Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
01-06-2021 11:33
Static task
static1
Behavioral task
behavioral1
Sample
city_racing_FVu1w-1.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
city_racing_FVu1w-1.exe
Resource
win10v20210410
General
-
Target
city_racing_FVu1w-1.exe
-
Size
2.3MB
-
MD5
6663fceaf614b17884edeec24fcdfe10
-
SHA1
e85b3d03ca1ce9baf06d46a247bd4a9c533fe30d
-
SHA256
67e6ab1068490470d5151016f01d0efa968e8a013e359a2206fc4cc9f5f95473
-
SHA512
6c612221b1290416b1ecab6a48d2d58772c9b549d57c21bb36d44df9f752d19923fa3807624256c7719debc13ccd4fa8acc516ac8a6e44e47e0278b0e9bff463
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs
-
Creates new service(s) 1 TTPs
-
Executes dropped EXE 15 IoCs
Processes:
city_racing_FVu1w-1.tmpsaBSI.exeFL_09052021.exeinstaller.exeinstaller.exetmp82F1.tmpServiceHost.exeUIHost.exeupdater.exeFigleaf.exeFigleaf.exeFigleafBackgroundService.exeFigleaf.exeFigleaf.exeFigleaf.exepid process 3064 city_racing_FVu1w-1.tmp 3952 saBSI.exe 3180 FL_09052021.exe 3660 installer.exe 1796 installer.exe 2248 tmp82F1.tmp 4720 ServiceHost.exe 1588 UIHost.exe 2072 updater.exe 5236 Figleaf.exe 5348 Figleaf.exe 5520 FigleafBackgroundService.exe 5540 Figleaf.exe 5628 Figleaf.exe 5688 Figleaf.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Figleaf.exeUIHost.execity_racing_FVu1w-1.tmpFigleaf.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation Figleaf.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation UIHost.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation city_racing_FVu1w-1.tmp Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation Figleaf.exe -
Loads dropped DLL 64 IoCs
Processes:
city_racing_FVu1w-1.tmpregsvr32.exeregsvr32.exetmp82F1.tmpregsvr32.exeregsvr32.exeServiceHost.exeUIHost.exeregsvr32.exeregsvr32.exeFigleaf.exeFigleaf.exeFigleafBackgroundService.exeFigleaf.exepid process 3064 city_racing_FVu1w-1.tmp 3064 city_racing_FVu1w-1.tmp 3064 city_racing_FVu1w-1.tmp 1808 regsvr32.exe 1396 regsvr32.exe 2248 tmp82F1.tmp 2248 tmp82F1.tmp 4616 regsvr32.exe 2248 tmp82F1.tmp 4764 regsvr32.exe 4720 ServiceHost.exe 2248 tmp82F1.tmp 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 1588 UIHost.exe 1588 UIHost.exe 4720 ServiceHost.exe 2068 regsvr32.exe 2280 regsvr32.exe 2248 tmp82F1.tmp 2248 tmp82F1.tmp 2248 tmp82F1.tmp 2248 tmp82F1.tmp 5236 Figleaf.exe 5348 Figleaf.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5540 Figleaf.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe 5520 FigleafBackgroundService.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Figleaf.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run Figleaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\electron.app.FigLeaf = "C:\\Users\\Admin\\AppData\\Local\\Programs\\Figleaf\\Figleaf.exe --startup" Figleaf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs
BHOs are DLL modules which act as plugins for Internet Explorer.
-
Drops file in Program Files directory 64 IoCs
Processes:
installer.exeinstaller.exedescription ioc process File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\wa-options.css installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-one-search-ui-cs-CZ.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\dailyping.luc installer.exe File created C:\Program Files\McAfee\Temp4175247991\jslang\wa-res-shared-it-IT.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-ss-toast-variants-ja-JP.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-duckduckgo-tr-TR.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-nl-NL.js installer.exe File opened for modification C:\Program Files\McAfee\Temp4175247991\jslang\eula-el-GR.txt installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-ef-toast-sv-SE.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-shared-zh-CN.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-bing-sr-Latn-CS.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-uninstall-it-IT.js installer.exe File opened for modification C:\Program Files\McAfee\Temp4175247991\jslang\wa-res-shared-tr-TR.js installer.exe File opened for modification C:\Program Files\McAfee\Temp4175247991\wa_install_close.png installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\wa-search-experience-toast.css installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-options-es-ES.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-options-sk-SK.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-sr-Latn-CS.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-upsell-toast-sr-Latn-CS.js installer.exe File opened for modification C:\Program Files\McAfee\Temp4175247991\jslang\eula-hr-HR.txt installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\wacsecuresearchl10n.luc installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-ext-install-toast-fr-CA.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\efficacy\html\wa-ef-welcome-static-toast.html installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-overlay-ja-JP.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-adblock-da-DK.js installer.exe File opened for modification C:\Program Files\McAfee\Temp4175247991\jslang\wa-res-shared-pt-PT.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\core\logger.luc installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-one-search-ui-ko-KR.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-webboost-de-DE.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-overlay-fi-FI.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\serializers\newtabextensionoffer.js installer.exe File opened for modification C:\Program Files\McAfee\Temp4175247991\jslang\wa-res-install-en-US.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-checklist-cs-CZ.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-checklist-zh-TW.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\onesearch_overlay_mc_logo.png installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-one-search-ui-fr-FR.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\sequencenumber.luc installer.exe File created C:\Program Files\McAfee\Temp4175247991\browserhost.cab installer.exe File created C:\Program Files\McAfee\Temp4175247991\wa-install.html installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\blast_to_search_base_handler.luc installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\settings-icon.png installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-nb-NO.js installer.exe File created C:\Program Files\McAfee\Temp4175247991\jslang\eula-nb-NO.txt installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\core\uithreadexithandler.luc installer.exe File opened for modification C:\Program Files\McAfee\Temp4175247991\jslang\wa-res-install-sk-SK.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-blast-search-toast-pt-PT.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\wa-dialog-balloon.html installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-duckduckgo-hu-HU.js installer.exe File created C:\Program Files\McAfee\Temp4175247991\balloon_safe_annotation.png installer.exe File created C:\Program Files\McAfee\Temp4175247991\wssdep.cab installer.exe File created C:\Program Files\McAfee\Temp4175247991\jslang\wa-res-install-tr-TR.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-ef-toast-ko-KR.js installer.exe File created C:\Program Files\McAfee\Temp4175247991\jslang\wa-res-shared-fi-FI.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\new-tab-overlay.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-adblock-hu-HU.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-upsell-toast-fr-CA.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-duckduckgo-de-DE.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\samrecoverable.luc installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\core\priorityqueue.luc installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-one-search-ui-fi-FI.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-duckduckgo-fi-FI.js installer.exe File opened for modification C:\Program Files\McAfee\Temp4175247991\wa-ui-install.js installer.exe File created C:\Program Files\McAfee\Temp4175247991\jslang\wa-res-install-sr-Latn-CS.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\builtin\wa-utils.js installer.exe -
Drops file in Windows directory 1 IoCs
Processes:
MicrosoftEdge.exedescription ioc process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4136 taskkill.exe -
Processes:
regsvr32.exeregsvr32.exeMicrosoftEdgeCP.exebrowser_broker.exeMicrosoftEdge.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\CLSID = "{32CFFBE7-8BB7-4BC3-83D8-8197671920D6}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\CLSID = "{32CFFBE7-8BB7-4BC3-83D8-8197671920D6}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0412 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0411\ButtonText = "マカフィー ウェブアドバイザー" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0412\ButtonText = "McAfee 웹어드바이저" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\@ = "WebAdvisor Menu" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\MenuStatusBar = "MStatus bar View SiteReport" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0412\MenuText = "McAfee 웹어드바이저" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0804 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\@ = "WebAdvisor Menu" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\HotIcon = "C:\\Program Files\\McAfee\\WebAdvisor\\WebAdvisor.ico" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0412\MenuText = "McAfee 웹어드바이저" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0412 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\MenuText = "McAfee WebAdvisor" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Icon = "C:\\Program Files\\McAfee\\WebAdvisor\\WebAdvisor.ico" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0411 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0411\MenuText = "マカフィー ウェブアドバイザー" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0804 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0804\ButtonText = "迈克菲联网顾问" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0411 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0411\ButtonText = "マカフィー ウェブアドバイザー" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0804\MenuText = "迈克菲联网顾问" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\ButtonText = "McAfee WebAdvisor" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\MenuStatusBar = "MStatus bar View SiteReport" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Default Visible = "Yes" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0412\ButtonText = "McAfee 웹어드바이저" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Default Visible = "Yes" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0804\MenuText = "迈克菲联网顾问" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\CLSIDExtension = "{29B24532-6CE1-41BA-8BF0-F580EA174AF1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\CLSIDExtension = "{29B24532-6CE1-41BA-8BF0-F580EA174AF1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Icon = "C:\\Program Files\\McAfee\\WebAdvisor\\WebAdvisor.ico" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\HotIcon = "C:\\Program Files\\McAfee\\WebAdvisor\\WebAdvisor.ico" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0411\MenuText = "マカフィー ウェブアドバイザー" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\ButtonText = "McAfee WebAdvisor" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\MenuText = "McAfee WebAdvisor" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0804\ButtonText = "迈克菲联网顾问" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C} regsvr32.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
ServiceHost.exeupdater.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs ServiceHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs ServiceHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs updater.exe -
Modifies registry class 64 IoCs
Processes:
regsvr32.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeregsvr32.exeFigleaf.exeMicrosoftEdgeCP.exeregsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.gametop.com\ = "119" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Extensible Cache MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B164E929-A1B6-4A06-B104-2CD0E90A88FF}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\figleaf\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Programs\\Figleaf\\Figleaf.exe\" \"%1\"" Figleaf.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$WordPress MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\Speech_OneCore\Isolated\PIjyYIeAhMCaaVRP = "SW" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\Speech_OneCore\Isolated\PIjyYIeAhMCaaVRP = "16000" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\Speech_OneCore\Isolated\PIjyYIeAhMCaaVRP = "6;18;22" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\Version\ = "1.0" regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\FirstRecoveryTime = 301bd569d72dd701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\gametop.com\Total = "41" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\Version\ = "1.0" regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\NextBrowserDataLogTime = 30f1a00a0d57d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\gametop.com\Total = "67" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\Speech_OneCore\Isolated\PIjyYIeAhMCaaVRP = "{BAE3E62C-37D4-49AC-A6F1-0E485ECD6757}" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\Speech_OneCore\Isolated\PIjyYIeAhMCaaVRP = "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Speech_OneCore\\Voices\\Tokens\\MSTTS_V110_enUS_DavidM" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{29B24532-6CE1-41BA-8BF0-F580EA174AF1} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\www.gametop.com MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\www.google.com MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\Speech_OneCore\Isolated\PIjyYIeAhMCaaVRP = "%windir%\\Speech_OneCore\\Engines\\SR\\en-US-N\\tn1033.bin" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\Speech_OneCore\Isolated\PIjyYIeAhMCaaVRP = "Microsoft David Mobile - English (United States)" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\gametop.com MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\figleaf\ = "URL:figleaf" Figleaf.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\InprocServer32\ = "C:\\Program Files\\McAfee\\WebAdvisor\\x64\\DownloadScan.dll" regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\Speech_OneCore\Isolated\PIjyYIeAhMCaaVRP MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\gametop.com\ = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\FileVersion = "2016061511" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\SharedCookie_MRACMigrationDone = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\Speech_OneCore\Isolated\PIjyYIeAhMCaaVRP = "SR en-US Lookup Lexicon" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionIn MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\Speech_OneCore\Isolated\PIjyYIeAhMCaaVRP = "407" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\DatabaseComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\NextUpdateDate = "329329077" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "268435456" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\JumpListInPrivateBrowsingAllowed = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\gametop.com\Total = "0" MicrosoftEdgeCP.exe -
Processes:
saBSI.exeServiceHost.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 0f00000001000000200000005229ba15b31b0c6f4cca89c2985177974327d1b689a3b935a0bd975532af22ab090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b06010505070308530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520033000000620000000100000020000000cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b1400000001000000140000008ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc1d000000010000001000000001728e1ecf7a9d86fb3cec8948aba953030000000100000014000000d69b561148f01c77c54578c10926df5b856976ad2000000001000000630300003082035f30820247a003020102020b04000000000121585308a2300d06092a864886f70d01010b0500304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e301e170d3039303331383130303030305a170d3239303331383130303030305a304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e30820122300d06092a864886f70d01010105000382010f003082010a0282010100cc2576907906782216f5c083b684ca289efd057611c5ad8872fc460243c7b28a9d045f24cb2e4be1608246e152ab0c8147706cdd64d1ebf52ca30f823d0c2bae97d7b614861079bb3b1380778c08e149d26a622f1f5efa9668df892795389f06d73ec9cb26590d73deb0c8e9260e8315c6ef5b8bd20460ca49a628f6693bf6cbc82891e59d8a615737ac7414dc74e03aee722f2e9cfbd0bbbff53d00e10633e8822bae53a63a16738cdd410e203ac0b4a7a1e9b24f902e3260e957cbb904926868e538266075b29f77ff9114efae2049fcad401548d1023161195eb897efad77b7649a7abf5fc113ef9b62fb0d6ce0546916a903da6ee983937176c6698582170203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e041604148ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc300d06092a864886f70d01010b050003820101004b40dbc050aafec80ceff796544549bb96000941acb3138686280733ca6be674b9ba002daea40ad3f5f1f10f8abf73674a83c7447b78e0af6e6c6f03298e333945c38ee4b9576caafc1296ec53c62de4246cb99463fbdc536867563e83b8cf3521c3c968fecedac253aacc908ae9f05d468c95dd7a58281a2f1ddecd0037418fed446dd75328977ef367041e15d78a96b4d3de4c27a44c1b737376f41799c21f7a0ee32d08ad0a1c2cff3cab550e0f917e36ebc35749bee12e2d7c608bc3415113239dcef7326b9401a899e72c331f3a3b25d28640ce3b2c8678c9612f14baeedb556fdf84ee05094dbd28d872ced36250651eeb92978331d9b3b5ca47583f5f saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 0400000001000000100000001bfe69d191b71933a372a80fe155e5b50300000001000000140000002b8f1b57330dbba2d07a6c51f70ee90ddab9ad8e0b00000001000000100000005300650063007400690067006f0000001d0000000100000010000000885010358d29a38f059b028559c95f901400000001000000140000005379bf5aaa2b4acf5480e1d89bc09df2b20366cb620000000100000020000000e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd253000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b060105050703080f000000010000003000000066b764a96581128168cf208e374dda479d54e311f32457f4aee0dbd2a6c8d171d531289e1cd22bfdbbd4cfd979625483190000000100000010000000ea6089055218053dd01e37e1d806eedf2000000001000000e2050000308205de308203c6a003020102021001fd6d30fca3ca51a81bbc640e35032d300d06092a864886f70d01010c0500308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f72697479301e170d3130303230313030303030305a170d3338303131383233353935395a308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f7269747930820222300d06092a864886f70d01010105000382020f003082020a028202010080126517360ec3db08b3d0ac570d76edcd27d34cad508361e2aa204d092d6409dcce899fcc3da9ecf6cfc1dcf1d3b1d67b3728112b47da39c6bc3a19b45fa6bd7d9da36342b676f2a93b2b91f8e26fd0ec162090093ee2e874c918b491d46264db7fa306f188186a90223cbcfe13f087147bf6e41f8ed4e451c61167460851cb8614543fbc33fe7e6c9cff169d18bd518e35a6a766c87267db2166b1d49b7803c0503ae8ccf0dcbc9e4cfeaf0596351f575ab7ffcef93db72cb6f654ddc8e7123a4dae4c8ab75c9ab4b7203dca7f2234ae7e3b68660144e7014e46539b3360f794be5337907343f332c353efdbaafe744e69c76b8c6093dec4c70cdfe132aecc933b517895678bee3d56fe0cd0690f1b0ff325266b336df76e47fa7343e57e0ea566b1297c3284635589c40dc19354301913acd37d37a7eb5d3a6c355cdb41d712daa9490bdfd8808a0993628eb566cf2588cd84b8b13fa4390fd9029eeb124c957cf36b05a95e1683ccb867e2e8139dcc5b82d34cb3ed5bffdee573ac233b2d00bf3555740949d849581a7f9236e651920ef3267d1c4d17bcc9ec4326d0bf415f40a94444f499e757879e501f5754a83efd74632fb1506509e658422e431a4cb4f0254759fa041e93d426464a5081b2debe78b7fc6715e1c957841e0f63d6e962bad65f552eea5cc62808042539b80e2ba9f24c971c073f0d52f5edef2f820f0203010001a3423040301d0603551d0e041604145379bf5aaa2b4acf5480e1d89bc09df2b20366cb300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff300d06092a864886f70d01010c050003820201005cd47c0dcff7017d4199650c73c5529fcbf8cf99067f1bda43159f9e0255579614f1523c27879428ed1f3a0137a276fc5350c0849bc66b4eba8c214fa28e556291f36915d8bc88e3c4aa0bfdefa8e94b552a06206d55782919ee5f305c4b241155ff249a6e5e2a2bee0b4d9f7ff70138941495430709fb60a9ee1cab128ca09a5ea7986a596d8b3f08fbc8d145af18156490120f73282ec5e2244efc58ecf0f445fe22b3eb2f8ed2d9456105c1976fa876728f8b8c36afbf0d05ce718de6a66f1f6ca67162c5d8d083720cf16711890c9c134c7234dfbcd571dfaa71dde1b96c8c3c125d65dabd5712b6436bffe5de4d661151cf99aeec17b6e871918cde49fedd3571a21527941ccf61e326bb6fa36725215de6dd1d0b2e681b3b82afec836785d4985174b1b9998089ff7f78195c794a602e9240ae4c372a2cc9c762c80e5df7365bcae0252501b4dd1a079c77003fd0dcd5ec3dd4fabb3fcc85d66f7fa92ddfb902f7f5979ab535dac367b0874aa9289e238eff5c276be1b04ff307ee002ed45987cb524195eaf447d7ee6441557c8d590295dd629dc2b9ee5a287484a59bb790c70c07dff589367432d628c1b0b00be09c4cc31cd6fce369b54746812fa282abd3634470c48dff2d33baad8f7bb57088ae3e19cf4028d8fcc890bb5d9922f552e658c51f883143ee881dd7c68e3c436a1da718de7d3d16f162f9ca90a8fd saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 040000000100000010000000c5dfb849ca051355ee2dba1ac33eb0280f00000001000000200000005229ba15b31b0c6f4cca89c2985177974327d1b689a3b935a0bd975532af22ab090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b06010505070308530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520033000000620000000100000020000000cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b1400000001000000140000008ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc1d000000010000001000000001728e1ecf7a9d86fb3cec8948aba953030000000100000014000000d69b561148f01c77c54578c10926df5b856976ad190000000100000010000000d0fd3c9c380d7b65e26b9a3fedd39b8f2000000001000000630300003082035f30820247a003020102020b04000000000121585308a2300d06092a864886f70d01010b0500304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e301e170d3039303331383130303030305a170d3239303331383130303030305a304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e30820122300d06092a864886f70d01010105000382010f003082010a0282010100cc2576907906782216f5c083b684ca289efd057611c5ad8872fc460243c7b28a9d045f24cb2e4be1608246e152ab0c8147706cdd64d1ebf52ca30f823d0c2bae97d7b614861079bb3b1380778c08e149d26a622f1f5efa9668df892795389f06d73ec9cb26590d73deb0c8e9260e8315c6ef5b8bd20460ca49a628f6693bf6cbc82891e59d8a615737ac7414dc74e03aee722f2e9cfbd0bbbff53d00e10633e8822bae53a63a16738cdd410e203ac0b4a7a1e9b24f902e3260e957cbb904926868e538266075b29f77ff9114efae2049fcad401548d1023161195eb897efad77b7649a7abf5fc113ef9b62fb0d6ce0546916a903da6ee983937176c6698582170203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e041604148ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc300d06092a864886f70d01010b050003820101004b40dbc050aafec80ceff796544549bb96000941acb3138686280733ca6be674b9ba002daea40ad3f5f1f10f8abf73674a83c7447b78e0af6e6c6f03298e333945c38ee4b9576caafc1296ec53c62de4246cb99463fbdc536867563e83b8cf3521c3c968fecedac253aacc908ae9f05d468c95dd7a58281a2f1ddecd0037418fed446dd75328977ef367041e15d78a96b4d3de4c27a44c1b737376f41799c21f7a0ee32d08ad0a1c2cff3cab550e0f917e36ebc35749bee12e2d7c608bc3415113239dcef7326b9401a899e72c331f3a3b25d28640ce3b2c8678c9612f14baeedb556fdf84ee05094dbd28d872ced36250651eeb92978331d9b3b5ca47583f5f saBSI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C ServiceHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 ServiceHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 ServiceHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 ServiceHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 saBSI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 ServiceHost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
saBSI.exetmp82F1.tmpServiceHost.exeUIHost.exepid process 3952 saBSI.exe 3952 saBSI.exe 3952 saBSI.exe 3952 saBSI.exe 3952 saBSI.exe 3952 saBSI.exe 3952 saBSI.exe 3952 saBSI.exe 3952 saBSI.exe 3952 saBSI.exe 2248 tmp82F1.tmp 2248 tmp82F1.tmp 2248 tmp82F1.tmp 2248 tmp82F1.tmp 2248 tmp82F1.tmp 2248 tmp82F1.tmp 2248 tmp82F1.tmp 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 1588 UIHost.exe 1588 UIHost.exe 1588 UIHost.exe 1588 UIHost.exe 1588 UIHost.exe 1588 UIHost.exe 1588 UIHost.exe 1588 UIHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe 4720 ServiceHost.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
MicrosoftEdgeCP.exepid process 4396 MicrosoftEdgeCP.exe 4396 MicrosoftEdgeCP.exe 4396 MicrosoftEdgeCP.exe 4396 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
FL_09052021.exetaskkill.exetmp82F1.tmpMicrosoftEdge.exeMicrosoftEdgeCP.exeFigleafBackgroundService.exeMicrosoftEdgeCP.exedescription pid process Token: SeDebugPrivilege 3180 FL_09052021.exe Token: SeDebugPrivilege 4136 taskkill.exe Token: SeSecurityPrivilege 2248 tmp82F1.tmp Token: SeDebugPrivilege 4548 MicrosoftEdge.exe Token: SeDebugPrivilege 4548 MicrosoftEdge.exe Token: SeDebugPrivilege 4548 MicrosoftEdge.exe Token: SeDebugPrivilege 4548 MicrosoftEdge.exe Token: SeDebugPrivilege 2424 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2424 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2424 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2424 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 5520 FigleafBackgroundService.exe Token: SeDebugPrivilege 5964 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 5964 MicrosoftEdgeCP.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
city_racing_FVu1w-1.tmpFigleaf.exepid process 3064 city_racing_FVu1w-1.tmp 5236 Figleaf.exe 5236 Figleaf.exe 5236 Figleaf.exe 5236 Figleaf.exe -
Suspicious use of SendNotifyMessage 5 IoCs
Processes:
Figleaf.exepid process 5236 Figleaf.exe 5236 Figleaf.exe 5236 Figleaf.exe 5236 Figleaf.exe 5236 Figleaf.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
city_racing_FVu1w-1.tmpMicrosoftEdge.exeMicrosoftEdgeCP.exepid process 3064 city_racing_FVu1w-1.tmp 4548 MicrosoftEdge.exe 4396 MicrosoftEdgeCP.exe 4396 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
city_racing_FVu1w-1.execity_racing_FVu1w-1.tmpsaBSI.exeinstaller.exeinstaller.exeFL_09052021.exeregsvr32.exetmp82F1.tmpregsvr32.exeServiceHost.exeregsvr32.exeMicrosoftEdgeCP.exeupdater.exedescription pid process target process PID 3944 wrote to memory of 3064 3944 city_racing_FVu1w-1.exe city_racing_FVu1w-1.tmp PID 3944 wrote to memory of 3064 3944 city_racing_FVu1w-1.exe city_racing_FVu1w-1.tmp PID 3944 wrote to memory of 3064 3944 city_racing_FVu1w-1.exe city_racing_FVu1w-1.tmp PID 3064 wrote to memory of 3952 3064 city_racing_FVu1w-1.tmp saBSI.exe PID 3064 wrote to memory of 3952 3064 city_racing_FVu1w-1.tmp saBSI.exe PID 3064 wrote to memory of 3952 3064 city_racing_FVu1w-1.tmp saBSI.exe PID 3064 wrote to memory of 3180 3064 city_racing_FVu1w-1.tmp FL_09052021.exe PID 3064 wrote to memory of 3180 3064 city_racing_FVu1w-1.tmp FL_09052021.exe PID 3064 wrote to memory of 3180 3064 city_racing_FVu1w-1.tmp FL_09052021.exe PID 3952 wrote to memory of 3660 3952 saBSI.exe installer.exe PID 3952 wrote to memory of 3660 3952 saBSI.exe installer.exe PID 3660 wrote to memory of 1796 3660 installer.exe installer.exe PID 3660 wrote to memory of 1796 3660 installer.exe installer.exe PID 1796 wrote to memory of 2780 1796 installer.exe sc.exe PID 1796 wrote to memory of 2780 1796 installer.exe sc.exe PID 1796 wrote to memory of 2236 1796 installer.exe regsvr32.exe PID 1796 wrote to memory of 2236 1796 installer.exe regsvr32.exe PID 3180 wrote to memory of 2248 3180 FL_09052021.exe tmp82F1.tmp PID 3180 wrote to memory of 2248 3180 FL_09052021.exe tmp82F1.tmp PID 3180 wrote to memory of 2248 3180 FL_09052021.exe tmp82F1.tmp PID 2236 wrote to memory of 1808 2236 regsvr32.exe regsvr32.exe PID 2236 wrote to memory of 1808 2236 regsvr32.exe regsvr32.exe PID 2236 wrote to memory of 1808 2236 regsvr32.exe regsvr32.exe PID 1796 wrote to memory of 3496 1796 installer.exe sc.exe PID 1796 wrote to memory of 3496 1796 installer.exe sc.exe PID 1796 wrote to memory of 1396 1796 installer.exe regsvr32.exe PID 1796 wrote to memory of 1396 1796 installer.exe regsvr32.exe PID 2248 wrote to memory of 4136 2248 tmp82F1.tmp taskkill.exe PID 2248 wrote to memory of 4136 2248 tmp82F1.tmp taskkill.exe PID 2248 wrote to memory of 4136 2248 tmp82F1.tmp taskkill.exe PID 1796 wrote to memory of 4172 1796 installer.exe sc.exe PID 1796 wrote to memory of 4172 1796 installer.exe sc.exe PID 1796 wrote to memory of 4536 1796 installer.exe regsvr32.exe PID 1796 wrote to memory of 4536 1796 installer.exe regsvr32.exe PID 1796 wrote to memory of 4572 1796 installer.exe sc.exe PID 1796 wrote to memory of 4572 1796 installer.exe sc.exe PID 4536 wrote to memory of 4616 4536 regsvr32.exe regsvr32.exe PID 4536 wrote to memory of 4616 4536 regsvr32.exe regsvr32.exe PID 4536 wrote to memory of 4616 4536 regsvr32.exe regsvr32.exe PID 1796 wrote to memory of 4764 1796 installer.exe regsvr32.exe PID 1796 wrote to memory of 4764 1796 installer.exe regsvr32.exe PID 4720 wrote to memory of 1588 4720 ServiceHost.exe UIHost.exe PID 4720 wrote to memory of 1588 4720 ServiceHost.exe UIHost.exe PID 4720 wrote to memory of 1680 4720 ServiceHost.exe regsvr32.exe PID 4720 wrote to memory of 1680 4720 ServiceHost.exe regsvr32.exe PID 1680 wrote to memory of 2068 1680 regsvr32.exe regsvr32.exe PID 1680 wrote to memory of 2068 1680 regsvr32.exe regsvr32.exe PID 1680 wrote to memory of 2068 1680 regsvr32.exe regsvr32.exe PID 4720 wrote to memory of 2280 4720 ServiceHost.exe regsvr32.exe PID 4720 wrote to memory of 2280 4720 ServiceHost.exe regsvr32.exe PID 4720 wrote to memory of 2072 4720 ServiceHost.exe updater.exe PID 4720 wrote to memory of 2072 4720 ServiceHost.exe updater.exe PID 4396 wrote to memory of 4484 4396 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4396 wrote to memory of 4484 4396 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4396 wrote to memory of 4484 4396 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2072 wrote to memory of 5128 2072 updater.exe cmd.exe PID 2072 wrote to memory of 5128 2072 updater.exe cmd.exe PID 2072 wrote to memory of 5180 2072 updater.exe cmd.exe PID 2072 wrote to memory of 5180 2072 updater.exe cmd.exe PID 3180 wrote to memory of 5236 3180 FL_09052021.exe Figleaf.exe PID 3180 wrote to memory of 5236 3180 FL_09052021.exe Figleaf.exe PID 4396 wrote to memory of 4484 4396 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4396 wrote to memory of 4484 4396 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4396 wrote to memory of 4484 4396 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\city_racing_FVu1w-1.exe"C:\Users\Admin\AppData\Local\Temp\city_racing_FVu1w-1.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-GT6MR.tmp\city_racing_FVu1w-1.tmp"C:\Users\Admin\AppData\Local\Temp\is-GT6MR.tmp\city_racing_FVu1w-1.tmp" /SL5="$40078,1569491,780800,C:\Users\Admin\AppData\Local\Temp\city_racing_FVu1w-1.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-PGRG6.tmp\prod0_extract\saBSI.exe"C:\Users\Admin\AppData\Local\Temp\is-PGRG6.tmp\prod0_extract\saBSI.exe" /affid 91088 PaidDistribution=true3⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-PGRG6.tmp\prod0_extract\installer.exe"C:\Users\Admin\AppData\Local\Temp\is-PGRG6.tmp\prod0_extract\\installer.exe" /setOem:Affid=91088 /s /thirdparty /upgrade4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files\McAfee\Temp4175247991\installer.exe"C:\Program Files\McAfee\Temp4175247991\installer.exe" /setOem:Affid=91088 /s /thirdparty /upgrade5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dll"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s "C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dll"7⤵
- Loads dropped DLL
-
C:\Windows\SYSTEM32\sc.exesc.exe create "McAfee WebAdvisor" binPath= "\"C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe\"" start= auto DisplayName= "McAfee WebAdvisor"6⤵
-
C:\Windows\SYSTEM32\sc.exesc.exe description "McAfee WebAdvisor" "McAfee WebAdvisor Service"6⤵
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\x64\WSSDep.dll"6⤵
- Loads dropped DLL
-
C:\Windows\SYSTEM32\sc.exesc.exe failure "McAfee WebAdvisor" reset= 3600 actions= restart/1/restart/1000/restart/3000/restart/30000/restart/1800000//06⤵
-
C:\Windows\SYSTEM32\sc.exesc.exe start "McAfee WebAdvisor"6⤵
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\win32\DownloadScan.dll"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\x64\DownloadScan.dll"6⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\is-PGRG6.tmp\prod1_extract\FL_09052021.exe"C:\Users\Admin\AppData\Local\Temp\is-PGRG6.tmp\prod1_extract\FL_09052021.exe" /px=BjYV4fPIi0ZDvHNcrOY3oGYc7vj9OGKjISxHlH93oVVd1NZGG7qwbxmYRxcR7Z66STada7qHYMwhXCq3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmp82F1.tmp"C:\Users\Admin\AppData\Local\Temp\tmp82F1.tmp" /S4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im FigLeaf.exe /im FigleafBackgroundService.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Programs\Figleaf\Figleaf.exe"C:\Users\Admin\AppData\Local\Programs\Figleaf\Figleaf.exe" -s4⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Programs\Figleaf\Figleaf.exeC:\Users\Admin\AppData\Local\Programs\Figleaf\Figleaf.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\figleaf /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\figleaf\Crashpad --url=https://sentry.figleaf.online/api/10/minidump/?sentry_key=d6ac745b7b224e01bd8d79f4bd13a421 --annotation=_productName=figleaf --annotation=_version=5.6.2 --annotation=prod=Electron --annotation=ver=11.1.1 --initial-client-data=0x3fc,0x404,0x408,0x3d8,0x40c,0x7ff6e1bfc4e8,0x7ff6e1bfc4f8,0x7ff6e1bfc5085⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Programs\Figleaf\resources\FigleafBackgroundService.exeC:\Users\Admin\AppData\Local\Programs\Figleaf\resources\FigleafBackgroundService.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Programs\Figleaf\Figleaf.exe"C:\Users\Admin\AppData\Local\Programs\Figleaf\Figleaf.exe" --type=gpu-process --field-trial-handle=1508,13266727001004430233,2204203524563291001,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1532 /prefetch:25⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Programs\Figleaf\Figleaf.exe"C:\Users\Admin\AppData\Local\Programs\Figleaf\Figleaf.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1508,13266727001004430233,2204203524563291001,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1712 /prefetch:85⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Programs\Figleaf\Figleaf.exe"C:\Users\Admin\AppData\Local\Programs\Figleaf\Figleaf.exe" --type=renderer --field-trial-handle=1508,13266727001004430233,2204203524563291001,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Programs\Figleaf\resources\app.asar" --node-integration --no-sandbox --no-zygote --enable-remote-module --background-color=#fff --enable-spellcheck --enable-websql --disable-electron-site-instance-overrides --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2080 /prefetch:15⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\regsvr32.exe/s "C:\Program Files\McAfee\WebAdvisor\win32\DownloadScan.dll"1⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\McAfee\WebAdvisor\UIHost.exe"C:\Program Files\McAfee\WebAdvisor\UIHost.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\McAfee\WebAdvisor\win32\IEPlugin.dll"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s "C:\Program Files\McAfee\WebAdvisor\win32\IEPlugin.dll"3⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\McAfee\WebAdvisor\x64\IEPlugin.dll"2⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
-
C:\Program Files\McAfee\WebAdvisor\updater.exe"C:\Program Files\McAfee\WebAdvisor\updater.exe"2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c IF EXIST "C:\Program Files\McAfee\WebAdvisor\Download" ( DEL "C:\Program Files\McAfee\WebAdvisor\Download\*.bak" )3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c DEL "C:\Program Files\McAfee\WebAdvisor\*.tmp"3⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\McAfee\Temp4175247991\browserhost.cabMD5
da4fb4dfccf87e729269396c02bae1c3
SHA11634fb0cbdba1e441d12ac58fe21be3d5609fae2
SHA256f4c4529aabdb261d8efcd952142f9566320562f66b6d32c3ebf5e76c16b84bc3
SHA5122d589af4db28466f56fc488513aca797be0b7443362dbddad40e184ae32e8e3d6b39751544ae107387e1af4ec651977588c7af79ec4f58418cbd2170c5b38da9
-
C:\Program Files\McAfee\Temp4175247991\browserplugin.cabMD5
a9d104b4440c6d3911847bad260813ed
SHA1f5e0ed4c10b37dc7d7d15333f92bf0db66447feb
SHA25606c060b905eb6ca6c739981af5f1eda4cabe7bbfce3e798c404f5b239e505762
SHA51261ef8c840187b5b0d01270023cc2a06c3c105d9c47e8e84186aeb81b40fd0c79374c9051e3cdc6d934c9b6f9502dcd75edf1814e3be1e4badf93dc871f4f1838
-
C:\Program Files\McAfee\Temp4175247991\downloadscan.cabMD5
d4acf21c5b7701a7506b460de755e738
SHA1e10965a3003fb850fd245214b3676d9011ddda0d
SHA25637d18f39cd6dc5d3fe1d826cbbfe1f05301c68eeb30ab3aa3bcda034cb230556
SHA5122e5076edab748d2e6ea3043f4028c57638cfffc17b34709f1b83abb2493e3e5b88b25608a88f9c3a7184da27bff7e462f4466f32caa3fb8ee554dc6f760e4a35
-
C:\Program Files\McAfee\Temp4175247991\eventmanager.cabMD5
bcbce1db8426733fb064ebcf4e0c185e
SHA12b6a4d7a1aae01ebcb01bb24bca6342691457ba3
SHA256f09970e58e9e3cc6a71fe9cedd321c9acb1df71a7e6afe1f9be26eda83ceb765
SHA512b13f61ba18b17bcf356e0f990a1878bac6c65f273036c2e75d688e96dd51cbe759f1bb5778e464e2e92fe0908111c5b7d8f3c69958fa1eeefb565db77c304696
-
C:\Program Files\McAfee\Temp4175247991\ieplugin.cabMD5
c18208e9944ffbd8a6387eb255e4f9a0
SHA1ca110fd7dc6c8e2caee53f2f55e423f9b0e7c4ad
SHA2565dabb067a1580920a8f0bc3435598d2d2915f2b51eab3ce2cd07f836337e141a
SHA5129520431801d26c8536c16222dd5aae59efea11e9f5ad1453c46a98612c0a4c5c93328dde310843f3075d428349c514688bb20eaeb8715ddb7b08b15b87203402
-
C:\Program Files\McAfee\Temp4175247991\installer.exeMD5
3a483684d6cadd26bc16d56e37502902
SHA1d24348d75cba603433d6c0eb5cdde7dd8949f4ab
SHA25619c18e170829aa9742337deb37dafc0e9d5b2b6537aa19b3e5f7cfd764bbe33d
SHA512dc949b4ca8b4bc4ae2072d8b53c1c177fb7e4aa6651c6b4faa53f1089b57482b6d538f36a5472efa13372093b807839c6b2fafde53fdd57640ea51899c129968
-
C:\Program Files\McAfee\Temp4175247991\installer.exeMD5
3a483684d6cadd26bc16d56e37502902
SHA1d24348d75cba603433d6c0eb5cdde7dd8949f4ab
SHA25619c18e170829aa9742337deb37dafc0e9d5b2b6537aa19b3e5f7cfd764bbe33d
SHA512dc949b4ca8b4bc4ae2072d8b53c1c177fb7e4aa6651c6b4faa53f1089b57482b6d538f36a5472efa13372093b807839c6b2fafde53fdd57640ea51899c129968
-
C:\Program Files\McAfee\Temp4175247991\l10n.cabMD5
fd9fcf31e56c53a91defbf2c4493bb6a
SHA1399dcd16b029aedacbd860ed11418943fb94f638
SHA256c668316424324103d232597894bb727aaf51ddace146189852ee14125f8ab1d3
SHA5124cede1c85733f6ff765763b8ad9afefbd9ae8cb8b64de5cd07cfd43fcbf02e33175ac8aa6193c1f9c891620b8968cf536b8512e5465556eef10eff64324ccc48
-
C:\Program Files\McAfee\Temp4175247991\logicmodule.cabMD5
1491829ea1d326dd8021437046845527
SHA1c91ffe0ed2ce559368be9db9215e3b403f417d91
SHA256cc43c2628115ac6826aaa04f1c9340085a8070104d7e41fcd521fc9c0ca8dffc
SHA512109e3a0178e23b1f08d6e599a91e77bdbfde97013ae610c7ff9c53a44f280fbfc9e04fff16a1126a6e4d40e6a8e462c0d291c95068cc44e5b6b7420328048ca4
-
C:\Program Files\McAfee\Temp4175247991\logicscripts.cabMD5
c30c02e06ae445a4d87a1e0ed3ed6a8b
SHA1fdc7f7b30654de4e9f9b77d903093ed2035979f4
SHA2564749645827c9cdac3faa25f8aa558c76d58ee23ad1f1a19eeafe8c25a7c2ec71
SHA512c6b3dd1b115eb0e034d0805d58e8dfcef37a98fb858a7c34bf68d2a58f33b595d052d9ccc91ddd50b4b6de2a06097cff0ffe55dacac628ed7f7a9821b5c02d88
-
C:\Program Files\McAfee\Temp4175247991\lookupmanager.cabMD5
8e9c3d4e1cd63aea5ff5bc5a872bedbd
SHA17d3b8117742e9dc3168c80c80416d2328dee559b
SHA25618d561e758b7601aa32e332484379ca598e7dba491f6fa3a5517fc5b6e063e00
SHA51266c51af0971485a5f51a7d05150afc326e9b26ab0af42f51dee1a149991ccea7aaf0c77676abd4917ed58edc4ace96d1064e0efb1938d0ee420b4296af6b7728
-
C:\Program Files\McAfee\Temp4175247991\mfw-mwb.cabMD5
fb760168cb3d3aefd64ef1b965b71cb8
SHA1857e87b7aa4f5698b38588f4512354acf104b461
SHA256c65890433cfd5d404ffa61c9d38c9c4c3e6475091c22aebd717e8dd7936170fc
SHA51273c9c9ae8fbdd327ae21f61001acceac699c63c2fdb57dc4a9c3979863a8f40cfaaaea05af29b1025db680e88d1728d62e2b2c0d8b9e5d85477b567f9977f229
-
C:\Program Files\McAfee\Temp4175247991\mfw-nps.cabMD5
c19df297ccba71731b2eb40329b2c1cc
SHA1430b7ba01f37e603c7d9dc79145ed86f1493f413
SHA25680312261b28f148f86fd7a1791c2f0893ad1419dce28b5ad16dabd43aa0d0632
SHA51284b778ee2d0adb52bf193238b31bfaf9cbc090137ee8533a9b7e97170bf5a2a831347c7198d1db2e35f122614fc44fbbe30cd6175fe62e0b468baa80e5b386af
-
C:\Program Files\McAfee\Temp4175247991\mfw-webadvisor.cabMD5
aa7cf8b61e0a5f58ff1836b8c33461de
SHA1ebd720056c5596839a78c2abf97e78d50d76a079
SHA2561d9b0627d9affbc60da5df1e764e822eb07f01b2b937d66fe6242bcb372cf50b
SHA51290ac7b0548400df7c6e30aba65b7c3cb840c65ab23c30fe0b76dd057b7aef5830142b82e8ea244b93dedb2d54334e64499bd3a626bf3a9a30ede0ac3995720f7
-
C:\Program Files\McAfee\Temp4175247991\mfw.cabMD5
d0e7b08fbe56375b9bc07a20694e0d3d
SHA1ddaa3f92256cb19dae5354a80926c00a67608ae7
SHA25682972c726184e014ac1a7f266b743e9060535f476af332142fe56bb42f07e8ff
SHA512cd368fc071be92d342ada6478b9d84cae2d2a7bbc5d02a62ff9c9c68d1ac483314622d593325df39ccb25af2db9c57624a2a91f3f42c50f73a5bf6c5decd93a9
-
C:\Program Files\McAfee\Temp4175247991\resourcedll.cabMD5
f9b7f5024a9590a7a5d212098b02b319
SHA1a7ae1daad63b53085c911264d4a3444cfa952518
SHA25632fce6209fa16540fb252d067a2048fc093930a8cc7c359c50d3c08fb44997ee
SHA512d5ca639c48383a06d822a2d77ae29045c245cf6b3faaebfdc40b72455b03e8b2106aa59bc1736848dc44a0d97edb52cdbcb0bb7e249636a260819d44cb11600f
-
C:\Program Files\McAfee\Temp4175247991\servicehost.cabMD5
d7f8a264ceae2f45482855cc053561ae
SHA1e7642336a83b10b000fc98fd0e3911c0c45547e2
SHA25682a88c862829e9a7adba32dbd45ee1da0341192a80b318abf6436c20fb63e635
SHA5125a1d2ffef14e0506694c6b0b04beab7e299b30a62f31a370ed15fb0eca65380fe88115e9e87e52acb228b7b3d152806ca319ba5438ac40e471faff080e033f89
-
C:\Program Files\McAfee\Temp4175247991\settingmanager.cabMD5
61212a48cb05315d5aa5e2252cd47f9b
SHA116d35b73246ba552fe88148439c1ef061d26b700
SHA256c5e65f993591153b540ef51cb832e119c9de6936eabf6cd2894d790eab0ae14b
SHA512883ee874ab09503ef1c84db1ae04821636b5f6c9d8db4c50309ac11bcab05823c2a11d39ae8cd7a26f2f16d60f47438ccecd5fb6ac8d1ad7b4b71a55acd58b6a
-
C:\Program Files\McAfee\Temp4175247991\taskmanager.cabMD5
2013677e65faab380518197103cf6079
SHA1583996a19daa9ebf43e8800f9f950768ac74fe46
SHA256fda09b4e6c47c050c4c9b78917a5869c1a092598c750a95af82daf3fa22622f4
SHA512e76620f3cde13013f1f58885d3c3152846ce74889cad41a84697191c3345bbae08e186cbd8fa7f221eef1b00c775640de909ca4b073b6ccd025c93b76e2eadf3
-
C:\Program Files\McAfee\Temp4175247991\telemetry.cabMD5
897d3906360157eb605ea868e751c575
SHA1a9e662ce111ee08b66ce5de0667529645f430bda
SHA2561d58459f8ad6769d3ca1f8c25436fc58763f096b8bbd4e2ac71b663fe0c4f109
SHA512bc86f9533ab0db86eef15018e5cf47b9c19c8a8a33322cd28637c1f9101f39ae25ef0375269d082f6a1c5ecb6d453b5ae5d73b5b4c3e604f4e58ba972a857fa1
-
C:\Program Files\McAfee\Temp4175247991\uihost.cabMD5
15692a0bc4d69fa27e7d38d0d789cf14
SHA1a827b05369851ccda529bced74b2b88db88f751e
SHA256fdd777cda52980bc6233a4317565d0cd4cc178239d41ec85fe7c344008c73887
SHA512edd3be344a3c029cadd81266c2c6655137ac563c2c89c31d02000336cb241e767b017c64a7c309c3cf2ca1cf4416f367b54018d841c2e5a4f0bfbb48ecd65865
-
C:\Program Files\McAfee\Temp4175247991\uimanager.cabMD5
f192171b055ac6d8a8b1a7c6e27c0fc5
SHA189726f5f45223501c76797b02e23a0195ee70bc7
SHA256b3b08d4cf13f1b4720f2f8759429a1e2a34eea76170760c80e3f6e7f40b91a0f
SHA5120de1df023fd060b495bb8e904aa40260785abdb99cdb0d9d0117939bdf53213e5ed45e6007f4c5c7ab90cc65b3ab1a9a9b95dc6a71579b03a9a68ef837c227dd
-
C:\Program Files\McAfee\Temp4175247991\uninstaller.cabMD5
6bd807c4ef37aabd4fc1b19e18d6c487
SHA18d977e54ad7bb167500fe527d18fa3238a9cd98a
SHA25658d5a090532f2c1957367ebcf72becc6dedd1388b71c8325d51e8c03fbae4d20
SHA5120d081c174279a32e2049258213b26c168ff0f0c957f44abdb608872a505e44438106c5a8730c7ff71c3dd986c9f02dc28cfa863e9446ee80597bc7e9628a2bf4
-
C:\Program Files\McAfee\Temp4175247991\updater.cabMD5
c0e3be1d84beef716adc7fbd4424adb8
SHA1f7ba69600620cffd14cc0c925e168e1b907d8a0d
SHA2561b4d0208190eadc030d3886386be3faaf1b610e3c5bc6668a2542843efc0cf62
SHA5123e13af08a473d8b2d9fdfd92e9f760adff4923420bccc721100cc1b9944f7463bf91d5e68719a122caca1c4bb6d9a91104fc423d09848da167f16325bdc34fec
-
C:\Program Files\McAfee\Temp4175247991\wataskmanager.cabMD5
3d58cd45cd489959098521be6f1ea369
SHA1c593819974ca506f852b8c08b68463f1bb78684c
SHA2568ee46dfb11fde76ce627d38a0aab889dfdb25cf7305a2eb1945db0a49d57c0b7
SHA512bc399f3bb770a317651b78020b0dd15c28fcbd9b59a5df37ac7abddacac88cf863dda680e2f654767dddb5bc1479ffd19c0f865f25135231150265ced88c994b
-
C:\Program Files\McAfee\Temp4175247991\webadvisor.cabMD5
399a386db70555384c5cd49da1d9499d
SHA1f4ee227cd4e85edcbf9f3a649d4ff38713fb284e
SHA2560236dd482763d8f6dffb4ec3be83671d811bc11c3443150010b67f002cd78cc8
SHA51266f4d9dee579ba1d07ca9ed8b6e86a5f8c88909c69566089b2fb014af1b05936e8976dbf654c04181c9a73590f92bc252a292866e3639df4ae8eb46c731cad2b
-
C:\Program Files\McAfee\Temp4175247991\wssdep.cabMD5
320b0cb75bcd7052c34b197d40f2e40e
SHA1fc20d18ba34fe3bf9568f694f357f207ce05eff9
SHA2569a75f0ecf2f63773cd2ccb11f38ccf783881121d8c6a70c671914897d222753f
SHA5120de70e090193c5d438f79e76666bb67c11b3f2c1c95e076dee158a0248d10442cb0ec047102390e21066d96c1c91f73bf9ba78526d15c88593edca3d4c9a08e4
-
C:\Program Files\McAfee\WebAdvisor\EventManager.dllMD5
1d5289676d675b984b64cdeb4730b93f
SHA121972c821e598379175fb95f6aa6cf07b9c992ed
SHA2565b671a8febc9d0530830ea5f0078307c6403c3fb26a08c98f48a6053f8bcd9ec
SHA512f8845faa739525d0bdfe3f581ae70af73bb16bd14088465d295f9e05068eefea831f646f5dc26b398ec1f3d7a01e78e781a570b97e83c6fa6a8e80a43b30f49f
-
C:\Program Files\McAfee\WebAdvisor\LookupManager.dllMD5
7bbb2a2037768961d46ed8cf7f3e9895
SHA12ae25a9c2296b6182ab3618414e8d54d292fab4a
SHA2561f4be75a9825bf47adec15b4de129753083746856148fa80b12ca223a6dd1402
SHA5122e614448809751f43b789be0e8f8ecb2a59988babe2ad0f15c7a5b59745a25c246ee156f12ca99206ebe3339f12bf13d49f3c0d7c7db2a98b6ca7c8b3a08b361
-
C:\Program Files\McAfee\WebAdvisor\ServiceHost.exeMD5
d9726bc53aa5a6c2417eb0c7cff80d50
SHA184099b339399c5d8a20e10391d7d58a90d6bc638
SHA2561b6c2ea9fad23b2604aa6a940a957915978d54d68090b4eac8d964e10f929918
SHA512c020399cc03c406ebc1d5285a75005b625f2ec7d381e14081cf1f0dd89001958d316852dc8b2f9a7d8ee6a4761515a2977a3452af07e34f5e98bcaed0cfca1d6
-
C:\Program Files\McAfee\WebAdvisor\SettingManager.dllMD5
5b080b85336d4aa0af25b70c4dcfe52a
SHA10d71b49b0ef6550e6fbb45cb1fb6b8963408e060
SHA256385ff9f164c0bfe05adbe1cbaef72ce09dfc216899db3d263f251c202656b7ec
SHA512022d6aae7119ec8e35d833596c1dc41ea082206b69b1dc9761ea05af3ea69c31d6d8ac8dcb00983e15fb713cb7002f870b7aa41bd9a1bd36ea3277c1b106fe18
-
C:\Program Files\McAfee\WebAdvisor\TaskManager.dllMD5
95c194a157c96fb975c5e17cc8265222
SHA1fca2d063bb19841eb0d4b68d382b6c83ad3de220
SHA256c56e7945b625b8f7c458a4c0c463a3954753ebcf7dd724ffedd1f2931e9d22ca
SHA5127e387457855c8e591a13dabdd9567b9dd3aa36a0eceb2ce3ea564fe98643ad308be482a199e30547f453b8711db7ea6489e961221e2e94bee424d5bab78b8e58
-
C:\Program Files\McAfee\WebAdvisor\mfw\core\class.lucMD5
a33ae2759c2f070312bb57b898c06c22
SHA183007fc4183093061d46b20ba62032c4c4d5b577
SHA256acebd3e47bf47a1435dc5166a49be8b9e77d134892df550c5e5c674304de71a4
SHA5124c66c24dee35b62e92fc3f99c74a28f064d1c7ce67b842a0ce3ce1b8cf2299af0d71f9e0719b59be2cf362965277e5f1213c2d45372f19fdde93308570ab51e6
-
C:\Program Files\McAfee\WebAdvisor\mfw\core\logger.lucMD5
3f7c453b6088877f07460a8f0b777528
SHA17124882eebc67821e709ee47ab9b7b4efe573060
SHA256c0425a5a818f39bf0a0966504323c07511aa0cd33c29ae0c4d8e093b757feae5
SHA51205d3215c9117c383003f5968f51b565ee36b4adf08c6c433f1c166a39af205aec884cc8c3a592fae5ce032070869cd7ecc365b566f0b5d6e64da9e769863b98f
-
C:\Program Files\McAfee\WebAdvisor\servicehost.exeMD5
d9726bc53aa5a6c2417eb0c7cff80d50
SHA184099b339399c5d8a20e10391d7d58a90d6bc638
SHA2561b6c2ea9fad23b2604aa6a940a957915978d54d68090b4eac8d964e10f929918
SHA512c020399cc03c406ebc1d5285a75005b625f2ec7d381e14081cf1f0dd89001958d316852dc8b2f9a7d8ee6a4761515a2977a3452af07e34f5e98bcaed0cfca1d6
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\TelemetryHandler.lucMD5
decaec36bcd7d9fecffa87527e30e4b6
SHA16fe9dd13ca849394e7c623602cb6fd371f3185ee
SHA2564e4f7e74011397a625d1eb1e52341652ff53fd50bb113f31fa4ae9de73ceffeb
SHA5126d02565ebe7f26b032084620607c99282aec83ffc712a6184e92a30ff37e14221b7266c42550bd35f7e23b25fccab670c1a36c47c8b42efcd67977942089dc4f
-
C:\Program Files\McAfee\WebAdvisor\win32\DownloadScan.dllMD5
04ef2c5a0f0cb3f131b805aa179dbe11
SHA1b853feac8d7bfc9631831be1932129a49f599b8c
SHA2562ffd836acba0e1e5071f1bef1b10158dd4a874804f0e0d42b7ff92217ac755dd
SHA512dbb20ee849d5d24f738b38f9b33895fa463eded63e3b792babe8d63a697705565326d96e0fa3300be7359fc97169d606a0b31608f6a6071b93810923a9583323
-
C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dllMD5
f8afff6b7a290e4d76b146d50d65bdc9
SHA1fd562a9a68716f2c003eb044f53634f3a2bfbadb
SHA256de7631ceea58d4e27e6b9c760c891e2bad60b668526b6ecf4ea6b3de98e9ece2
SHA51211c9b39ee574a823509e59a5bbb80dfdc47859b45641bd64e84fe1cb9cebdd2eba5a9bda32fff260f06da754ff478ad663f9904c5e26700d8cfef47a72d4b533
-
C:\Program Files\McAfee\WebAdvisor\x64\DownloadScan.dllMD5
8131196e426bc7ffd0dffc51ddf38b08
SHA12dbf8ec9c27ba3bce536d415af2ffc925a2bad24
SHA2563747a1db5e760e8836737f5f980ae0426f9e4c46fa4298b31fd6b4aed961aa1e
SHA512b755338271c3d24e8c2eb7a0008843a43e1c3375683a3a234c43eb9b899f27c4bb63e88ac9892ea5e8f61e8466505cff8336ca5c1c1e26bc9cd32456bd0b3bc7
-
C:\Program Files\McAfee\WebAdvisor\x64\WSSDep.dllMD5
047e679f02a388b85a81c3472bc7eb72
SHA1d8740c6390ee08889514980cd31e82272465a92c
SHA2560c241f18626043e055678a2899d7a77c11c226b653249735f59d1a87f4e28255
SHA512059368bffb7d81657f5b7bd14f04b5cca57821295d70f6837bc27d6d5d14079fa4472dbcdc82dde1af0e52cd1a53656c6b09a779e22025887c9acc47fe2fddc9
-
C:\Users\Admin\AppData\Local\Temp\is-GT6MR.tmp\city_racing_FVu1w-1.tmpMD5
47fe613751fef2c83fda48877d90300f
SHA1d950ebcbf8621baef45f21198ccc72c59a524e53
SHA256e227f95b36462ac67f0241770d360c87669bd95777ef3bbc02ce0c48409da1a1
SHA512c96e8c65808cb351308e9b2821108026dbd726637b0964c9f683c712d4b2be45526354adfb6c2de4c3dc019e9e2fbc3f0b57efe083d945900f67433956685f92
-
C:\Users\Admin\AppData\Local\Temp\is-PGRG6.tmp\prod0_extract\installer.exeMD5
cf673f38fd7e37c23d8f413c5998abc7
SHA1eeeba7ea60367bad8493e552901f6fdc02ab8fd8
SHA256733b18138f9a4129d4721296fc01fdffc0c32a30e0aee81b0ed1fa815213c0dd
SHA512354a4af4df3173d1563f85ca449ca701917e85d452a53e4018afd2a6713daa0afdfddda6a4bfd0c215b296942f8db23ba745408f5dce7e5c91ea82f07ae677d4
-
C:\Users\Admin\AppData\Local\Temp\is-PGRG6.tmp\prod0_extract\saBSI.exeMD5
211f842d6081bba42c3e7fdd372e0986
SHA1fa96b4b66bf3f37b3bf6ba322213003dc0198d9e
SHA256d5be427d9f42ecf0a37f1c7ed4cb75499f3f61e9a4e67d6b5d0a0b759436f8c5
SHA512bb742a89a7d4204b71c40e15488024da26a6a3dfd665e19a2b8dae940f587eee09de20e12f5adfbf39e896dd7e62025944bc0bf4c443f6aec372a096353b41e0
-
C:\Users\Admin\AppData\Local\Temp\is-PGRG6.tmp\prod0_extract\saBSI.exeMD5
211f842d6081bba42c3e7fdd372e0986
SHA1fa96b4b66bf3f37b3bf6ba322213003dc0198d9e
SHA256d5be427d9f42ecf0a37f1c7ed4cb75499f3f61e9a4e67d6b5d0a0b759436f8c5
SHA512bb742a89a7d4204b71c40e15488024da26a6a3dfd665e19a2b8dae940f587eee09de20e12f5adfbf39e896dd7e62025944bc0bf4c443f6aec372a096353b41e0
-
C:\Users\Admin\AppData\Local\Temp\is-PGRG6.tmp\prod1_extract\FL_09052021.exeMD5
1ec07a265aea33374829a3e95d34e7aa
SHA14ebe7898a6c2266d61cea2fd5e6a9e4905e2ab99
SHA25604c349b58985c70d98ff7db603547ddee17125706337cce191832c809730c40c
SHA512aa3477e588081fbe8a381ae7ae6b53063a45c574e38cf8b3e7081c2584180b8403e1c069f10dd0145935e3a0fb42ee3d2fe3e07e3f352bb9f8b936a31dd81bca
-
C:\Users\Admin\AppData\Local\Temp\is-PGRG6.tmp\prod1_extract\FL_09052021.exeMD5
1ec07a265aea33374829a3e95d34e7aa
SHA14ebe7898a6c2266d61cea2fd5e6a9e4905e2ab99
SHA25604c349b58985c70d98ff7db603547ddee17125706337cce191832c809730c40c
SHA512aa3477e588081fbe8a381ae7ae6b53063a45c574e38cf8b3e7081c2584180b8403e1c069f10dd0145935e3a0fb42ee3d2fe3e07e3f352bb9f8b936a31dd81bca
-
C:\Users\Admin\AppData\Local\Temp\tmp82F1.tmpMD5
ca54d149733eff51998c6d522a8584bd
SHA1aa067fb991b258d835bc954410c3a1009b5ba851
SHA256079b0054759c7613f1c4fc1083c19b166c8911b92596162a709e06fe6db88b26
SHA5127b11a05509bb6c08cf8030939d675e4302003ebcf707db9e705e9e1a02ad579f2d08ebf2df22dbc1f158dc8ca90f509e2c024f7548f0ad3a835359abb280e423
-
C:\Users\Admin\AppData\Local\Temp\tmp82F1.tmpMD5
ca54d149733eff51998c6d522a8584bd
SHA1aa067fb991b258d835bc954410c3a1009b5ba851
SHA256079b0054759c7613f1c4fc1083c19b166c8911b92596162a709e06fe6db88b26
SHA5127b11a05509bb6c08cf8030939d675e4302003ebcf707db9e705e9e1a02ad579f2d08ebf2df22dbc1f158dc8ca90f509e2c024f7548f0ad3a835359abb280e423
-
\Program Files\McAfee\WebAdvisor\eventmanager.dllMD5
1d5289676d675b984b64cdeb4730b93f
SHA121972c821e598379175fb95f6aa6cf07b9c992ed
SHA2565b671a8febc9d0530830ea5f0078307c6403c3fb26a08c98f48a6053f8bcd9ec
SHA512f8845faa739525d0bdfe3f581ae70af73bb16bd14088465d295f9e05068eefea831f646f5dc26b398ec1f3d7a01e78e781a570b97e83c6fa6a8e80a43b30f49f
-
\Program Files\McAfee\WebAdvisor\lookupmanager.dllMD5
7bbb2a2037768961d46ed8cf7f3e9895
SHA12ae25a9c2296b6182ab3618414e8d54d292fab4a
SHA2561f4be75a9825bf47adec15b4de129753083746856148fa80b12ca223a6dd1402
SHA5122e614448809751f43b789be0e8f8ecb2a59988babe2ad0f15c7a5b59745a25c246ee156f12ca99206ebe3339f12bf13d49f3c0d7c7db2a98b6ca7c8b3a08b361
-
\Program Files\McAfee\WebAdvisor\settingmanager.dllMD5
5b080b85336d4aa0af25b70c4dcfe52a
SHA10d71b49b0ef6550e6fbb45cb1fb6b8963408e060
SHA256385ff9f164c0bfe05adbe1cbaef72ce09dfc216899db3d263f251c202656b7ec
SHA512022d6aae7119ec8e35d833596c1dc41ea082206b69b1dc9761ea05af3ea69c31d6d8ac8dcb00983e15fb713cb7002f870b7aa41bd9a1bd36ea3277c1b106fe18
-
\Program Files\McAfee\WebAdvisor\taskmanager.dllMD5
95c194a157c96fb975c5e17cc8265222
SHA1fca2d063bb19841eb0d4b68d382b6c83ad3de220
SHA256c56e7945b625b8f7c458a4c0c463a3954753ebcf7dd724ffedd1f2931e9d22ca
SHA5127e387457855c8e591a13dabdd9567b9dd3aa36a0eceb2ce3ea564fe98643ad308be482a199e30547f453b8711db7ea6489e961221e2e94bee424d5bab78b8e58
-
\Program Files\McAfee\WebAdvisor\win32\downloadscan.dllMD5
04ef2c5a0f0cb3f131b805aa179dbe11
SHA1b853feac8d7bfc9631831be1932129a49f599b8c
SHA2562ffd836acba0e1e5071f1bef1b10158dd4a874804f0e0d42b7ff92217ac755dd
SHA512dbb20ee849d5d24f738b38f9b33895fa463eded63e3b792babe8d63a697705565326d96e0fa3300be7359fc97169d606a0b31608f6a6071b93810923a9583323
-
\Program Files\McAfee\WebAdvisor\win32\wssdep.dllMD5
f8afff6b7a290e4d76b146d50d65bdc9
SHA1fd562a9a68716f2c003eb044f53634f3a2bfbadb
SHA256de7631ceea58d4e27e6b9c760c891e2bad60b668526b6ecf4ea6b3de98e9ece2
SHA51211c9b39ee574a823509e59a5bbb80dfdc47859b45641bd64e84fe1cb9cebdd2eba5a9bda32fff260f06da754ff478ad663f9904c5e26700d8cfef47a72d4b533
-
\Program Files\McAfee\WebAdvisor\x64\downloadscan.dllMD5
8131196e426bc7ffd0dffc51ddf38b08
SHA12dbf8ec9c27ba3bce536d415af2ffc925a2bad24
SHA2563747a1db5e760e8836737f5f980ae0426f9e4c46fa4298b31fd6b4aed961aa1e
SHA512b755338271c3d24e8c2eb7a0008843a43e1c3375683a3a234c43eb9b899f27c4bb63e88ac9892ea5e8f61e8466505cff8336ca5c1c1e26bc9cd32456bd0b3bc7
-
\Program Files\McAfee\WebAdvisor\x64\wssdep.dllMD5
047e679f02a388b85a81c3472bc7eb72
SHA1d8740c6390ee08889514980cd31e82272465a92c
SHA2560c241f18626043e055678a2899d7a77c11c226b653249735f59d1a87f4e28255
SHA512059368bffb7d81657f5b7bd14f04b5cca57821295d70f6837bc27d6d5d14079fa4472dbcdc82dde1af0e52cd1a53656c6b09a779e22025887c9acc47fe2fddc9
-
\Program Files\McAfee\WebAdvisor\x64\wssdep.dllMD5
047e679f02a388b85a81c3472bc7eb72
SHA1d8740c6390ee08889514980cd31e82272465a92c
SHA2560c241f18626043e055678a2899d7a77c11c226b653249735f59d1a87f4e28255
SHA512059368bffb7d81657f5b7bd14f04b5cca57821295d70f6837bc27d6d5d14079fa4472dbcdc82dde1af0e52cd1a53656c6b09a779e22025887c9acc47fe2fddc9
-
\Users\Admin\AppData\Local\Temp\is-PGRG6.tmp\botva2.dllMD5
67965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
\Users\Admin\AppData\Local\Temp\is-PGRG6.tmp\botva2.dllMD5
67965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
\Users\Admin\AppData\Local\Temp\is-PGRG6.tmp\zbShieldUtils.dllMD5
8b03d5f13240d4395654ac0074a95728
SHA189d0f5039379fdda7719fa8b5ab3a46a92e3a064
SHA256f88d2226bbac1b61dbc22c968721f4b9f961c0a6aa75d88f303649bc930007d6
SHA512bb8e2d2c34e8c2d84c1c9579130b8dcded2fa90dbc6d2dc6f54c9114f13a32941571c57a25e16e42e4652eda52201ceb560ba5a726fce1f053613e51752d52a3
-
\Users\Admin\AppData\Local\Temp\nsz9D12.tmp\StdUtils.dllMD5
c6a6e03f77c313b267498515488c5740
SHA13d49fc2784b9450962ed6b82b46e9c3c957d7c15
SHA256b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e
SHA5129870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803
-
\Users\Admin\AppData\Local\Temp\nsz9D12.tmp\System.dllMD5
0d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
\Users\Admin\AppData\Local\Temp\nsz9D12.tmp\nsProcess.dllMD5
f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
\Users\Admin\AppData\Local\Temp\nsz9D12.tmp\nsis7z.dllMD5
80e44ce4895304c6a3a831310fbf8cd0
SHA136bd49ae21c460be5753a904b4501f1abca53508
SHA256b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592
SHA512c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df
-
memory/1396-173-0x0000000000000000-mapping.dmp
-
memory/1588-204-0x0000000000000000-mapping.dmp
-
memory/1588-205-0x00007FF84C2A0000-0x00007FF84C2B0000-memory.dmpFilesize
64KB
-
memory/1680-206-0x0000000000000000-mapping.dmp
-
memory/1796-136-0x0000000000000000-mapping.dmp
-
memory/1808-168-0x0000000000000000-mapping.dmp
-
memory/2068-207-0x0000000000000000-mapping.dmp
-
memory/2072-211-0x0000000000000000-mapping.dmp
-
memory/2236-165-0x0000000000000000-mapping.dmp
-
memory/2248-166-0x0000000000000000-mapping.dmp
-
memory/2280-208-0x0000000000000000-mapping.dmp
-
memory/2780-164-0x0000000000000000-mapping.dmp
-
memory/3064-116-0x0000000000000000-mapping.dmp
-
memory/3064-118-0x0000000000E30000-0x0000000000E31000-memory.dmpFilesize
4KB
-
memory/3064-122-0x0000000000E70000-0x0000000000E7F000-memory.dmpFilesize
60KB
-
memory/3180-126-0x0000000000000000-mapping.dmp
-
memory/3180-133-0x0000000001060000-0x0000000001061000-memory.dmpFilesize
4KB
-
memory/3180-132-0x0000000004FE0000-0x0000000004FE1000-memory.dmpFilesize
4KB
-
memory/3180-131-0x0000000002A70000-0x0000000002A71000-memory.dmpFilesize
4KB
-
memory/3180-129-0x0000000000780000-0x0000000000781000-memory.dmpFilesize
4KB
-
memory/3496-172-0x0000000000000000-mapping.dmp
-
memory/3660-134-0x0000000000000000-mapping.dmp
-
memory/3944-114-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/3952-123-0x0000000000000000-mapping.dmp
-
memory/4136-178-0x0000000000000000-mapping.dmp
-
memory/4172-179-0x0000000000000000-mapping.dmp
-
memory/4536-180-0x0000000000000000-mapping.dmp
-
memory/4572-181-0x0000000000000000-mapping.dmp
-
memory/4616-183-0x0000000000000000-mapping.dmp
-
memory/4764-187-0x0000000000000000-mapping.dmp
-
memory/5128-212-0x0000000000000000-mapping.dmp
-
memory/5180-213-0x0000000000000000-mapping.dmp
-
memory/5236-214-0x0000000000000000-mapping.dmp
-
memory/5348-218-0x0000000000000000-mapping.dmp
-
memory/5520-221-0x0000000000000000-mapping.dmp
-
memory/5520-236-0x000002652D5E0000-0x000002652D5E2000-memory.dmpFilesize
8KB
-
memory/5540-223-0x0000000000000000-mapping.dmp
-
memory/5540-226-0x00007FF840510000-0x00007FF840511000-memory.dmpFilesize
4KB
-
memory/5628-230-0x0000000000000000-mapping.dmp
-
memory/5688-237-0x0000000000000000-mapping.dmp