f17ac542852d5abc6e1bdee42ac1418190471d245e889
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4B
MD56eafe06f2c6f78b1a5c304f182948ba7
SHA15efd5618278c73a658dc82885812329df42557d9
SHA256a9200491fb62fd1b83ec0f3ac4952795202a749fd1508b1151b4a1a93e0ca6ea
SHA512a7b0cce7b10d2514bab6d9572989a9892afe1e703d01d0b5816f26996ddbe76330dfd28b9e25efe940391c3e550d5a279666ed41d45c7c5f3bbbf826b6fea678
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\9cd93bc6dcf544bae69531052e64647ec02f2bb4.tbres
Filesize4KB
MD5911608bc9550dd95d97e07f37b2c5116
SHA122b726cbaebbd6099829aec33dcb5220f00f0034
SHA256ff1bb004dde96f5a2a81d5c1fced4881fff61ed6f12a46a32d06b784a254ad29
SHA5123a9722c5a00fd88b41cbfc8590ed0fc7154e18f0009fde75e2a7cb28ae5d338cb9a1b41d9825745d5a237b551f613f086975ad6b9101de0e497763fbb6a4d301
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD59c740b7699e2363ac4ecdf496520ca35
SHA1aa8691a8c56500d82c5fc8c35209bc6fe50ab1d9
SHA256be96c91b62ba9ba7072ab89e66543328c9e4395150f9dbe8067332d94a3ecc61
SHA5128885683f96353582eb871209e766e7eba1a72a2837ce27ea298b7b5b169621d1fa3fce25346b6bfd258b52642644234da9559d4e765a2023a5a5fc1f544cc7af
-
Filesize
944B
MD5da5c82b0e070047f7377042d08093ff4
SHA189d05987cd60828cca516c5c40c18935c35e8bd3
SHA25677a94ef8c4258445d538a6006ffadb05afdf888f6f044e1e5466b981a07f16c5
SHA5127360311a3c97b73dd3f6d7179cd979e0e20d69f380d38292447e17e369087d9dd5acb66cd0cbdd95ac4bfb16e5a1b86825f835a8d45b14ea9812102cff59704b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\SP_C7C8BD04CA194602968D5DA6D4380B04.dat
Filesize940B
MD56b22cd533fef0bf582ddb6b80c92f2c8
SHA1cee65a99e44b41cbe298f4b0d848beffff6eb9d7
SHA25616c418b12a6b2476ee6057aa1398336c16ad9d271486804a38208bf6ec8d7a9f
SHA5129f315b3768ec17436c19a5be089279bb27af657872798bff6a38c15c27463d5c80f4d223a20ad625588d2145c6781e66c6ed0caef107e33cb1ddfc6fd77f6363
-
Filesize
82KB
MD5b201ce5dcb58284da7a5ef6294418e56
SHA127573051f80debfd74e1a72d27cfd29f58c76d7e
SHA256188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed
SHA512f282f9efa40ce5e753faf803079af9aae478711e6e2f3dcf09c744ae3e670c6ef0cb18b62c8e57ba825faef8c396dd481768ef0680681d4b1b80ad1c3433f11c
-
Filesize
640B
MD5c1df01dc68ab812219fa152df1b18009
SHA19f184b5d5132dfd8b3d708b78adaef5b82a8927f
SHA256205e8ab7bcd5e858fc35315874b34d049735803febb82cc7af56f135a022cd32
SHA512fcddf28b59f8f53880831333cf36bea3fa62193204f5bd8daeef02009405e10b8cbf997eab02239a41055cd1871f1e5cf34d6f53f8899a6de5cec4324901e008
-
Filesize
16B
MD5d3e26b458464d67563ff9bcc0c3895c2
SHA10cb590a6736f9c6e3e4c1e730cdc0430e5748f99
SHA256316855ae6908911b7fba54f121db6f2a72c312fab0f74cfbd2af2334d26b58fb
SHA51287a26f226e4e53635d5010bbc685de1b69e2a4d2c28b6ed86886e62a7613deb4eea70df46b71003035fe64a79a9f08d391376c33ad36a52939fc935f60476420