Analysis
-
max time kernel
1798s -
max time network
1802s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2023 10:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.skidrowreloaded.com/planet-coaster-v1-13-2-69904-repack/
Resource
win10v2004-20230703-en
General
-
Target
https://www.skidrowreloaded.com/planet-coaster-v1-13-2-69904-repack/
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 3 IoCs
Processes:
resource yara_rule C:\Program Files\qBittorrent\qbittorrent.exe BazarLoaderVar5 C:\Program Files\qBittorrent\qbittorrent.exe BazarLoaderVar5 C:\Program Files\qBittorrent\qbittorrent.exe BazarLoaderVar5 -
Executes dropped EXE 2 IoCs
Processes:
qbittorrent_4.5.4_x64_setup.exeqbittorrent.exepid process 2876 qbittorrent_4.5.4_x64_setup.exe 2672 qbittorrent.exe -
Loads dropped DLL 7 IoCs
Processes:
qbittorrent_4.5.4_x64_setup.exepid process 2876 qbittorrent_4.5.4_x64_setup.exe 2876 qbittorrent_4.5.4_x64_setup.exe 2876 qbittorrent_4.5.4_x64_setup.exe 2876 qbittorrent_4.5.4_x64_setup.exe 2876 qbittorrent_4.5.4_x64_setup.exe 2876 qbittorrent_4.5.4_x64_setup.exe 2876 qbittorrent_4.5.4_x64_setup.exe -
Drops file in Program Files directory 37 IoCs
Processes:
qbittorrent_4.5.4_x64_setup.exedescription ioc process File created C:\Program Files\qBittorrent\translations\qtbase_ru.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qt_sl.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_it.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_ko.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_pt_BR.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_uk.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qt_pt_PT.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_pl.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_fr.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qt_gl.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qt_sv.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_bg.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_cs.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_nn.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_zh_CN.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_zh_TW.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\qt.conf qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qt_lt.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_ar.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_fa.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_fi.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_lv.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_sk.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\qbittorrent.exe qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_gd.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_nl.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\qbittorrent.pdb qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_de.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_es.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_he.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_hr.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_hu.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_ja.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\uninst.exe qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_da.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_tr.qm qbittorrent_4.5.4_x64_setup.exe File created C:\Program Files\qBittorrent\translations\qtbase_ca.qm qbittorrent_4.5.4_x64_setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 45 IoCs
Processes:
qbittorrent_4.5.4_x64_setup.exemsedge.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\qBittorrent\DefaultIcon qbittorrent_4.5.4_x64_setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\qBittorrent\DefaultIcon\ = "\"C:\\Program Files\\qBittorrent\\qbittorrent.exe\",1" qbittorrent_4.5.4_x64_setup.exe Key created \REGISTRY\MACHINE\Software\Classes\magnet\shell qbittorrent_4.5.4_x64_setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\qBittorrent\FriendlyTypeName = "qBittorrent Torrent File" qbittorrent_4.5.4_x64_setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.torrent\ = "qBittorrent" qbittorrent_4.5.4_x64_setup.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\magnet\shell\open\command qbittorrent_4.5.4_x64_setup.exe Key created \REGISTRY\MACHINE\Software\Classes\qBittorrent\shell qbittorrent_4.5.4_x64_setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\qBittorrent\shell\open\command\ = "\"C:\\Program Files\\qBittorrent\\qbittorrent.exe\" \"%1\"" qbittorrent_4.5.4_x64_setup.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.torrent qbittorrent_4.5.4_x64_setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.torrent\ = "qBittorrent" qbittorrent_4.5.4_x64_setup.exe Key created \REGISTRY\MACHINE\Software\Classes\magnet\shell\open\command qbittorrent_4.5.4_x64_setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\magnet qbittorrent_4.5.4_x64_setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\magnet\shell\open qbittorrent_4.5.4_x64_setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\magnet\Content Type = "application/x-magnet" qbittorrent_4.5.4_x64_setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\qBittorrent qbittorrent_4.5.4_x64_setup.exe Key created \REGISTRY\MACHINE\Software\Classes\qBittorrent\shell\open\command qbittorrent_4.5.4_x64_setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\qBittorrent\shell qbittorrent_4.5.4_x64_setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.torrent\Content Type = "application/x-bittorrent" qbittorrent_4.5.4_x64_setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.torrent\Content Type = "application/x-bittorrent" qbittorrent_4.5.4_x64_setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\magnet\shell\ = "open" qbittorrent_4.5.4_x64_setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\magnet\shell\open\command\ = "\"C:\\Program Files\\qBittorrent\\qbittorrent.exe\" \"%1\"" qbittorrent_4.5.4_x64_setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\qBittorrent\ = "qBittorrent Torrent File" qbittorrent_4.5.4_x64_setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.torrent qbittorrent_4.5.4_x64_setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\magnet\Content Type = "application/x-magnet" qbittorrent_4.5.4_x64_setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\qBittorrent\shell\open\command qbittorrent_4.5.4_x64_setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\magnet\ = "URL:Magnet link" qbittorrent_4.5.4_x64_setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\magnet\URL Protocol qbittorrent_4.5.4_x64_setup.exe Key created \REGISTRY\MACHINE\Software\Classes\magnet\DefaultIcon qbittorrent_4.5.4_x64_setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\magnet\shell qbittorrent_4.5.4_x64_setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\magnet\ = "URL:Magnet link" qbittorrent_4.5.4_x64_setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\magnet\shell\ = "open" qbittorrent_4.5.4_x64_setup.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\magnet\shell\open qbittorrent_4.5.4_x64_setup.exe Key created \REGISTRY\MACHINE\Software\Classes\qBittorrent qbittorrent_4.5.4_x64_setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\magnet\shell\open\command\ = "\"C:\\Program Files\\qBittorrent\\qbittorrent.exe\" \"%1\"" qbittorrent_4.5.4_x64_setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\qBittorrent\shell\ = "open" qbittorrent_4.5.4_x64_setup.exe Key created \REGISTRY\MACHINE\Software\Classes\magnet qbittorrent_4.5.4_x64_setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\magnet\shell\open\command qbittorrent_4.5.4_x64_setup.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\magnet qbittorrent_4.5.4_x64_setup.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\magnet\DefaultIcon qbittorrent_4.5.4_x64_setup.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\magnet\shell qbittorrent_4.5.4_x64_setup.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1722984668-1829624581-3022101259-1000\{DD584D62-9171-433E-955C-A7AAD2861F14} msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\magnet\DefaultIcon\ = "\"C:\\Program Files\\qBittorrent\\qbittorrent.exe\",1" qbittorrent_4.5.4_x64_setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\magnet\URL Protocol qbittorrent_4.5.4_x64_setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\magnet\DefaultIcon\ = "\"C:\\Program Files\\qBittorrent\\qbittorrent.exe\",1" qbittorrent_4.5.4_x64_setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\qBittorrent\shell\open qbittorrent_4.5.4_x64_setup.exe -
NTFS ADS 1 IoCs
Processes:
msedge.exedescription ioc process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 838290.crdownload:SmartScreen msedge.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
qbittorrent.exepid process 2672 qbittorrent.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exeqbittorrent_4.5.4_x64_setup.exemsedge.exepid process 3812 msedge.exe 3812 msedge.exe 3928 msedge.exe 3928 msedge.exe 4644 identity_helper.exe 4644 identity_helper.exe 3864 msedge.exe 3864 msedge.exe 928 msedge.exe 928 msedge.exe 2876 qbittorrent_4.5.4_x64_setup.exe 2876 qbittorrent_4.5.4_x64_setup.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
qbittorrent.exepid process 2672 qbittorrent.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
Processes:
msedge.exepid process 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe -
Suspicious use of FindShellTrayWindow 46 IoCs
Processes:
msedge.exeqbittorrent.exepid process 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 2672 qbittorrent.exe 2672 qbittorrent.exe 2672 qbittorrent.exe 2672 qbittorrent.exe 2672 qbittorrent.exe 2672 qbittorrent.exe 2672 qbittorrent.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
msedge.exeqbittorrent.exepid process 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 2672 qbittorrent.exe 2672 qbittorrent.exe 2672 qbittorrent.exe 2672 qbittorrent.exe 2672 qbittorrent.exe 2672 qbittorrent.exe 2672 qbittorrent.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3928 wrote to memory of 3276 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 3276 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 4452 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 3812 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 3812 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 3476 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 3476 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 3476 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 3476 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 3476 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 3476 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 3476 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 3476 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 3476 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 3476 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 3476 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 3476 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 3476 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 3476 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 3476 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 3476 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 3476 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 3476 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 3476 3928 msedge.exe msedge.exe PID 3928 wrote to memory of 3476 3928 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.skidrowreloaded.com/planet-coaster-v1-13-2-69904-repack/1⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b86946f8,0x7ff9b8694708,0x7ff9b86947182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3900 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4524 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6224 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=6256 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6164 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6664 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6628 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6956 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6032 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7376 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Downloads\qbittorrent_4.5.4_x64_setup.exe"C:\Users\Admin\Downloads\qbittorrent_4.5.4_x64_setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\qBittorrent\qbittorrent.exe"C:\Program Files\qBittorrent\qbittorrent.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6936 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10378813357594332663,1867093298204345108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6492 /prefetch:12⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\qBittorrent\qbittorrent.exeFilesize
28.5MB
MD5299af9fcfb3067e8f5f64f0866c8fe33
SHA15244f3c95dbee3c29c4171899a1a158087419f59
SHA256aacf4cc8c1591d4a5aeb1d1c32be0c0211fa593a3a4c5107f906a3910fdb6c34
SHA51235598c4d22d29acec1f98fc61cb5e7ca8d3f281bb0ef586c0f1735497fcba4b714f8f5ab2c539cef8b843b35151e0516acd18724c04160c5cddd642cd754ebd2
-
C:\Program Files\qBittorrent\qbittorrent.exeFilesize
28.5MB
MD5299af9fcfb3067e8f5f64f0866c8fe33
SHA15244f3c95dbee3c29c4171899a1a158087419f59
SHA256aacf4cc8c1591d4a5aeb1d1c32be0c0211fa593a3a4c5107f906a3910fdb6c34
SHA51235598c4d22d29acec1f98fc61cb5e7ca8d3f281bb0ef586c0f1735497fcba4b714f8f5ab2c539cef8b843b35151e0516acd18724c04160c5cddd642cd754ebd2
-
C:\Program Files\qBittorrent\qbittorrent.exeFilesize
28.5MB
MD5299af9fcfb3067e8f5f64f0866c8fe33
SHA15244f3c95dbee3c29c4171899a1a158087419f59
SHA256aacf4cc8c1591d4a5aeb1d1c32be0c0211fa593a3a4c5107f906a3910fdb6c34
SHA51235598c4d22d29acec1f98fc61cb5e7ca8d3f281bb0ef586c0f1735497fcba4b714f8f5ab2c539cef8b843b35151e0516acd18724c04160c5cddd642cd754ebd2
-
C:\Program Files\qBittorrent\qt.confFilesize
84B
MD5af7f56a63958401da8bea1f5e419b2af
SHA1f66ee8779ca6d570dea22fe34ef8600e5d3c5f38
SHA256fdb8fa58a6ffc14771ca2b1ef6438061a6cba638594d76d9021b91e755d030d3
SHA51202f70ca7f1291b25402989be74408eb82343ab500e15e4ac22fbc7162eb9230cd7061eaa7e34acf69962b57ed0827f51ceaf0fa63da3154b53469c7b7511d23d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5f6f47b83c67fe32ee32811d6611d269c
SHA1b32353d1d0ed26e0dd5b5f1f402ffd41a105d025
SHA256ac1866f15ff34d1df4dafa761dbb7dc2c712fe01ac0e171706ef29e205549cbc
SHA5126ee068efa9fbd3c972169427be2f6377a1204bf99b61579e4d78643e89e729ad65f2abcc70007fd0dd38428e7cd39010a253d6f9cd5e90409e207ddaf5d6720d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00002cFilesize
18KB
MD5e66cd861023f9e20ca7757172434eedf
SHA185a31314f4e276bee008a7b2d091e92222b3c60b
SHA25695aa4a8e108da21801c822c4804cc761e75087d7ec9da35ad3ac831ae9981b81
SHA5128b1175acb8dd806689a9b9432eb5f64a9982889675823fd3b637c0830b20cb2ff746e76d73165186f07d24b7ced15236b20c626ad139e5a1ad411d4d4a954dda
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
2KB
MD548fca46cf192fde9480630f23ad3894a
SHA13e955077023a9d21a04bbaa7d653c7920cfb64b2
SHA25690101fabdb75cdd6fd9bd3f331db02d389ff8000dc58bea30f084e5f80008c36
SHA512252f1efaba3e325145ce0973b1dde2213658edce28af1959c54c8d2ad2c2b558845fb9e634fbd5f7a8815cf6f0f2d1e5a70fecbf30ce78bdbce916053ce01d61
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
2KB
MD51d73f60d70b27e2df33c884802427dd2
SHA15c465a83f298bf3e2f127d8f88375147c415ce5e
SHA256184fc4aa341c8aefac3c44ef168c4878f367cb3de1845fd9e35ce6d6b4102fdb
SHA512dbaa1d4951fe7b3f50877e49d025c654762d09890cc8e2d77080536923260ea530e22cbe46571491e3009c9884aab817feef61034d3740682bb1da257fea97d7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
4KB
MD57d0ec3428f0ad410f2edfc0e4a30dafd
SHA12519a51345969ab2f4acb4ec0b88a2eaab61384d
SHA256b01a07448a9f598c678c3f7e038d29c6b1858c9dbf1f2cc4e006e063016d09fe
SHA51247aba30bc6c5cd76b0ad94d6074b0dc3636aa1e27d13f10324fdc9b7cf9a300390f6bd27b9356e09e4a474e8880e60cd22555195a05bdc81b2d04c51a8002613
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
5KB
MD52dcbec54ee9409b49912caded83cbae7
SHA1cfe5831f0d00b61d21ea847e2c417353af45f142
SHA256fca3d972d02100ae651f7c48f6e6edbfe596187a84d56119cfdf60952ba06d34
SHA512b477ffda5ded3eee9f26ff5b31e7028fbf5c65d93b3ee11dcfe9ea88e0fa47ec9b9c8ba60f50e49240af1bbe6af6ba8ff610311708ccfe8baf9d37eed250965b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
5KB
MD5baaf78ca706994849e9025a484648e72
SHA134adcebd38cd632d35f8470c88d1028f76e33281
SHA256188172181b4df9d8dc621d2f6bfb295c644a02dc1628239525502e674c1752cb
SHA512306fcdd7963646b0bf00622f02bd8a2e7643b3ab79c4c73c07ed031c125ead6ba42cf3cd55c6f4cfaad36ead563b77bd2666d5754b0597359594a0711d8e03b8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
5KB
MD52f4676742ef7f25baec32722931a88ad
SHA10e43a0d6c0a6b327cc2be4213de8686188b13a5d
SHA256c38473f2d6f7240338a46dac8f254b88c1d5bd288f59236dca40f0159bf384cf
SHA512725c35e0af25619963e4356f5b65c65c6110ab63e2d05d8a1f59a5d067b9d57082f0368f3e974e4ff33ebad941f3bd0a2f98b8c04d9a8f3f5491fe7ee17a8789
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
8KB
MD533c0036d2f9d332a451779e6d3b5e7ce
SHA152eb31120f137908cf5342650b87c4d55bb6078a
SHA256c294700da994a829ffcf1d424c4265b05394dcb090ae86e062368e2754bc884d
SHA51221be15de43f3e3004039157a9b79014082a96eb6f925007c608138c8b45f1d62b8c7eeefc2631521d998d72477faa636900881fcdaf87bc3379940a75b3e7d60
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD55f05491d05bc8badac3b68f9384e7cef
SHA15bc5e31074c0af71a056858883209c9eaa5d49ee
SHA256d06298c3b3765cd67ae4d779ac52b9faa553e159066b5bc4e66b498d83942b5f
SHA51255fd1f5f0ec4d9efca6b9e2edde470e48f8e29650bf60665e9f5d548c6bb0870b0fcb03c1a6a96fa2c63fbd7073f9afe9ab31b4f3e29a691f1ae7fab9e5c7423
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD5f7c982f04fbe79fb830263d8d7345382
SHA152483abe16fbf3669a5f2022b3ef81ce34daa21d
SHA256cb684778a32eb6d58ff16b4ab916ac78c91e25f3dcb58f8ee35d6c5ad7c056ef
SHA51279ff12b7c998eabed1922e6fe02ed1ebebc352f6f3018cd0867b092756ae7c3d0513be240ec4400a708d0bbef6a9f7ab6cd5dd07bcf8679fa3e7cbf3fe4ff501
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD5e0a23e08541fc652b7bdffc09f9c81f3
SHA1fbceac419e3f147f97e05fcbb494cfd81f00b8e4
SHA2563f314a6c85c3b04c09073c8577ed492a753d47b227b95e8222f17a41725da170
SHA51235277afca85dcb449d59e30cd34ada5989d3eb2a6e440dcdcc004cb6bbee6adea2972820d2ce0b6347c137c244e3e6aa3596f1d511944416c37a25a25d4fccfc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD51a2378b99902b0030f54125485b6c2d8
SHA10335cdd2fde4648e9f86b703615ea6e78b19c6e9
SHA2569e1ddffe097513f46ea1f54ac9a201145fe434ec63a257866ad2dafaa6a1d45b
SHA512ba555d6bdc7197d104b1cf79a287eb252c2d7fda909ecb1736103e02a59fda0fd1228d89a2ac045fa74ceb3ffa6c84fe375e0673adf52d3b9c650b565de5d1b1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
9KB
MD5eab0b524efecd91f3297771690d524b6
SHA18d2e0e14fd51b7cf7d57594ba07843e837021bb5
SHA25657a7b374904cdcec131a078b15e7033d1a7502cc7fe36dbd7ec41b58236fe02c
SHA512bd29636b8172ac2ab0ff457e9f6a8f47e41f8d3d36e99ddd8cd271208b340938f81dfa5a4e5932cfc478266804fbfbe63d811d396cba6576d25eafda7f983f0e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
8KB
MD5e015708951851368e121c15d59b3fc2b
SHA11fbfbbbf085226620bf2b967617a0e0152a97eb9
SHA256efe702b0cc58e1d6e2ad5889cd4edc56983720150b9fdaffcc77bdee1d18bbf7
SHA51271ab65fbb1ccf4d21d0c4c8cc865e48570e50054a3fdbc0a27f9b41a51cdc30541b8945e591c9b20f83c99866522c4952dc5091accd07063d122b52b572dd6a3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure PreferencesFilesize
24KB
MD55544c64f2a8f49dabc19eb84267b1c9b
SHA1c5b78d63a8bab1c7b985f7ea2f268d0d7809071e
SHA256a1fcfee2974a77e76a7431a2069db301861ab42dd41769cead8697f41f5a497f
SHA51238c80d7c810441fc87beff38929473088cf426b0a25a30820d8a060f493350d99bb8521b314afe00578ea54648fce2aa4e55880a83a4f1048c56307991726565
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD58c36402192f893a0e6c74704cac9206d
SHA1b370cde0682500d30424bb2b0a3d8c9cb6661a1c
SHA256ad5f7836de786f3d9ff57cc07fa6c75487982bf54288a58409189116f6813de6
SHA5122ed0a60c0c58b02b6167155a73871ea48b94998416086689750af0eeefa973d6e46f4b76e5c54def76d34ee047dd22c5bb96fc8ffd92152f567a3b01cf196c99
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD529fbd4071c5a491ff07681a34e9ab1d8
SHA1b3c868ddd653f7f8ffdd00ae7a60b80c568ded27
SHA256885cde9a12efa6980842de56eda2428a411ce0e537e6e611794830ba522fddb1
SHA5120e525f4d7be61164204f62aef4d1bbe3b8d5decfef1ee6f4ed748f46ecb67161cc3e910f5149e9288f7bc5ccccea68cfe8c5df06f40be85f31b5925eea16023f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD52593f80a28a7a3467bb57c25ede98c93
SHA114e29487273f149faa67af647645f8bbb17d188a
SHA256aed2aff288da9649f1a632ab93dc5d2b504087a6e4c0a887a9f9734bc14765c7
SHA512f07b295548a987944420d4dc084bee7a2afa003d58f781ea0938906f54cf2f8f11d79ff5426ed7beebd68167df3cecefe322905f05ee2b54def2a3703d398dad
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD5fe65c793928ba2f2087f5dd0391f5b60
SHA19d8bba7f7d500bf7cf9577d70b516df13dfaf3b2
SHA2563cffba77a4448bc39e7f930562e84c7b1ec7dc4a561233afdbd15e507544282a
SHA512cb21153f816eae6032ab99be80b73640e0b3a3bf166df0a58d281451c6f02fd9881924c4fd2e294acbd74bd2da5b81ac4e753fa0c44fc4ef7e9fc70bdbaa9cfa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57f3d6.TMPFilesize
372B
MD5098c93ec5448372b8335581678f547a2
SHA10d4020c9c50a56f307390f3ebb1ef10479f2da24
SHA2564e59467c458c3aaa1cd643e8a9bef224f4014a1a2517f33d0af9d310becf715c
SHA512f38c67d0aabc843f14cfbc0b337d833dec5ed437ce67cf2e44266a98d34542a7418d1af73946b22e6846a297177d0fc8c26e72369ed8279a9ad74aec5653a572
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
13KB
MD5914a92cfac23ef34146548801b5561e4
SHA198dbc71595d47d1e8cb1888d53f9bd092551290e
SHA25660401204a00ef015e58c8ef73717999204ed95eaa8abf2fc063bede25cbce24d
SHA5126e9af58dd1f311ed6ca8ab63ae7b817a65b2e82f3f3e98f4d5085cacc1eff59d0921e374a973f7b739ad05838676d2616ae1ce6494e01c538589b7d3883169e7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
13KB
MD5860b5d1205a8fedc2e151f3f882923e4
SHA164907dcd356f3959ea79f95f8816344b476499c3
SHA256cc9554f81a1ea64be7f5390d4aea614bbd9de3d8682535f462be5527095e36e0
SHA5122040e65c6d2126a4812ad3d21386388a38a947675df65f25b5d140a4bcc27ea169c1574391e5981873846d05e387c2ad6359d652c8c056fe9c2f45fb9ff0b459
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD549a314aa18dcce0e86d1a28006bec4bb
SHA185a18503d9b2972d6a86f940b1c689f34a3fae77
SHA2560822ce19b906dca028cbef74adadce7325d5c3615f0f9820a2de381bdd019ac2
SHA512643100dc27afe3e50d63d34d8ceefb9d845ca4d65c66b5de09bc3ec65f4683badf35f6217ccd1fc8d03422a8158282c04ac603b7949ed9f81294540298b2e29a
-
C:\Users\Admin\AppData\Local\Temp\nsvD2DD.tmp\FindProcDLL.dllFilesize
3KB
MD5b4faf654de4284a89eaf7d073e4e1e63
SHA18efcfd1ca648e942cbffd27af429784b7fcf514b
SHA256c0948b2ec36a69f82c08935fac4b212238b6792694f009b93b4bdb478c4f26e3
SHA512eef31e332be859cf2a64c928bf3b96442f36fe51f1a372c5628264a0d4b2fc7b3e670323c8fb5ffa72db995b8924da2555198e7de7b4f549d9e0f9e6dbb6b388
-
C:\Users\Admin\AppData\Local\Temp\nsvD2DD.tmp\FindProcDLL.dllFilesize
3KB
MD5b4faf654de4284a89eaf7d073e4e1e63
SHA18efcfd1ca648e942cbffd27af429784b7fcf514b
SHA256c0948b2ec36a69f82c08935fac4b212238b6792694f009b93b4bdb478c4f26e3
SHA512eef31e332be859cf2a64c928bf3b96442f36fe51f1a372c5628264a0d4b2fc7b3e670323c8fb5ffa72db995b8924da2555198e7de7b4f549d9e0f9e6dbb6b388
-
C:\Users\Admin\AppData\Local\Temp\nsvD2DD.tmp\LangDLL.dllFilesize
5KB
MD568b287f4067ba013e34a1339afdb1ea8
SHA145ad585b3cc8e5a6af7b68f5d8269c97992130b3
SHA25618e8b40ba22c7a1687bd16e8d585380bc2773fff5002d7d67e9485fcc0c51026
SHA51206c38bbb07fb55256f3cdc24e77b3c8f3214f25bfd140b521a39d167113bf307a7e8d24e445d510bc5e4e41d33c9173bb14e3f2a38bc29a0e3d08c1f0dca4bdb
-
C:\Users\Admin\AppData\Local\Temp\nsvD2DD.tmp\LangDLL.dllFilesize
5KB
MD568b287f4067ba013e34a1339afdb1ea8
SHA145ad585b3cc8e5a6af7b68f5d8269c97992130b3
SHA25618e8b40ba22c7a1687bd16e8d585380bc2773fff5002d7d67e9485fcc0c51026
SHA51206c38bbb07fb55256f3cdc24e77b3c8f3214f25bfd140b521a39d167113bf307a7e8d24e445d510bc5e4e41d33c9173bb14e3f2a38bc29a0e3d08c1f0dca4bdb
-
C:\Users\Admin\AppData\Local\Temp\nsvD2DD.tmp\System.dllFilesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
C:\Users\Admin\AppData\Local\Temp\nsvD2DD.tmp\System.dllFilesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
C:\Users\Admin\AppData\Local\Temp\nsvD2DD.tmp\UAC.dllFilesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
C:\Users\Admin\AppData\Local\Temp\nsvD2DD.tmp\UAC.dllFilesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
C:\Users\Admin\AppData\Local\Temp\nsvD2DD.tmp\modern-wizard.bmpFilesize
25KB
MD5cbe40fd2b1ec96daedc65da172d90022
SHA1366c216220aa4329dff6c485fd0e9b0f4f0a7944
SHA2563ad2dc318056d0a2024af1804ea741146cfc18cc404649a44610cbf8b2056cf2
SHA51262990cb16e37b6b4eff6ab03571c3a82dcaa21a1d393c3cb01d81f62287777fb0b4b27f8852b5fa71bc975feab5baa486d33f2c58660210e115de7e2bd34ea63
-
C:\Users\Admin\AppData\Local\Temp\nsvD2DD.tmp\nsDialogs.dllFilesize
9KB
MD56c3f8c94d0727894d706940a8a980543
SHA10d1bcad901be377f38d579aafc0c41c0ef8dcefd
SHA25656b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
SHA5122094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355
-
C:\Users\Admin\AppData\Local\Temp\nsvD2DD.tmp\nsDialogs.dllFilesize
9KB
MD56c3f8c94d0727894d706940a8a980543
SHA10d1bcad901be377f38d579aafc0c41c0ef8dcefd
SHA25656b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
SHA5122094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355
-
C:\Users\Admin\AppData\Local\Temp\nsvD2DD.tmp\nsisFirewallW.dllFilesize
8KB
MD5f5bf81a102de52a4add21b8a367e54e0
SHA1cf1e76ffe4a3ecd4dad453112afd33624f16751c
SHA25653be5716ad80945cb99681d5dbda60492f5dfb206fbfdb776b769b3eeb18d2c2
SHA5126e280a75f706474ad31b2ce770fa34f54cb598528fac4477c466200a608b79c0f9b84011545595d9ba94331ad08e2f51bd42de91f92379db27686a28ba351256
-
C:\Users\Admin\AppData\Local\Temp\nsvD2DD.tmp\nsisFirewallW.dllFilesize
8KB
MD5f5bf81a102de52a4add21b8a367e54e0
SHA1cf1e76ffe4a3ecd4dad453112afd33624f16751c
SHA25653be5716ad80945cb99681d5dbda60492f5dfb206fbfdb776b769b3eeb18d2c2
SHA5126e280a75f706474ad31b2ce770fa34f54cb598528fac4477c466200a608b79c0f9b84011545595d9ba94331ad08e2f51bd42de91f92379db27686a28ba351256
-
C:\Users\Admin\AppData\Local\Temp\nsvD2DD.tmp\nsisFirewallW.dllFilesize
8KB
MD5f5bf81a102de52a4add21b8a367e54e0
SHA1cf1e76ffe4a3ecd4dad453112afd33624f16751c
SHA25653be5716ad80945cb99681d5dbda60492f5dfb206fbfdb776b769b3eeb18d2c2
SHA5126e280a75f706474ad31b2ce770fa34f54cb598528fac4477c466200a608b79c0f9b84011545595d9ba94331ad08e2f51bd42de91f92379db27686a28ba351256
-
C:\Users\Admin\AppData\Roaming\qBittorrent\watched_folders.jsonFilesize
4B
MD55b76b0eef9af8a2300673e0553f609f9
SHA10b56d40c0630a74abec5398e01c6cd83263feddc
SHA256d914176fd50bd7f565700006a31aa97b79d3ad17cee20c8e5ff2061d5cb74817
SHA512cf06a50de1bf63b7052c19ad53766fa0d99a4d88db76a7cbc672e33276e3d423e4c5f5cb4a8ae188c5c0e17d93bb740eaab6f25753f0d26501c5f84aeded075d
-
C:\Users\Admin\Downloads\Unconfirmed 838290.crdownloadFilesize
31.3MB
MD56e35e4512488a44ebf34bff82dc4724f
SHA138903134b1a0a774cdcf728d3484493e7d83592a
SHA2563ba266ddbe5624aeedec1a23c6bf86d6cfd5b547e8c1a31169f6a08434c9e615
SHA512a6faa23d08c34da39111b9da1d9be62eb9486d010b6217b0aaacaa0cc240bca4e305bdbdaf1f4175f4a4ddb12530ddecc3c488d1620e2ead20b9e90f3cbe6a1e
-
C:\Users\Admin\Downloads\qbittorrent_4.5.4_x64_setup.exeFilesize
31.3MB
MD56e35e4512488a44ebf34bff82dc4724f
SHA138903134b1a0a774cdcf728d3484493e7d83592a
SHA2563ba266ddbe5624aeedec1a23c6bf86d6cfd5b547e8c1a31169f6a08434c9e615
SHA512a6faa23d08c34da39111b9da1d9be62eb9486d010b6217b0aaacaa0cc240bca4e305bdbdaf1f4175f4a4ddb12530ddecc3c488d1620e2ead20b9e90f3cbe6a1e
-
C:\Users\Admin\Downloads\qbittorrent_4.5.4_x64_setup.exeFilesize
31.3MB
MD56e35e4512488a44ebf34bff82dc4724f
SHA138903134b1a0a774cdcf728d3484493e7d83592a
SHA2563ba266ddbe5624aeedec1a23c6bf86d6cfd5b547e8c1a31169f6a08434c9e615
SHA512a6faa23d08c34da39111b9da1d9be62eb9486d010b6217b0aaacaa0cc240bca4e305bdbdaf1f4175f4a4ddb12530ddecc3c488d1620e2ead20b9e90f3cbe6a1e
-
\??\pipe\LOCAL\crashpad_3928_BGQYSBYLTNZOIEDOMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/2672-833-0x000002412F2E0000-0x000002412F2F0000-memory.dmpFilesize
64KB
-
memory/2672-845-0x000002412F2E0000-0x000002412F2F0000-memory.dmpFilesize
64KB