Analysis
-
max time kernel
86s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 20:04
Static task
static1
Behavioral task
behavioral1
Sample
btweb_installer.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
btweb_installer.exe
Resource
win10v2004-20231215-en
General
-
Target
btweb_installer.exe
-
Size
1.7MB
-
MD5
cb396c456ebc8ae2951104e427873239
-
SHA1
9310d19b53e78d52311aa40ec04c022b2dd42121
-
SHA256
a0b19474cb32652c311ade86bbc47455c814b7f212c5a4a011e870b491452491
-
SHA512
d29e1e70914ef464014f24ecefa2d21918d49ef53284aa1eeae3ea77f73ce7de26907b2f1107017c8990e3428ad7843caa09b99d5598bd0385f3adde4ae28698
-
SSDEEP
24576:D7FUDowAyrTVE3U5FXhOBxI3EdKI1ZauIt7zH+g2TZK7NnKyWemCVo:DBuZrEUB0dKI1jIt3+PTZchKyKCV
Malware Config
Signatures
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates new service(s) 1 TTPs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
btweb.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\btweb = "\"C:\\Users\\Admin\\AppData\\Roaming\\BitTorrent Web\\btweb.exe\" /MINIMIZED" btweb.exe -
Checks for any installed AV software in registry 1 TTPs 6 IoCs
Processes:
btweb_installer.tmpdescription ioc process Key opened \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\AVG\AV\Dir btweb_installer.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast btweb_installer.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast btweb_installer.tmp Key opened \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\AVAST Software\Avast btweb_installer.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVG\AV\Dir btweb_installer.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV\Dir btweb_installer.tmp -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
btweb_installer.tmpdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation btweb_installer.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
Processes:
installer.exeinstaller.exeServiceHost.exedescription ioc process File created C:\Program Files\McAfee\Temp3183638776\jslang\wa-res-shared-sr-Latn-CS.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\logic\ff_monitor.luc installer.exe File created C:\Program Files\McAfee\WebAdvisor\servicehost.exe installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\switch_on.png installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-uninstall-sr-Latn-CS.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-webboost-pl-PL.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-overlay-zh-CN.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-shared-ru-RU.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\dimensionprocessor.luc installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\lastbrowserused.luc installer.exe File created C:\Program Files\McAfee\WebAdvisor\analyticstelemetry\events\searchsuggestcounter.luc installer.exe File opened for modification C:\Program Files\McAfee\Temp3183638776\jslang\wa-res-install-de-DE.js installer.exe File created C:\Program Files\McAfee\Webadvisor\Analytics\Scripts\transport_api_endpoint.js ServiceHost.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-checklist-el-GR.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-shared-tr-TR.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\core\win32helper.luc installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-pps-pt-BR.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-uninstall-pl-PL.js installer.exe File created C:\Program Files\McAfee\Temp3183638776\jslang\wa-res-install-zh-CN.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-ext-install-toast-hu-HU.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages_web_view\nps\wa-controller-nps-checklist.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-overlay-pl-PL.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-shared-hr-HR.js installer.exe File opened for modification C:\Program Files\McAfee\Temp3183638776\wa-common.css installer.exe File created C:\Program Files\McAfee\Temp3183638776\jslang\wa-res-install-cs-CZ.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\overlay_ui_handler.luc installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-pscore-toast-ru-RU.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-upsell-toast-es-ES.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\analyticstelemetry\events\sendimmediately.luc installer.exe File opened for modification C:\Program Files\McAfee\Temp3183638776\jslang\eula-es-ES.txt installer.exe File created C:\Program Files\McAfee\Temp3183638776\eventmanager.cab installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-options-en-US.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\serializers\edgeonboarding.luc installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\searchreset.luc installer.exe File opened for modification C:\Program Files\McAfee\Temp3183638776\jslang\wa-res-install-en-US.js installer.exe File opened for modification C:\Program Files\McAfee\Temp3183638776\l10n.cab installer.exe File created C:\Program Files\McAfee\Temp3183638776\jslang\wa-res-install-da-DK.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\logic\providers\bing.luc installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\core\uithreadexithandler.luc installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-dialog-balloon-hr-HR.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\wataskmanager.dll installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\freesysdrivespace.luc installer.exe File opened for modification C:\Program Files\McAfee\Temp3183638776\installer.exe installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-shared-zh-CN.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-duckduckgo-el-GR.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\analyticstelemetry\context\wpssubscriptionstatus.luc installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\securesearchhit.luc installer.exe File created C:\Program Files\McAfee\Temp3183638776\jslang\eula-es-ES.txt installer.exe File created C:\Program Files\McAfee\Temp3183638776\jslang\wa-res-shared-en-US.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\webadvisor.ico installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\new-tab-res-toast-cs-CZ.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\cryptojack-icon.png installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-dialog-balloon-nb-NO.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\analyticstelemetry\context\browserversion.luc installer.exe File opened for modification C:\Program Files\McAfee\Temp3183638776\jslang\wa-res-shared-it-IT.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\new-tab-res-toast-pt-BR.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\builtin\wa-core.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\pushnotification.luc installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\builtin\mcafee-logo.png installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-adblock-tr-TR.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-upsell-toast-tr-TR.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\formlogindetect.luc installer.exe File created C:\Program Files\McAfee\Temp3183638776\l10n.cab installer.exe File created C:\Program Files\McAfee\WebAdvisor\logic\providers\yahoo.luc installer.exe -
Executes dropped EXE 8 IoCs
Processes:
btweb_installer.tmpbtweb_install_rr.exesaBSI.exeinstaller.exeinstaller.exebtweb.exeServiceHost.exeUIHost.exepid process 4776 btweb_installer.tmp 952 btweb_install_rr.exe 5252 saBSI.exe 6008 installer.exe 5816 installer.exe 5420 btweb.exe 872 ServiceHost.exe 4736 UIHost.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 5520 sc.exe 5224 sc.exe 6092 sc.exe 980 sc.exe -
Loads dropped DLL 26 IoCs
Processes:
btweb_install_rr.exeregsvr32.exeregsvr32.exebtweb.exeregsvr32.exeregsvr32.exeServiceHost.exepid process 952 btweb_install_rr.exe 952 btweb_install_rr.exe 952 btweb_install_rr.exe 952 btweb_install_rr.exe 952 btweb_install_rr.exe 952 btweb_install_rr.exe 952 btweb_install_rr.exe 952 btweb_install_rr.exe 952 btweb_install_rr.exe 952 btweb_install_rr.exe 2636 regsvr32.exe 5820 regsvr32.exe 5420 btweb.exe 5420 btweb.exe 5420 btweb.exe 5420 btweb.exe 5420 btweb.exe 5420 btweb.exe 5528 regsvr32.exe 5480 regsvr32.exe 872 ServiceHost.exe 872 ServiceHost.exe 872 ServiceHost.exe 872 ServiceHost.exe 872 ServiceHost.exe 872 ServiceHost.exe -
Registers COM server for autorun 1 TTPs 6 IoCs
Processes:
regsvr32.exeregsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\InprocServer32\ = "C:\\Program Files\\McAfee\\WebAdvisor\\x64\\DownloadScan.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\InprocServer32\ = "C:\\Program Files\\McAfee\\WebAdvisor\\x64\\WSSDep.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\InprocServer32 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 5084 4776 WerFault.exe btweb_installer.tmp 6160 4776 WerFault.exe btweb_installer.tmp -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
btweb_installer.tmpdescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 btweb_installer.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ btweb_installer.tmp -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 42 IoCs
Processes:
ServiceHost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs ServiceHost.exe -
Modifies registry class 64 IoCs
Processes:
btweb_install_rr.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exemsedge.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.torrent\ = "Torrent File" btweb_install_rr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Torrent File\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Roaming\\BitTorrent Web\\btweb.exe \"%1\" /SHELLASSOC" btweb_install_rr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BTWKey File\DefaultIcon btweb_install_rr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Magnet btweb_install_rr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BTWKey File\ = "BTWKey File" btweb_install_rr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.torrent btweb_install_rr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\InprocServer32\ = "C:\\Program Files\\McAfee\\WebAdvisor\\win32\\WSSDep.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\InprocServer32\ = "C:\\Program Files\\McAfee\\WebAdvisor\\x64\\DownloadScan.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BTWKey File btweb_install_rr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BTWKey File\shell\ = "open" btweb_install_rr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BTWKey File\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Roaming\\BitTorrent Web\\btweb.exe,0" btweb_install_rr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Torrent File\shell\open\command btweb_install_rr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\InprocServer32\ = "C:\\Program Files\\McAfee\\WebAdvisor\\x64\\WSSDep.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.btwkey\OpenWithProgids btweb_install_rr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BTWKey File\shell btweb_install_rr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Magnet\shell\open\command btweb_install_rr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\ = "McAfee SiteAdvisor MISP Integration" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Torrent File\ = "Torrent File" btweb_install_rr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Magnet\Content Type = "application/x-magnet" btweb_install_rr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Magnet\Content Type btweb_install_rr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Magnet\DefaultIcon btweb_install_rr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Magnet\shell\ = "open" btweb_install_rr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-635608581-3370340891-292606865-1000\{FB6BF479-1DF6-4791-86E4-C1A4CF977038} msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Torrent File\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Roaming\\BitTorrent Web\\btweb.exe,0" btweb_install_rr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BTWKey File\shell\open btweb_install_rr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Magnet\Content Type\ = "application/x-magnet" btweb_install_rr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Magnet\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Roaming\\BitTorrent Web\\btweb.exe \"%1\" /SHELLASSOC" btweb_install_rr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Torrent File btweb_install_rr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\.btwkey\OpenWithProgids\BTWKey File = "0" btweb_install_rr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Magnet\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Roaming\\BitTorrent Web\\btweb.exe,0" btweb_install_rr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Magnet\shell\open btweb_install_rr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\ = "ScannerAPI Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\Implemented Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.btwkey btweb_install_rr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BTWKey File\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Roaming\\BitTorrent Web\\btweb.exe \"%1\" /SHELLASSOC" btweb_install_rr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Magnet\ = "Magnet URI" btweb_install_rr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\Version\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Torrent File\shell btweb_install_rr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Torrent File\shell\ = "open" btweb_install_rr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Torrent File\shell\open btweb_install_rr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BTWKey File\shell\open\command btweb_install_rr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\ = "McAfee SiteAdvisor MISP Integration" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\Implemented Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.torrent\OpenWithProgids btweb_install_rr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\.torrent\OpenWithProgids\Torrent File = "0" btweb_install_rr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Magnet\URL Protocol btweb_install_rr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\InprocServer32\ = "C:\\Program Files\\McAfee\\WebAdvisor\\win32\\DownloadScan.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Torrent File\DefaultIcon btweb_install_rr.exe -
Processes:
saBSI.exeServiceHost.exebtweb.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 saBSI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 ServiceHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\503006091D97D4F5AE39F7CBE7927D7D652D3431 btweb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 ServiceHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 ServiceHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\503006091D97D4F5AE39F7CBE7927D7D652D3431\Blob = 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 btweb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\503006091D97D4F5AE39F7CBE7927D7D652D3431\Blob = 19000000010000001000000091fad483f14848a8a69b18b805cdbb3a0f0000000100000014000000327fc447408de9bf596f83d4b2fa4b8e3e7097d8090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b06010505070308530000000100000041000000303f3020060a6086480186fa6c0a010230123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c07f000000010000002c000000302a060a2b0601040182370a030406082b0601050507030506082b0601050507030606082b060105050703076200000001000000200000006dc47172e01cbcb0bf62580d895fe2b8ac9ad4f873801e0c10b9c837d21eb1770b000000010000001e00000045006e00740072007500730074002000280032003000340038002900000014000000010000001400000055e481d11180bed889b908a331f9a1240916b9701d0000000100000010000000e871723e266f38af5d49cda2a502669c7e000000010000000800000000c001b39667d601030000000100000014000000503006091d97d4f5ae39f7cbe7927d7d652d343120000000010000002e0400003082042a30820312a00302010202043863def8300d06092a864886f70d01010505003081b431143012060355040a130b456e74727573742e6e65743140303e060355040b14377777772e656e74727573742e6e65742f4350535f3230343820696e636f72702e206279207265662e20286c696d697473206c6961622e2931253023060355040b131c286329203139393920456e74727573742e6e6574204c696d69746564313330310603550403132a456e74727573742e6e65742043657274696669636174696f6e20417574686f7269747920283230343829301e170d3939313232343137353035315a170d3239303732343134313531325a3081b431143012060355040a130b456e74727573742e6e65743140303e060355040b14377777772e656e74727573742e6e65742f4350535f3230343820696e636f72702e206279207265662e20286c696d697473206c6961622e2931253023060355040b131c286329203139393920456e74727573742e6e6574204c696d69746564313330310603550403132a456e74727573742e6e65742043657274696669636174696f6e20417574686f726974792028323034382930820122300d06092a864886f70d01010105000382010f003082010a0282010100ad4d4ba91286b2eaa320071516642a2b4bd1bf0b4a4d8eed8076a567b77840c07342c868c0db532bdd5eb8769835938b1a9d7c133a0e1f5bb71ecfe524141eb181a98d7db8cc6b4b03f1020cdcaba54024007f7494a19d0829b3880bf587779d55cde4c37ed76a64ab851486955b9732506f3dc8ba660ce3fcbdb849c176894919fdc0a8bd89a3672fc69fbc711960b82de92cc99076667b94e2af78d665535d3cd69cb2cf2903f92fa450b2d448ce0532558afdb2644c0ee4980775db7fdfb9085560853029f97b48a46986e3353f1e865d7a7a15bdef008e1522541700902693bc0e496891bff847d39d9542c10e4ddf6f26cfc3182162664370d6d5c007e10203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041455e481d11180bed889b908a331f9a1240916b970300d06092a864886f70d010105050003820101003b9b8f569b30e753997c7a79a74d97d7199590fb061fca337c46638f966624fa401b2127cae67273f24ffe3199fdc80c4c6853c680821398fab6adda5d3df1ce6ef6151194820cee3f95af11ab0fd72fde1f038f572c1ec9bb9a1a4495eb184fa61fcd7d57102f9b04095a84b56ed81d3ae1d69ed16c795e791c14c5e3d04c933b653ceddf3dbea6e5951ac3b519c3bd5e5bbbff23ef6819cb1293275c032d6f30d01eb61aacde5af7d1aaa827a6fe7981c479993357ba12b0a9e0426c93ca56defe6d840b088b7e8dead79821c6f3e73c792f5e9cd14c158de1ec2237cc9a430b97dc80908db3679b6f48081556cfbff12b7c5e9a76e95990c57c8335116551 btweb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\503006091D97D4F5AE39F7CBE7927D7D652D3431\Blob = 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 btweb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\503006091D97D4F5AE39F7CBE7927D7D652D3431\Blob = 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 btweb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 ServiceHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 5c000000010000000400000000100000190000000100000010000000ffac207997bb2cfe865570179ee037b9030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e41d0000000100000010000000a86dc6a233eb339610f3ed414927c559140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f620000000100000020000000552f7bdcf1a7af9e6ce672017f4f12abf77240c78e761ac203d1d9d20ac899880b00000001000000320000004400690067006900430065007200740020005400720075007300740065006400200052006f006f0074002000470034000000090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e199604000000010000001000000078f2fcaa601f2fb4ebc937ba532e75492000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e ServiceHost.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 8 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 31 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
btweb_installer.tmpmsedge.exemsedge.exeidentity_helper.exebtweb_install_rr.exemsedge.exesaBSI.exemsedge.exeServiceHost.exepid process 4776 btweb_installer.tmp 4776 btweb_installer.tmp 4776 btweb_installer.tmp 4776 btweb_installer.tmp 4776 btweb_installer.tmp 4776 btweb_installer.tmp 4776 btweb_installer.tmp 4776 btweb_installer.tmp 4776 btweb_installer.tmp 4776 btweb_installer.tmp 4776 btweb_installer.tmp 4776 btweb_installer.tmp 4776 btweb_installer.tmp 4776 btweb_installer.tmp 4776 btweb_installer.tmp 4776 btweb_installer.tmp 4776 btweb_installer.tmp 4776 btweb_installer.tmp 4776 btweb_installer.tmp 4776 btweb_installer.tmp 4776 btweb_installer.tmp 4776 btweb_installer.tmp 4584 msedge.exe 4584 msedge.exe 4036 msedge.exe 4036 msedge.exe 4436 identity_helper.exe 4436 identity_helper.exe 952 btweb_install_rr.exe 952 btweb_install_rr.exe 5676 msedge.exe 5676 msedge.exe 5252 saBSI.exe 5252 saBSI.exe 5252 saBSI.exe 5252 saBSI.exe 5252 saBSI.exe 5252 saBSI.exe 5252 saBSI.exe 5252 saBSI.exe 5252 saBSI.exe 5252 saBSI.exe 6044 msedge.exe 6044 msedge.exe 872 ServiceHost.exe 872 ServiceHost.exe 872 ServiceHost.exe 872 ServiceHost.exe 872 ServiceHost.exe 872 ServiceHost.exe 872 ServiceHost.exe 872 ServiceHost.exe 872 ServiceHost.exe 872 ServiceHost.exe 872 ServiceHost.exe 872 ServiceHost.exe 872 ServiceHost.exe 872 ServiceHost.exe 872 ServiceHost.exe 872 ServiceHost.exe 872 ServiceHost.exe 872 ServiceHost.exe 872 ServiceHost.exe 872 ServiceHost.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
Processes:
msedge.exepid process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
btweb.exedescription pid process Token: SeManageVolumePrivilege 5420 btweb.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
Processes:
btweb_installer.tmpmsedge.exebtweb.exepid process 4776 btweb_installer.tmp 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 5420 btweb.exe 5420 btweb.exe 5420 btweb.exe -
Suspicious use of SendNotifyMessage 27 IoCs
Processes:
msedge.exebtweb.exepid process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 5420 btweb.exe 5420 btweb.exe 5420 btweb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
btweb_installer.exemsedge.exedescription pid process target process PID 3204 wrote to memory of 4776 3204 btweb_installer.exe btweb_installer.tmp PID 3204 wrote to memory of 4776 3204 btweb_installer.exe btweb_installer.tmp PID 3204 wrote to memory of 4776 3204 btweb_installer.exe btweb_installer.tmp PID 4036 wrote to memory of 4560 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4560 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4044 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4584 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4584 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3004 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3004 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3004 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3004 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3004 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3004 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3004 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3004 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3004 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3004 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3004 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3004 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3004 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3004 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3004 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3004 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3004 4036 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\btweb_installer.exe"C:\Users\Admin\AppData\Local\Temp\btweb_installer.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\is-5IL6I.tmp\btweb_installer.tmp"C:\Users\Admin\AppData\Local\Temp\is-5IL6I.tmp\btweb_installer.tmp" /SL5="$90068,869225,844288,C:\Users\Admin\AppData\Local\Temp\btweb_installer.exe"2⤵
- Checks for any installed AV software in registry
- Checks computer location settings
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\is-D0KUN.tmp\btweb_install_rr.exe"C:\Users\Admin\AppData\Local\Temp\is-D0KUN.tmp\btweb_install_rr.exe" /S3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:952 -
C:\Users\Admin\AppData\Local\Temp\is-D0KUN.tmp\component0_extract\saBSI.exe"C:\Users\Admin\AppData\Local\Temp\is-D0KUN.tmp\component0_extract\saBSI.exe" /affid 91082 PaidDistribution=true CountryCode=GB3⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:5252 -
C:\Users\Admin\AppData\Local\Temp\is-D0KUN.tmp\component0_extract\installer.exe"C:\Users\Admin\AppData\Local\Temp\is-D0KUN.tmp\component0_extract\\installer.exe" /setOem:Affid=91082 /s /thirdparty /upgrade4⤵
- Drops file in Program Files directory
- Executes dropped EXE
PID:6008 -
C:\Program Files\McAfee\Temp3183638776\installer.exe"C:\Program Files\McAfee\Temp3183638776\installer.exe" /setOem:Affid=91082 /s /thirdparty /upgrade5⤵
- Drops file in Program Files directory
- Executes dropped EXE
PID:5816 -
C:\Windows\SYSTEM32\sc.exesc.exe create "McAfee WebAdvisor" binPath= "\"C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe\"" start= auto DisplayName= "McAfee WebAdvisor"6⤵
- Launches sc.exe
PID:5520 -
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dll"6⤵PID:5480
-
C:\Windows\SysWOW64\regsvr32.exe/s "C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dll"7⤵PID:2636
-
C:\Windows\SYSTEM32\sc.exesc.exe description "McAfee WebAdvisor" "McAfee WebAdvisor Service"6⤵
- Launches sc.exe
PID:5224 -
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\x64\WSSDep.dll"6⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:5820 -
C:\Windows\SYSTEM32\sc.exesc.exe failure "McAfee WebAdvisor" reset= 3600 actions= restart/1/restart/1000/restart/3000/restart/30000/restart/1800000//06⤵
- Launches sc.exe
PID:6092 -
C:\Windows\SYSTEM32\sc.exesc.exe start "McAfee WebAdvisor"6⤵
- Launches sc.exe
PID:980 -
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\win32\DownloadScan.dll"6⤵
- Loads dropped DLL
- Modifies registry class
PID:2636 -
C:\Windows\SysWOW64\regsvr32.exe/s "C:\Program Files\McAfee\WebAdvisor\win32\DownloadScan.dll"7⤵
- Loads dropped DLL
- Modifies registry class
PID:5528 -
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\x64\DownloadScan.dll"6⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:5480 -
C:\Users\Admin\AppData\Roaming\BitTorrent Web\btweb.exe"C:\Users\Admin\AppData\Roaming\BitTorrent Web\btweb.exe" /RUNONSTARTUP3⤵
- Adds Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://btweb.rainberrytv.com/gui/index.html?v=1.4.0.5759&firstrun=1&localauth=localapi262cd1d1aa28e3f2:4⤵PID:3824
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9d28f46f8,0x7ff9d28f4708,0x7ff9d28f47185⤵PID:1820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 9243⤵
- Program crash
PID:5084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 9243⤵
- Program crash
PID:6160
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0x40,0x128,0x7ff9d28f46f8,0x7ff9d28f4708,0x7ff9d28f47182⤵PID:4560
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:4044
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4584 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:3004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:4280
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3492 /prefetch:12⤵PID:920
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:1556
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:4192
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4384 /prefetch:82⤵PID:2980
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4384 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:1120
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4312 /prefetch:12⤵PID:4440
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:3080
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:3384
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:4324
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:1748
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:3564
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:3856
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5188 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4968 /prefetch:82⤵PID:5668
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6352 /prefetch:12⤵PID:6060
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6372 /prefetch:12⤵PID:5996
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6676 /prefetch:12⤵PID:5472
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4024 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:6044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:6056
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6108 /prefetch:82⤵PID:6076
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6208 /prefetch:12⤵PID:5688
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6908568087739404469,14120380458610245418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6492 /prefetch:12⤵PID:5748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4320
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5268
-
C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"1⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:872 -
C:\Program Files\McAfee\WebAdvisor\UIHost.exe"C:\Program Files\McAfee\WebAdvisor\UIHost.exe"2⤵
- Executes dropped EXE
PID:4736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4776 -ip 47761⤵PID:1424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4776 -ip 47761⤵PID:5680
-
C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"1⤵PID:6928
-
C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"1⤵PID:6848
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir "C:\Program Files (x86)\McAfee Security Scan" 2>nul2⤵PID:4908
-
C:\Program Files\McAfee\WebAdvisor\UIHost.exe"C:\Program Files\McAfee\WebAdvisor\UIHost.exe"2⤵PID:7100
-
C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"1⤵PID:5572
-
C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"1⤵PID:2680
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD568a06f6e7cc9dc88b7119e31fcabebb4
SHA159a0ca462fdf8cac5f189c9e6c2bb6c9030a373e
SHA2564d1b9589398ae99fde3e94817dcaaa466d22188360712874a8ab8f8320666d31
SHA512990e979d0be089609c0b0c7ed6369a944642d60af0157bd43a62184b6ab2c2639c54ec7dc5268f10e20d4e932b2d3e910acd7a80e9b26509096163150c83fc38
-
Filesize
69KB
MD5d2e5132ca5d4fbf68959b98ca1e13074
SHA1e628934cc334d96a7b391f9c9793d3dd445fe81b
SHA25689bc210a41650c4be5eb70f475900c69a9c86e7df4520ffc8303979bbd008825
SHA512ca18e4103ea12f0837f4b5917a466b0f13003c5a5a512342f436e54e0c309ee1fd44b790d01d073ef4d477f1a4bf6099b072e362421b94c641e74bd4c22bdc9d
-
Filesize
1.2MB
MD5263eff0067075f667260390281c23f60
SHA17f67311c35dad0399c245fe2f30eddfdfdd2ab39
SHA256b742f885517afab3c4781507182cbd767f0ee9d9491085836ec704cdd6dbe32b
SHA51281f5c9eefe8a6345f9bf9c9a9aef879af9292c84a60c6bf3c04eb4835721d9d661f7727f610d732735fb09617fa934eb955ee588980bc6e016341cb7136c5878
-
Filesize
1024KB
MD530e3608eac53fe92550e8961c041fbd5
SHA14781e28bf2a13c826bc8688564e800fb2bc36c3d
SHA2565b8aa534725df504d775d255d64c38db08b39b05c55098c370ab990dd127c778
SHA512a9e1f695a0582b7df6ae3d2253aecbc033a8380c874ba1d4f74c8442d2c96c14cf3f5b57ffbb672e487b08daf70dbcd0910240f1d654eb10290783d8fa650f83
-
Filesize
2.2MB
MD54c52e57f17e9a7f06901e8110a7db76f
SHA1db4a538ed72a15362a4b8d3b15f0b12b9e921551
SHA256ff2f42a38852fac9adb92c09d95c686a5eb91773c9d40902bb08f70f26757d36
SHA5122e53997c87e7574c059608bf67e049e25243047355be8e59e0ba5a8938df5bac25398ab47b3b2365052e8e786f31664606387de4528344bfa57d47f5c87486d6
-
Filesize
1.5MB
MD5f1f2d077a09046500b33c1146a19f66f
SHA17c0e17c92f128ea204686173bfd76cd3dc84ef65
SHA256862eb1bc3b9979cb32b03431f908c6e17c858fef7d7d5b971e870b446cad0744
SHA5128138e736a4c79a4973617ea6d5e1ed0be3e311e84603baf503d163ef83366e073a7534c71b7cb79b8730ef98ca8fbe43fb42fc1bde4d3a8f42ffb9f71c13d24d
-
Filesize
704KB
MD54f7c843f47e00d407cbad09289061c30
SHA1aa5d360bf74a3b9cd72a7866b0883e51dc09a475
SHA25674f66feef1bcbb5990a82bb3cd9be5a876c8eae996f6693276f2ca3fe4be6a30
SHA512a2da2722294e3d2a20aaa6ae33a786300ac620060266fd07052596e6ab5c1975ef924b461a9196566115d21ff7e21f0d966351d7a2405e42c0ce2e9c5e1536ff
-
Filesize
640KB
MD5dcf05e207bd8bebefcf71af3f6170e8d
SHA164182284ab86377cbb33de46da7ef43068eb3531
SHA256c1d6be202893981bed9d5ea57b54184fbb620e0a9cbdf8ba8c33f2e535ed5a4f
SHA512d08bd8ae86cf96d044fd47b0b74ebc73a25f62e6cf85f0a016b548fdf734ba72b47d4075ceb62a02f24e348ae300fec9bbd354355e6404f4e9b8fe45ab1818c7
-
Filesize
285KB
MD5d14e70d6b74078e68a3c5c8eab53b20a
SHA13429b92299d376384425dad622992b777e8426c7
SHA256c97e8886630603274bfd15aa6cfd68e0d4d9fdd0bb7604f17c0967b60058b98f
SHA512b639e586eba8ef980e2aff0c482891dd8b2c92e87468a374c89ca2ba57dc793f8fd18f5b3cbcbb7d21eda10cbe78a8966b42f1623d655fa63760f60eddf3387e
-
Filesize
1.4MB
MD56556471099a3d10e39fe8634f0d99cf6
SHA10f0f27fa980192cda192be11c662cf3da0c022d8
SHA2568f702fc04eddcc4e2e73be9256306b04239aeb115ba95640c1986375fbdb6fb1
SHA512020c58ba7b1f685401b4655af707b6207f697b0639e565ef50725c48b247a2c96b4b47fd1db3f2e74115fc695d60208e4bc0e607ed522755ff6a94a8ef6129b0
-
Filesize
68KB
MD50df2053aa417d7fe65c369ffc1b23f91
SHA1710caf28e796a15ac01ca910363da8e12bb5f9ae
SHA256365aea77a518ecdd65cf74beaa131322e06b0dbaf78b9975315a0353c026fdd3
SHA512e25a1d5c5cec41b9b15c9cb0d7ff1c06465523b87933ef3d2fdb85afbcb7a0656e2a6ee10b48b827c5a56fd270ee759d2610e3b6b6c863ed7afe03dcab0e7ee4
-
Filesize
989KB
MD501815e7a9cf69ed6dda2f846c997367c
SHA14a1b6755a11c25ba2ff1f8b20440520cfc6cbe62
SHA256fc60b9e06302ae8418d50067e6016927e313b0ef29f203631b5e4d372be31940
SHA512783cd4443cd8e662c00eac09ccdd25c8914029db5aa99744810b755f002381b58c92fa88db8a54d89b3102b8c78f25c3cfaa4d71b8710375195782e771f905a3
-
Filesize
42KB
MD5b5cdd9f8392575e594ae414036f35635
SHA16d7c2af0bea661c57fcc94cb9085e835cf9cdfbb
SHA256706f00a57bcd05fc6a722ab8e2758a7c3ff9987c413a4c3d83517a5bd77b8f71
SHA5122bfe3a6a047eb6297b57b7345c70cde29032e96a65f52f974f34049aafad70d0bb366e8871fa1d2bcc6fe3085448a12895c0cdbfe4e55e18233cb3f169e52857
-
Filesize
44KB
MD538ddb464e2a14db1fb059b54d5f75d08
SHA187a90a77f37ac04d2843c803654838f66c251852
SHA2562ac6c8647fedfb310d4b44c0ba6b109a56b7fd60ca201bd048a6d07f523541c4
SHA5129d49a54fe7d7ae381d532a7d4f4c0e3427ab56d27b42a5f0c5a1fcb0474dd858a87a2e8f3cc3858ae172c83763e473ef29d14b5d5f8b74862e0cebd0d617925c
-
Filesize
926KB
MD5ae8a520641e02bdc11cb9de6591eb2e0
SHA10751c44dbddffe2a972ced617fd9d56c90cca775
SHA256fbd4166c5c273ea4344c1a35524f14d77ded160edb8d4765bb9ee03a85b3d05e
SHA512d0cc8232bfb794b658a761a78b0a15b1199124906714e66b50bca14eb8b28bcf1bbb3855dc2d8721c043fa71965418784fc42589692c3b82208270330dfdb808
-
Filesize
321KB
MD5ae093c0b83733f2cd3d86509db41ae63
SHA10698c600db8a1f9e3cc7eb4ed6a54ef3d0f82277
SHA25633d7df93855c333d2ee94ad2202df7741ac5cc923bd7097651da2ee8b29f31c3
SHA5122310e1a1017cb19b088e2632fe591f18c1d9ae45703797d531bb94a317e179e6785677a3c2455cfc911574e4313942994b5ca87b0a29897dd878abf69e4b545b
-
Filesize
65KB
MD5f6cda70b137197fd4be944b1bf73c93d
SHA121cd4f06b1f6536bc16fd4c80a4b3b10fa105e81
SHA2565454e9a08e76ef7e25dbb1532cbbdcc21158581d542548e327ba7ef04135ca8f
SHA5124b5ae4024f4c6153a300e5d50ce97d703d4cd7d328d85648d0c68d2bae52c74c79064e3180c4d9ab3f0824fe444c41556488534cb614573994c60e8405f0f327
-
Filesize
320KB
MD56cde5dca097c9538888459e0c06af19d
SHA1a9f99099068274cd34c05183a9aae1d242c391a5
SHA25693c59caeebe79377bb2b6cc9291191eedfe683afdfa4ed91de536e4a1b2a4ab3
SHA512419b65e8069325f8991911a6c531b73e11ea672b3d92b88160327562e584236a7091985fad7ad45b0380aa04b505cd2af412bba4a61c8562c326e258531756bd
-
Filesize
581KB
MD54563431d0d4f91f33e970e8c4660d2b9
SHA1993d8e5a7c30398f6a0c37108854ef3656bdd8cc
SHA256b36a65dfbbaca5b0bf21ffb4a00a13bc480a943b4813730406feac823604d2f0
SHA51273608d2d9446502db5176bcc5971eeab57232914f40403e19ee0c6680aa487cbb32c4cdc61c01cabdea40a3069f35b10ca34080508c3d8c9e939c491ae9caf44
-
Filesize
1.3MB
MD5b9826568fc271133bd82d50732d11a77
SHA1c05d2aacea3742083f61d9fcd9a998d79c326c91
SHA256f45577870149d96d2b7036e7da60143a50f37c704def7d3d1656aa6d21b5106a
SHA512e7bec819ed8622f479ce5f6aff12ecb0ae668e248aa5d8939e9501ae18e870a528959fcbd90451b70e37f76d08f25ed60c77b4a8d1047adf456e7b848106ed26
-
Filesize
100KB
MD521c33d98e53a6c00b4f73da11acdc65c
SHA14610cebed3c9ef8058c9b2a6afd0109094efc252
SHA2569eb2d5af7623a25acf9f6a8ef975f9ff493ef4ff6024cb96c3ac716392c51a47
SHA5120f65d044293af0a2116d23e03aca0b36331cc9412f4f171c367443e05b9f536b07f7f152ed0886102216f6e31563fbe5e9eaa664edb6b91f5532d0f0f16663e6
-
Filesize
315KB
MD5660db3677a8a9c428f876ee550c85c33
SHA1847830d128ffb54b1fe1109e6646c09bf30bf753
SHA25684169803f443813339d65d1c331d8b07feffd1d5ab6fbd172ee83b53526a8a37
SHA51210a6f9fb04ac5fe0dced943b99b1b3e233bfbb297b1238a94ee605916e2e7bbc4c7d59d23049472366693d371e128b5d0e68aae698e804e74d76de9feac7ec1b
-
Filesize
1.6MB
MD52e430b2dd9768f34cb254ef20a85a325
SHA1e42e244d7754ee2f8834e1bbf46308e6032f558c
SHA25639cf4ca1b09addf1f9d373f405cc5ac644a766a5e6bbc915753468726dfe49df
SHA5123a26958c219f5ce60b01f10c5cdd1528e44dd35decf338a93aca7243042bf8ba57e593f0126c1a3a0bfbc35591ea0646a2628b85985076673e193e4996bb74ad
-
Filesize
914KB
MD5dbd2690574031bb1da5a200f83fa88b5
SHA17d7d6409a5da31249eccf50bc9fb5ea3b9146b5e
SHA2563d050fa2eb02015fafe3b918ab6c880c8b032549d8afa7024714cc271197c572
SHA512558fecf901e75945d468228faaefdf95ba1234bc35a57071dcbe3f2022c9470e58def124fc9b9123a97249ad576c5ec3a31fc594dac8417b712500c3a15f0d44
-
Filesize
72KB
MD5eb105c0885ee2e4b9e2734f6f7284019
SHA1327479f7820d19e6c236dc11f8707efd0d6bf6e2
SHA256350bf925609830e683e5007dbe8feb4000a0c32a2b991798dc6b84608a2a8e89
SHA5127e6805c2aabb1b1b8768eaf2c816dadbe78878249ea66eb89dd595fd9119ed0f8926213aa51028337fd1674aee532de301877458b5c7d9c0a2271c32a48ac611
-
Filesize
5KB
MD53ad7fa32bebb41b973b0674b44f408a0
SHA1918b5a8087286b390b6c8d8fa09d00bce29f8911
SHA2568ba67eeb78188a9f5a8c61a9aa401453800bcd3ad0f6ceb4804a49399e2e0a61
SHA5122542d874a9345eac85816cd0cd03708a4140d9b332e958e41ec20cbf30d9909ce7b6afdcff31734437be66dd65b4476de1fd516021d8ae91ea20ca670ab618d9
-
Filesize
1KB
MD521a363142d1dbe1f263307bcfc55d675
SHA111c5caa1db0e16d04816cf0cf017f8cc0a7bdf3c
SHA256131964767562be9cd27ae919ecf9b9614ec05d8458bb200b159e51117036ef15
SHA512d3e525105e6989ee7bffc9fc88e2e397c7dfe8f02cd4b019d529a396e7d28cb4f14a35cd1aaf6fa67c0e3006033884c9adebbd1e14e121bd2bf272fd25543397
-
Filesize
2KB
MD5f8eb92623f594020cc8405a8f10f81e1
SHA1bc1975abd512b5957524a82e6b31e852535a9a29
SHA256cee010e159969846ba09d26f4968e4222b4ec58614e790a560a5f2ea3765391b
SHA512cec86d981fb5daa392dc15ac48169aeebdb914832e577ba5cab1354a3e784865638b740b55c17d6492cd72036d5f16836169a96e7e196fc0f533d20b501b1dd6
-
Filesize
5KB
MD57cd905794d9bd66a4873461b8d7bb9cd
SHA1f4525c20b5a75656e571a1b5786bee254771025d
SHA256b0924008230cb92139d2807f5919f544c238a604b27c4a5ce09b300281cd6b71
SHA5123df30ad7e54ffa56c4ae0a4ab1fe4de4d0e4ddacb0dc934a6f97436c54a0ffb36621fdfa13ee7df25d2edb812403dd4c561d9a90bf65b43b468de647862e8317
-
Filesize
3KB
MD58e6fc05b2c3656c2d5e84ed95e97aaeb
SHA110dcd181cc0f09ce506f2e75f7c7583f904af6ad
SHA25691289c0211611c8a0006ca5d69adf3388de9dae1857028b499d342a56b4a0fd5
SHA51283642ef380a16b52ffb79855f2ad986b1058514ccd70edb4a402ba3f975e86e0952c7c6b7cbca698ede1fd77a011f8a16456fb6408ebe0351049196c2166937c
-
Filesize
4KB
MD5b5fa90d5d587740b6c9eb5ed951012a6
SHA1730ff45dd81853a820eaa07c006a2c3a4317302e
SHA256f9b854b19f283c8e0164087247e3e8e56475b80aba82f3049f812dbaf4ab8ab7
SHA51210f2a639e34c15392e18add74647a8834694b85af265bf8171e66fcbc3462b83c638fe40b49bd2d61278364f76bfcb366fc59959f4508a2f9557b3d733968515
-
Filesize
1KB
MD5cc0cc4e440ada1aca8ec7e6cc4c50fa8
SHA15ac102c78644f8bbe21e9d539e5d38493b326155
SHA256be05d885c2fd09b6fe1d19357bbb0bde278fd8eb5f7902345da93b1723acc7eb
SHA512f96e5021933cc9ccf4f5dd78bd92791ef2a04f006c1253e0e13072b3df62445e3da8b764891090e5ea61ed1a579a6294e53e0dbfeefc754e575ca22f1f311864
-
Filesize
2KB
MD5bd907d0d5916fc46395d8ed03a7093bc
SHA1a505eec6726b4c1f6176b80035ac7e662bf3d69c
SHA2560331612ef3555ea5ba849de018d3f3f9aced8742c71f237eaa926fdc04da8c99
SHA5127d5df02a4fb56647175a54d104f6bdbefd818549f310fca895fe26525a946a86856abf55ee23e7ea215242794ed1c8de8ffcf0488815c791296b8bd9be409f25
-
Filesize
3KB
MD5ae1fcaabe7682f0848f0d1c310e92d03
SHA116d551bd4c444d38eb74a631eded07e4fa048bd1
SHA256cbaf568ef68fb3d3bb8d5cd68bcb2fe5ac007258b3889b3598b1d62dc986ea69
SHA512f917cda135feee68e176cfbc8c56354a54d6fc64c715fb7fda7e003e26b44c6aca8ed2ba3f1163ab527ff9b1e8d757826f0c0049eee2f1319365c2f65a7f8d24
-
Filesize
4KB
MD53df65dbe037686acd2a46f1239ca49cd
SHA16a5c4c0a9eb5fa3ab29f4fca4b1d1a559150d646
SHA25606b23c0bcdfcbad9d45e98edd89f04a82796aa7576308aee8a4fda9e862b43c5
SHA5129ff7b49b6e90c5f8e7780d6c89e7cb40e4c1ab1a255ea3fc513dd2d8471e23922eea39f973aa79bfb56eb07e6b2dfd7308bb5435e510ce973c7811dc826f2f8f
-
Filesize
152B
MD5fa070c9c9ab8d902ee4f3342d217275f
SHA1ac69818312a7eba53586295c5b04eefeb5c73903
SHA256245b396ed1accfae337f770d3757c932bc30a8fc8dd133b5cefe82242760c2c7
SHA512df92ca6d405d603ef5f07dbf9516d9e11e1fdc13610bb59e6d4712e55dd661f756c8515fc2c359c1db6b8b126e7f5a15886e643d93c012ef34a11041e02cc0dc
-
Filesize
312KB
MD5a9bd55585b585ad60c86763c3a7f5a9b
SHA13775954c0d30da7e1d841b687953b2b9b0cb380c
SHA2565034731ef34279d5dfcbf2c572ad0d6e625595a4a59bc129ba02efd36662c5f2
SHA5125338643c659264f733ebc7224216ca8ae371bcb17ac7d8e6011c9d10c604717bd57468de7348db91a8e19ed7cad85c2f058b613ea85ef7abd2c8c8d998515933
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5cd5a6abf53b16f0e28cc5718e3fe1f9e
SHA193f8f32f2432bd7b6ed6aced6a3417d156ea33ba
SHA256110c749fafb129f3965c817b84e263457d7f5fe080324b115c969459d42d4877
SHA512e7e484d076ca3d5ddb2842711fa7e24ca4731363b100de3804ce40289599c37d0b26343e186f1fea4c58823cda11ea7e3a6035672e93fc89ad138c209abece60
-
Filesize
5KB
MD56b442fcc7eb7fde1d2249e919602527d
SHA1e47d036b5d6b775d010ab2a57e89c9f65eecb933
SHA25678a2cec319dee87991da0dc5f59d75d722e803de8a0a76cb9ef60dca3d0f54d8
SHA512c77fa3875b0732b45d9c797b4445f7de8ffa25baeeede019987514c90a19cad2ea8bd3e6d1a6e4887d38f99168064af0eee4f0e182eec4991eee1e4cdaf96849
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD52ef3a198b6ef2a37ad084f1c08689c9a
SHA19b1e8db9748f620108798327712524c3f4b0c6da
SHA2563dc335d11ef96073ed43970f98e22f75199295f729a9d99fad767e1be58c566e
SHA51234b0839390032cda5766f77b70f85e7c7a1939d06e4479fa75e7448be5e1d6b0a300588ec78df0f992844627cdb0228429266bde276ee580e069bcc54b3bfb8f
-
Filesize
8KB
MD5766fcc52c0e9cf85fe1677cab1f66cfb
SHA1ffe1a24fbdb6128e11ce73e617e3fb4d0e477f82
SHA256a8a50975e4ff4fdfbe51dd45d9b0ac187f2eece4fadc0a8f9ea8035ac918182c
SHA5123bc614a798dd17da7ba183045c8d156298735b0dc14f0325f57c8b9f26e5f646715128da67d91009a07cfbfa2decc9275c6a996cf79d4346319b311764aed90f
-
Filesize
7KB
MD5db770edef1d0dbc4f0e7f0bb051a44f6
SHA1378e85adcdf8b66714b271634f4554dfa400eb04
SHA2561493b276364c747a74315292f2d19767821245a53ed17dc4df178270867dc690
SHA51286225ae6c75b1ca020fb8430094934392350cc8ad384b192761e8e28f443b0954cf676fb3c9713498e534484d2782d415397afd4058d58fd832fd2adac253db9
-
Filesize
5KB
MD5147ba67b35118fbac19740fe65f4d2c6
SHA159445f53022c00efce74e17329036a7ad17bd835
SHA256c3c808da4a3bb929d8985d1573482d171b219a00d974338304cd4f1767baad8a
SHA51214fb46f75243c49131ffe95620bd5636700cba6787e8776dff2c84552c34dc3c32169d11fd24bd83e59cc2cbd1ec36076d50f25248a89b56d15c16cf1d4c2435
-
Filesize
6KB
MD5cedf91c42f76524ccc13fba0cdb34f8b
SHA14966aa9014c2b5b91e9a02836c30ab0fe0a9241c
SHA2561a3923b1684fafcd871d8566e45766540f1f086629dff5180ff20799a18a0d55
SHA5128c6110aab9bc507dcea1abcfff16175ae5fa0c0026283b169902378907c5b836858867bc1d2f4d3769b13e3813e89ead68dfbfe430ae3d3c098d3d961564e744
-
Filesize
7KB
MD55d730f4379963a63593145f74c742e9b
SHA1f47385ad288a3ea310f115a92143df8a74a700f6
SHA256efd306703a946aa37114fccbf33b67a14927d14bf60230789f514b11de00d907
SHA5127baac42e59621e9a91ae7ccd603d31eb89143de379820e334fca5bcf39c75e2bf17721c8480f378ee65f4aef225825feb0137b4c1175ec7f8ea9e5eb85fecc25
-
Filesize
9KB
MD598a37eb5ec12e613ce32069c2458ea32
SHA1d22b678b22808275cdeed4a9d278018eb6a974f2
SHA2560fd3647d0ed1ffde2e68ef17517860f56b34bfba40fa8ddb24392b25a994cc8a
SHA51290b4cdfaa0631e4badeb6080dfe8d398f5d5e17062c07e3a976ab7fcd9bd0f9bb2a7a0892ecff953785f36f537852ce0b78fd203b9c45e186ab952e77e70eae7
-
Filesize
24KB
MD5917dedf44ae3675e549e7b7ffc2c8ccd
SHA1b7604eb16f0366e698943afbcf0c070d197271c0
SHA2569692162e8a88be0977395cc0704fe882b9a39b78bdfc9d579a8c961e15347a37
SHA5129628f7857eb88f8dceac00ffdcba2ed822fb9ebdada95e54224a0afc50bccd3e3d20c5abadbd20f61eba51dbf71c5c745b29309122d88b5cc6752a1dfc3be053
-
Filesize
2KB
MD54e32df1ea935bbd6da953a7e6560a971
SHA1f5626b885782e2ef5b09787fc3a62da70631ad6e
SHA256e75f70f87a7a9aa078891d24c71bbd2e2096054ee0aa34b83deb3372b061f4ee
SHA512f7dd58da3855e0ad16932c13834168d619328b02f4de780687c49722985328a37d74a81f8c534889bc6d48350855c9fe55cbdf7677738e02f7f00881311a0143
-
Filesize
1KB
MD5f3121c51c539624aa237f707b9bcfda6
SHA136bf1bd13ea8b22a13bfb8a391b7fc5541db1ee0
SHA25636ecf8b9aacde55e8f37cb9b10a2e6c9591735c0be569b2d509a5efc2e2ca300
SHA5126977deaf6fc62e0c6bcc491c278efbcc262e1f1fb9f80edb0f984b9b50deb688c118660e8c30268750e6b7220d707faacffbe24752277055a7bb55d77bd9fec1
-
Filesize
2KB
MD59b40d0dbb53be1879cc7a13b4c1e5e29
SHA161d49ef8e6a648781b1cb284c2e62684750a3e50
SHA25691b284d648231d1b74f09fd47ceb1cb653a789a01412ea4647f6f0d166aa5e3c
SHA51200f63b2ca6388f72dc9bbebe090e1b917edc38e6af5b2e5c402edc9a9fff9d583dc50451905e62fdb1b83853ce4674ddaea688ef7b0b3acbd68c4268102935f0
-
Filesize
1KB
MD5f96d2ab093a81335241831e4d56a4220
SHA160a9d64c040f34b4ebd42e8476c465b42cc19771
SHA2564048069ba09c4fed52fbae239c17f495decf06d82a7002ccce2d75b52780966e
SHA51257b70b14238405ab14c559490d08a781f1cfa9203db1887b321a2e94913541affde59488c61b2f2b36f0a22d1f143a779729e424f7957a8f449ed1f0d947b1fa
-
Filesize
2KB
MD578686ccd046b60c95faceabfd89c4e66
SHA1291abfdeb55f194fac04c7d808afe891276fffbb
SHA2564461aa87cb0478aba958a352d1e64f11e046cd3e1f98c7ff074d814c7cd32099
SHA512a43e21a35a592ae6d369d77a89b39dae672d56f20b3d8221649ca45780a5ee9c34ec6059652d8c09eb62394132d41251ae53ddb3a70dbb56d5fb1e449fbce928
-
Filesize
704B
MD57dd97c353e603809d12e3da71a305bee
SHA1b6bafb5d2d3da9e1bb8838943885069c5997aba1
SHA256a6985056c37341789f59a65cf9e1ddc0e0056a9f83c8db843489cda227ea02ef
SHA512c789333bf4d8eacb43bb41d7d943a23a3453d70054f28c0ddecbf14a0cf6b5def6fd7667b7709068bfe89ea1e0f663f8cd7e3e26d78478b14c83c4c7e5ef25d2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD527905d393b0f224e2f432d00d932ff33
SHA19e70a44e2f2f47e1f8ebc058d8f84d01ff7da862
SHA256eea7dd6146e54a971d85f6fa6eff06f6747324538d1d0c8f70995a9367688a2b
SHA51268389d13d65ee062e62751575221dca8c8ea545150a7c6d64ab1d0e795180b46672d4591cf5c61c81f5ea8794447fc8a143e4797bd6373462f59250e328a4a1f
-
Filesize
10KB
MD5c715370e416af366916b43c74dff9df8
SHA13ccf30fc5a1404cb6494b3de53c6e6bb05f008ec
SHA2566ca85cfd3e91f40aae25cf6d0bad98bd659efa4975e317c303e081579d477987
SHA5120de26588bf1d635b9493dfc651109e8b4fe59a834d9517f479f93532164caef6d042f4e524678a9c3c9d2dce5a30421a9b1d867a2ed451683cd16855ef39e1e0
-
Filesize
2.4MB
MD5e92382e9b84178abb264ce8190d81735
SHA15329bdb960415e858ed447942ff30f403de229bf
SHA256b80eaebde3ac4db0df2e94bf66d7c075dfde5d0d29748926f7a006769443844e
SHA5127b9590595825c72056cbc099bc1f73ac3cc3265ce4d14fc54533451d27e9e05fb76820b55cbef1b14c9787649fa39c1139c7a8b7801b0e2bfe7e123fe1d51e91
-
Filesize
128KB
MD5f1f21be822c2e22934c88478dda2fd74
SHA18bd1625264a1b64e34e3f7d7c651b87ec593fad1
SHA2565f3223dbfd67dc3ba0e0a3c23f5294258251272e06a66fdee6416dacc160fad4
SHA51279d27aebc1604aed9138d729e86acae0b176249ed4e2f7ea1b34795c9b8ca89868b1d3b8b673558b81b0601af8b6de4404e72ae4bd5ba78492e394133a243681
-
Filesize
47KB
MD54cfff8dc30d353cd3d215fd3a5dbac24
SHA10f4f73f0dddc75f3506e026ef53c45c6fafbc87e
SHA2560c430e56d69435d8ab31cbb5916a73a47d11ef65b37d289ee7d11130adf25856
SHA5129d616f19c2496be6e89b855c41befc0235e3ce949d2b2ae7719c823f10be7fe0809bddfd93e28735b36271083dd802ae349b3ab7b60179b269d4a18c6cef4139
-
Filesize
2.2MB
MD5a2448f6a48d46b733107cbafdc9b8f76
SHA18b6c0cc750e90c9b7d72cde1ac73afccf6a26841
SHA2561571fdae6352d203d4c236831d94783682ad8944c90e4dfd85bfeee49973c9e2
SHA512f5904712dd555983e1ef6ed23882f0b27dd9384f1903db88dbd2795e1daca09316d0c74e0ce9d65ec13463e5c599ffe1a21f160aa6637c51722342bcbdfec8f6
-
Filesize
2.1MB
MD5091c8016ae01f3685aa5b287f05df6d3
SHA16cea0eea1046d85fb45ccf3a35b4d9e3ec146728
SHA2562fe77426a2f6c69b5f3f012c1e95766864ca277fadf6baa2f714d1d1f7ad34e4
SHA5123aab69fd9218028cebde5762dd11dd2265e1e6c234ac083a6e7286b8d861e2bf8ef3cd3b58b8756f6596c1b9666cdf7f7d9cdc86a7149fd85d249a698c5965a1
-
Filesize
1.8MB
MD5491935babd12eb08bbd654ce19fc6608
SHA1a0f25d0989e8c7c49b3c691d38eca8ee4c5c2688
SHA256201cc36c88fd8e71d22b4d08fd8124fed491cb0869252bad271c5611895c1f84
SHA51254bcdfa163203ba684f71720ca45bd09ac1f26b36063a18f697472ef3534a64f28680809a40c02f648a3a8947fcdfab6c292cea2a92247e3c05a44e6e1a9a85e
-
Filesize
499KB
MD5cd9c77bc5840af008799985f397fe1c3
SHA19b526687a23b737cc9468570fa17378109e94071
SHA25626d7704b540df18e2bccd224df677061ffb9f03cab5b3c191055a84bf43a9085
SHA512de82bd3cbfb66a2ea0cc79e19407b569355ac43bf37eecf15c9ec0693df31ee480ee0be8e7e11cc3136c2df9e7ef775bf9918fe478967eee14304343042a7872
-
Filesize
4.5MB
MD5cda8beba9ddd89d8eb58757895b1c109
SHA154f5b59c66d85883f80c48d85c43c3815e2b8727
SHA256c3d7a28c43978074c8fe609ce8e8174baefbc444271b87850db2e52f4c9e18e1
SHA512b30c773a9e850a622a8e08df9952b1ca2fc5197f66e7bd19147460cfccf5533b8fde88a10fc06984aaf8f4442acd36dbe68ce83dc2dffbbd314db04d7511bdfb
-
Filesize
512KB
MD5941dcd3eb5c7f13fa640439c8cbfb24d
SHA1065908846f6b06aeeeb9f62d806fec5b9c2dac9f
SHA256b3e6e052f527f0d454ba75b5f1c393754e7107d6d09d792440e78881519604d3
SHA5127fbd0fcaddc631ae490927f707cd83d8e6f7cc69d951ebacee563292bfb521eb1191f49e94837ae69a0db69d867f2149a110e70f261d252cc17fcc2146bbf699
-
Filesize
1.1MB
MD5bb7cf61c4e671ff05649bda83b85fa3d
SHA1db3fdeaf7132448d2a31a5899832a20973677f19
SHA2569d04462e854ef49bcd6059767248a635912ce0f593521a7cc8af938e6a027534
SHA51263798024e1e22975d1be1e8bff828040d046d63df29f07d6161c868526d5f08451e44b5fa60bfb0c22cf7880abc03aaedafa2c5c844c3aeff640e6fac9586aab
-
Filesize
3KB
MD5b4faf654de4284a89eaf7d073e4e1e63
SHA18efcfd1ca648e942cbffd27af429784b7fcf514b
SHA256c0948b2ec36a69f82c08935fac4b212238b6792694f009b93b4bdb478c4f26e3
SHA512eef31e332be859cf2a64c928bf3b96442f36fe51f1a372c5628264a0d4b2fc7b3e670323c8fb5ffa72db995b8924da2555198e7de7b4f549d9e0f9e6dbb6b388
-
Filesize
24KB
MD5640bff73a5f8e37b202d911e4749b2e9
SHA19588dd7561ab7de3bca392b084bec91f3521c879
SHA256c1e568e25ec111184deb1b87cfda4bfec529b1abeab39b66539d998012f33502
SHA51239c6c358e2b480c8cbebcc1da683924c8092fb2947f2da4a8df1b0dc1fdda61003d91d12232a436ec88ff4e0995b7f6ee8c6efbdca935eaa984001f7a72fea0a
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
Filesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
Filesize
8KB
MD5f5bf81a102de52a4add21b8a367e54e0
SHA1cf1e76ffe4a3ecd4dad453112afd33624f16751c
SHA25653be5716ad80945cb99681d5dbda60492f5dfb206fbfdb776b769b3eeb18d2c2
SHA5126e280a75f706474ad31b2ce770fa34f54cb598528fac4477c466200a608b79c0f9b84011545595d9ba94331ad08e2f51bd42de91f92379db27686a28ba351256
-
Filesize
6.2MB
MD53a82b902d01c25fcb70cf0324e5f10fd
SHA132cb27fb7f1042024d55a0229420acaf400d2afd
SHA256000065841787452842ed45b2284c588eda069f24f4e99db9c6a0035ce402b682
SHA5126e7384e325a06a1504c3cb68c8574eac3a6b9156bffc56a8cf2448ac8e31fe1feb7f18bde790430e9797e258b52df3479d5978119ff9fda506a77aa415677732
-
Filesize
2.0MB
MD5e28180929ce8c585d05f42c8c71ac568
SHA15a624eecd77cf605f418feceeef07f73d782c89f
SHA256a22d42791ef2025faa83f5f2752539342bf6bdf1665f28b1a4bc76f4a64e69d9
SHA5129e884f3f3950413388a4e139850a906cdfc347018dda3febeac8d45c09d9e389ca85086b1b247d9fe692ccf22d03302933d3f11d02f498ec7d602fd271341c2d
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
191KB
MD52b33abac5a307e98b2f54caa3c50a092
SHA1910fb9173c63e90c2e7619b9cca81a60506f1415
SHA25638e6089a661efdffdbb7923b1de2883f3a7957a64118fba6d4cf26dd2725360e
SHA512f653b48e384562620c95e4db677746387841a97798247d40404d9ee5f116f1027814dfcd9d8cf2d29f01f14bd0f501ee6b97ecf44ed1d78c45b1c9dd61bf3b73
-
Filesize
2.1MB
MD5be4fef2e54fcadc8b284c41b917aab49
SHA11c0dc810e78d28618ce4bb0da0955a324957590b
SHA256fada537b01fe4cbd9e58deb5c6907fe7c498b572ba150f4031605e934690828e
SHA5129254ed54828ef9e967d1001bcde8b49bb9f745dc95f49bbd1c09a52b8f95090aa77211d213eb69e36ee1295c45bdd414189e668dfef323d7139e5fde6cbf64cc