Analysis
-
max time kernel
118s -
max time network
209s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 18:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://disk.yandex.ru/d/hjjLCu-UFuJDcw
Resource
win7-20240221-en
General
-
Target
https://disk.yandex.ru/d/hjjLCu-UFuJDcw
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 564 WARFALCHECKER_Installer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = f063d825716ada01 iexplore.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage\disk.yandex.ru\ = "27" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage\yandex.ru\Total = "48" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4FF15DE1-D664-11EE-B708-6EAD7206CC74} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "12" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage\yandex.ru\Total = "27" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage\disk.yandex.ru\ = "404" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage\yandex.ru IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage\disk.yandex.ru\ = "12" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage\yandex.ru\Total = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage\yandex.ru\Total = "404" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage\disk.yandex.ru\ = "48" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage\yandex.ru\Total = "62" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage\disk.yandex.ru IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage\disk.yandex.ru\ = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage\yandex.ru\Total = "12" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "9" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0655027716ada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "62" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c2306770000000002000000000010660000000100002000000003c336e2bf64ce1081b11cf1df16f76002a411feeb9e41e134264a5a27ce8d65000000000e8000000002000020000000d57ee7f1fb06dd5903bbe4f1f519623020332c302986acee6be2120e60fc51be200000001139367f1e71778ba42ed7ca753760eb893c1af6053233578b1206d0c587e5314000000077733d32c164f9085bf1ef0a15331a97b3175debe84520856fb4adc0ae3787d4d8faf01631ebcba6fbe53027a876129ac1496190f48a8bccae5d85ecc5d00c34 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage\disk.yandex.ru\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "90" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "404" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\DownloadWindowPlacement = 2c0000000000000000000000ffffffffffffffffffffffffffffffff100100003d000000900300001d020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "27" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "48" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage\yandex.ru\Total = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage\disk.yandex.ru\ = "90" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DOMStorage\yandex.ru\Total = "90" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415305551" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2176 chrome.exe 2176 chrome.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 564 WARFALCHECKER_Installer.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2472 2860 iexplore.exe 28 PID 2860 wrote to memory of 2472 2860 iexplore.exe 28 PID 2860 wrote to memory of 2472 2860 iexplore.exe 28 PID 2860 wrote to memory of 2472 2860 iexplore.exe 28 PID 2860 wrote to memory of 564 2860 iexplore.exe 32 PID 2860 wrote to memory of 564 2860 iexplore.exe 32 PID 2860 wrote to memory of 564 2860 iexplore.exe 32 PID 2860 wrote to memory of 564 2860 iexplore.exe 32 PID 2860 wrote to memory of 564 2860 iexplore.exe 32 PID 2860 wrote to memory of 564 2860 iexplore.exe 32 PID 2860 wrote to memory of 564 2860 iexplore.exe 32 PID 2176 wrote to memory of 2780 2176 chrome.exe 34 PID 2176 wrote to memory of 2780 2176 chrome.exe 34 PID 2176 wrote to memory of 2780 2176 chrome.exe 34 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2768 2176 chrome.exe 36 PID 2176 wrote to memory of 2388 2176 chrome.exe 37 PID 2176 wrote to memory of 2388 2176 chrome.exe 37 PID 2176 wrote to memory of 2388 2176 chrome.exe 37 PID 2176 wrote to memory of 2412 2176 chrome.exe 38 PID 2176 wrote to memory of 2412 2176 chrome.exe 38 PID 2176 wrote to memory of 2412 2176 chrome.exe 38 PID 2176 wrote to memory of 2412 2176 chrome.exe 38 PID 2176 wrote to memory of 2412 2176 chrome.exe 38 PID 2176 wrote to memory of 2412 2176 chrome.exe 38 PID 2176 wrote to memory of 2412 2176 chrome.exe 38 PID 2176 wrote to memory of 2412 2176 chrome.exe 38 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://disk.yandex.ru/d/hjjLCu-UFuJDcw1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2472
-
-
C:\Users\Admin\Downloads\WARFALCHECKER_Installer.exe"C:\Users\Admin\Downloads\WARFALCHECKER_Installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6ef9758,0x7fef6ef9768,0x7fef6ef97782⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1196 --field-trial-handle=1268,i,8796330365060396476,14794846045898390971,131072 /prefetch:22⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1572 --field-trial-handle=1268,i,8796330365060396476,14794846045898390971,131072 /prefetch:82⤵PID:2388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1632 --field-trial-handle=1268,i,8796330365060396476,14794846045898390971,131072 /prefetch:82⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2292 --field-trial-handle=1268,i,8796330365060396476,14794846045898390971,131072 /prefetch:12⤵PID:2360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2300 --field-trial-handle=1268,i,8796330365060396476,14794846045898390971,131072 /prefetch:12⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1056 --field-trial-handle=1268,i,8796330365060396476,14794846045898390971,131072 /prefetch:22⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1052 --field-trial-handle=1268,i,8796330365060396476,14794846045898390971,131072 /prefetch:12⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3656 --field-trial-handle=1268,i,8796330365060396476,14794846045898390971,131072 /prefetch:82⤵PID:1176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3860 --field-trial-handle=1268,i,8796330365060396476,14794846045898390971,131072 /prefetch:12⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3728 --field-trial-handle=1268,i,8796330365060396476,14794846045898390971,131072 /prefetch:82⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3720 --field-trial-handle=1268,i,8796330365060396476,14794846045898390971,131072 /prefetch:82⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:652
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:2432
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵PID:2864
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2864.0.1349895600\740402615" -parentBuildID 20221007134813 -prefsHandle 1224 -prefMapHandle 1216 -prefsLen 20749 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bd0cb442-19b1-444d-b661-3922d7b14d1d} 2864 "\\.\pipe\gecko-crash-server-pipe.2864" 1300 10cd7b58 gpu3⤵PID:1496
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2864.1.311789656\2002712723" -parentBuildID 20221007134813 -prefsHandle 1464 -prefMapHandle 1460 -prefsLen 20830 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1c08d433-e641-4965-a265-6059e5d39eba} 2864 "\\.\pipe\gecko-crash-server-pipe.2864" 1492 d6f558 socket3⤵PID:1708
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2864.2.1994288300\1278174362" -childID 1 -isForBrowser -prefsHandle 2080 -prefMapHandle 2076 -prefsLen 20868 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {94c38135-f696-4d0e-90fa-109fe3ceb9d3} 2864 "\\.\pipe\gecko-crash-server-pipe.2864" 2092 10c5a758 tab3⤵PID:2868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2864.3.1960552471\640081099" -childID 2 -isForBrowser -prefsHandle 2380 -prefMapHandle 2412 -prefsLen 26111 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b7044c0c-7f21-4856-bd2b-fdc8c6998769} 2864 "\\.\pipe\gecko-crash-server-pipe.2864" 2552 d69058 tab3⤵PID:1652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2864.4.1921624990\45035495" -childID 3 -isForBrowser -prefsHandle 2836 -prefMapHandle 2832 -prefsLen 26111 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {94c536f2-ab25-42a9-a3a5-e7945b16f1f0} 2864 "\\.\pipe\gecko-crash-server-pipe.2864" 2856 1bccb458 tab3⤵PID:2820
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2864.5.1745005409\109024954" -childID 4 -isForBrowser -prefsHandle 3312 -prefMapHandle 3732 -prefsLen 26170 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {746b1a3d-c97d-4c52-953d-56ffb6077f01} 2864 "\\.\pipe\gecko-crash-server-pipe.2864" 3772 1dead558 tab3⤵PID:1740
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2864.6.804049465\609682538" -childID 5 -isForBrowser -prefsHandle 3892 -prefMapHandle 3912 -prefsLen 26170 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3adda851-6a26-4458-a437-3b2e0090c767} 2864 "\\.\pipe\gecko-crash-server-pipe.2864" 3772 1e4fa458 tab3⤵PID:2436
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2864.7.1239118605\984897436" -childID 6 -isForBrowser -prefsHandle 4076 -prefMapHandle 4080 -prefsLen 26170 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {488edcb1-fbeb-4f18-9445-3de8805a7a8f} 2864 "\\.\pipe\gecko-crash-server-pipe.2864" 4068 1eda4258 tab3⤵PID:2916
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2864.8.1922722598\2021586770" -childID 7 -isForBrowser -prefsHandle 1916 -prefMapHandle 1116 -prefsLen 26251 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e31d5cb6-573d-4549-b2f6-f40836289d24} 2864 "\\.\pipe\gecko-crash-server-pipe.2864" 1848 1a110258 tab3⤵PID:3040
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5302561088bcf6e93236d142ff3bf7ae2
SHA1b592de788bd2e5af263ab27900e4737dd75a89fa
SHA256a8a8effbed81d51f73f1271381d9c5840b6b5c281f33d50a1f8d25e1649b6bd6
SHA5126a282595ac2497615978f9a4683a43ed84ab9a7511ff5db31ebb216fdb68ec636106e28f9f72920802c9f6890437515258ce3ec1ef78f0c876ca6c1843ff5c17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7f5d4701f123a0a680a73e5badfb0af
SHA183b01d1dbfc7982c72089b22be81e6c67440eb62
SHA256ce4bd7876cef162aca294ae078e3a0fc8ef74e00c0b0cd69ce22129a38d27477
SHA512cfab5a075302255d832817241e350fcd1c665cf60385d8be9668d47e307d61107707ee0ffc330708bae30dfa728b73471d15c2675e4d0bd4d4572d18087636f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3cb24491d45620dc5327bf06e4b9a9c
SHA11e6b5203020d9fa43c15548200085ada01403ba5
SHA2567ed1627ac020274c0905360fb429a61a675b9e31213e0b61d5cea53f13ad6c1a
SHA5120202d9384599c28fec80e68e2a6597f627263ce4f1a93cfbcb377d1f23d83314a6f02716d45edaae1b69cb78a3dd9c6cda1830d767bc66b9098a27f8b1828cb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58326142680ceb6c2355a2bf2e3dfe4a8
SHA14284ba9719cce8b04d9d164cdee9c954096513ac
SHA256ba3d0c3a71d6362b9da888e5d73bf3195441dd7d96e3be631509d337927a7a05
SHA512d94b4559aeac78c4b05dd5d4dc207bd3852ac739c6c52096dd075376bc693e3487935451e8ea58481159efafbdadf4618273f870983155932b52ca3cd9d38f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b92d452af8489cd3eeaea19666df8f6
SHA171afc90b7653429ce6bc01c6f0b09605ae582b34
SHA256eeaa91b8783d7eba4d4c76df7086123635868246b53cbbff08b1b76e23c7cec2
SHA5124a824a0104749b9edfd70f28ad2f03e22ccce366c3f81aea373760460d122b9c3698184221b2fc42eaedadfab8a2e52efd484cd20a41086e32a9f0f1818c048b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5521d4a20aa0c575e4bfd82fd45407510
SHA1e4add3c2a25fa5e638b3ade21d8fdc70fb9990f8
SHA256db0e3b4f6f51b20c4298e3a188361f24dd0b33aaa3d37c1309e2459dcf8d74ad
SHA512b5e22cddbbb81acb7bc203f27ea2b592bed606d73ad02a0d084a4f2ff2e56a0b11ae7dd2aa0e31d7dcb882eeeea0647692088a642b6a723a3b5d89b486b835d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbc1f447d4260d6e6d5b34f76510af6d
SHA1c52288d269a3a5abda3f4820bc41da66059d206c
SHA256ccc816070c1be50693812543873be32a5f7ed496d6ae287ad89125f27ac9c43a
SHA512e60a5c1690d9cf0ea41fa53af35f25f169dba5284a50d4ce058e998ffb50a5fdaaf3ed244f87924a3ba6c1f2376897d982055ed4772ae00d180fc4a9ded5b383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8764cf6e6278628295151a76ee3010e
SHA17b2735fb24d93cc850acb03b9415b5d375ff4149
SHA2564740deed8de6b0abcfc0d15adc77709c119c2872d2526d0a12911f7553163e3f
SHA51293bbdd93152c6debf90a9a08d4fb01aee89685be9357ec5863f42b2bd7ec5060bc616c9e852b265f9233563926c649ddcb8fb085a1016f04de6740185f68c0c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550edc7cf8fa62025749361160c521dbe
SHA1743c167db5ce08ac5785b440aad16c4134c78e99
SHA25634e50e7aca710a843f86d601508ea82e5375414c5d4bd3aa6aeb96bdf9295d6c
SHA512f1bf8bdce67cc8d6c19fa7dddf8ebdf6f9b04deadc7f5d27976a02758ceb02d49b61ed7d3cc5785f6d04fc5aae4b4cb5104c8cc7d582d154be72caf21bfeea8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db98cfd10ba65e0fbfcd0818af7d650d
SHA18e3fe344a441d63e8db3ec5f1f41be3e371bdc94
SHA25683c78f669858e7ef501d647a7842161b19fed0270014edcc2be96cb55473f6e0
SHA5120f757ca7aa56fac10cf516553c1cfd23b1752e914b217f179de469199492bd0a2714380b41adfca4d6e9c64d02a6de87035eb98e7ba419d219f6f47ca8113ae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542ba8da75a6c63e73e71805898a79683
SHA18a9b25e80ad90347d97bfdbdfd174b44ee37a9cb
SHA2568cc6bcc6c383ef36ade9aef7384e618847204aca6f211dd106b10461b4d652ce
SHA512575df12f3bd53f6d4c4c1274275301e3fd0f6b15ad9f0052e228671ab08f85c54ead58fe187a01b6bb3d3535c8c56793dcedc17cd203c38bb8ff7f4d687515c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5001db21817f94242bf460bc4ade3d13b
SHA12a72d617467366b6fa13263e1ad6fcced72e1dce
SHA25695c762089b58236881e4650583ebe8ece20aa6cb2ea63e07ef46fb586169feab
SHA51226a0e4998e16765f81363d13dc882420bfe19e860abfb5a265bffff85bfbb49bd303a011d8c7c786c76deb3017601c12c20ffb9895cc221200614799b585ff49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a189973fe207f874bbbe680e15c4511
SHA138bb1dad8ff2e7f33c7a4330bb4418f87f35d04b
SHA256426273e745c6a80cc291946e5b95cd91a147bbefd5485ddd0606c5e1c8ae7a18
SHA5120b65c1c39508fd750c182f0997a26d72386aec476adfb53f9d26c5080d447fcbafabb3efe203072c26ba72ec9381e603d907e4b1570f62e9fcb84525fa395f78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a6558ca824e7cb1c4b44a73292270d0
SHA182fdc52854c4161be24e168c900d5d7a270cc5d0
SHA2564c624d01cb8c086f75f1050950e10c03cdab92008039ce32d34f252651c8f21a
SHA5126aa15354493230494513279fcc96ed591f79c385ffdcf68725b44ab6ec1a7c610408e87691325c61334f8836ee9c6dfec293941db9331a2165fd3f1e5c750650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595915bb897a702d39439c0786b79e272
SHA187d11beb3446b0769ab07e55fa0db061a34c05f9
SHA256f45c2811fcb0c1e8b4afe82c5b0793aea98f7b55a401dc9ac63aa6e5363a1209
SHA512520ebd511dd059e2d48ebff7eb2d8563a267972e3d4bd7cd3a241a159f4e8555e40d11cf7dceb5cbb1a62f2992c37a8e6fda552935e7206c7d1f262c77a040d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7e54dfc47b39e8b825a9f629569bbec
SHA1c10edb1836f109b455b7f47c729fe4e468ee6aea
SHA256e99005a469ecb295770e3480d8c234da15c7afc686c1b55c83080cbe51202a7a
SHA512654e4771b6902f558bf2fad8d7902ef350651a2fa643e986db601187f784eb094a0ae5d982a6870df6b50b5a582b4d44cbacb2c468d6ac36dad5ebd46c3b2a64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2603763d2a9deee2bd6fb71d556a864
SHA1b2e3b52c62b9fa1402f53a8c4a308edd73a7e5b6
SHA2565b7cd4fcfc65e9f2d7b44e6f7e96c9851baea8ee51c67aa1a8963e6a68c72e4e
SHA5123851f388e5ccb5f99f257b911b9d95a4f45fb72756f56dceb16015c43e4b4b2c29caf326e0a759b224ab46c98f7c14b8e28dd816a62a15610a30b9acae51313c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573db67e8267e0a46df1b71a639f9ec35
SHA12cda1c4fb92bca97b3a32831970bce51d5af7d80
SHA256738b2de87ec1cc9aced2e288462f015dd1001028a555a415a10f705874d1861b
SHA512df7532b0d543474eda31ea2b1c85ae39468d2cc8955b6992ca9f7fdcb1dc1fc9377bcee620f0a5319eadc2d284a18d93a0ae2edb9fedeb144ff8618b212493b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfe93e7d8306cc6ee829243ff0813ef1
SHA1b856c1e6b2a8f211c575151559552ea32a904a04
SHA256692a72f4247ed41289924c6afe13c61ab486b64e636300b98bf39c2e4acce28e
SHA512eee78a4f7ea10f79dfce49fb24bce630e5b93a844fd8ea18df00ba79d15cc39214feb5e767aa025672fece3a64c886157a8707915c18ba2e2b0e8b99c2e63f79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507b3298cfaf0b3090425d375da779512
SHA17d74bdb96ed52c665197b55534993a7ee35b4be6
SHA256b11ae9407bbeb0eeaf456d1f41566c5071cc4b8f5a9d87d9a44896e85a3c02cb
SHA512186c61053e0e0240d35a549646e636f52ad3a10d7e585210ed2fbf8d44ce176b601fe87387ac92f555bc9a61b89b5bc6c1f11ac792ebe671daaca86ddafa6956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5703afba91de82653185187f79e56d809
SHA126a48287d6d3af61fb13049b3ee95c617ba3e6b1
SHA256b22d2ba0f084b6e2917a7035d9356901f715f86997b7913dfa9a9d6ba5784ee9
SHA5129ee0a67f93321cf6520b8c0145e5bee7a7fcaf8bffa73cdcbb39a76c59f6c548414962083f7436ec53b41e2577e65d2cb86379cbc36e0cf0cc5def3c568e4b00
-
Filesize
320KB
MD51a6ce6273ed7bb64de0f360c58960a5c
SHA1ec7c196b636c6f8d589837bcc0a05471c9af3f6e
SHA256451e72874be352aa5c902ba09ba00afd951c556be7c61ac0db73bc61b38cee6a
SHA512ffb625e5cb73dd3a7534d5093d0699170422ac844f130d065baa0d8d44979e329176929b5a6b1c669d8d1e027f01bcb4c52ff367d9455147d1a2f3dd1d9e74a6
-
Filesize
195KB
MD5873734b55d4c7d35a177c8318b0caec7
SHA1469b913b09ea5b55e60098c95120cc9b935ddb28
SHA2564ee3aa3dc43cb3ef3f6bfb91ed8214659e9c2600a45bee9728ebbcb6f33b088d
SHA51224f05ed981e994475879ca2221b6948418c4412063b9c07f46b8de581047ddd5d73401562fa9ee54d4ce5f97a6288c54eac5de0ca29b1bb5797bdac5a1b30308
-
Filesize
168B
MD51cebcca9998bf86ae4f4157cf2b3a458
SHA176277a26f2ba7d892fbca5d2e7c4d54516d8d659
SHA256446f97879a7876d3cb1cc26d0ef8f41a2ab271e115b5027a0c783ea2016e29e3
SHA512469cac606ea20fa90a771bfb2b3ba7dd6b67f98abc48bbeb30e9ea7f274d2a8c58d56a3f73990e83cbada33e580f70fce6b7952b2c652a7a9f51d6f793b99299
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD5140c21adffb90108d2d97c3e63d8a663
SHA11f4a650163e0f4d10530f2f8a9e631f53dfe79ab
SHA25619bb595287e04b0b54781ee5d521c10fc3b1177a2a28c73fe90cda1cba32e442
SHA512361bd81df1bf98d9c1b490a60933678a634afc5e3d6c26652c07850f0abbd785c8311c2624d260c2a45fe7adb3a984eea1d5e8695b0965fba316fd848f699c19
-
Filesize
4KB
MD5cc1514a35cff2b533ee37f458f6387d2
SHA14d4459dc0fd4c484ce0f444c7f1ab69659c7ea46
SHA25609a3800cff2e482d3b629f66bea32892da1c700cce529b69bab0b6220b0ac308
SHA512cd205805726be972d960d0ceabae883bb47daef5e7b78cae68a0205ab213e8eb438bbde046c8f1a97408aa9ea3ca9794310edf100ac5735815745ad8117a6f4a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
314KB
MD5c8757542db3ae944c8b1f2c424da2bae
SHA15674995cb79d87e4d5ac6a0cad6221df4ddde130
SHA256c58019b89fd4718c30247e0b0083edd2721dbf29bf6a60ba10be744d02cbfef0
SHA5121891220974951a5d3f1e38eabee6a6af58ae08d22d331626145893fe585e141dc56dab1ad108bbc94744e5b1fc1958f09778bf0a1ae53777a3e0574c83829d98
-
Filesize
131KB
MD5e365a24a2f10bc46df36cedc3dfbfc85
SHA18f5171eced5ab1017d7297cf2e80dc68b056a2d2
SHA25625846191abfc9bde722b4667401fa2dbd73b70f9c452ce389cf369217b0867e7
SHA512825e793e3367d0ccb62fe66c485b0beab80f40fbb934f2e78d30f7397f4a6633f7a8b686021a92c71d4a7d67a8d2d1cfd63f87ce60792882935594901037a902
-
Filesize
258KB
MD54f4986eba8f20f530a33e9869f827816
SHA10a187aac69c3f8a9d8db32fa42625979118098c6
SHA256601fd2c62b87add68a4c5fc101672813f17585b141990b09f12801143a06d054
SHA512f223e564e923ee8be07d9a0e0920014544451c51197b063e312cec58214f74aa55c2fd54258532e3a2c88f850e03c0b2561cc5ad6d7c70416fab4940cdc93241
-
Filesize
413B
MD53aaf518b17f1ea1cb1db01fd2aaff2dd
SHA19006b62083d250f5cc8bd8995a26414d354296ec
SHA2568121c5165886163e13f6f9a4699fe5154801ddd07aede617167065f70ef5d53b
SHA5127bdb4beb379d1c016b1d2809b6a994224bafd61318859ee9e60d161d9848d2cd42ba2af2a16ff85a262abd49ce514f9462ca1e1e057ea64991627577ee36b5f5
-
Filesize
23KB
MD5811c4be0e73f20e75e9a6951f895fe8d
SHA1ef8898aedb33156a10b967fe7f76232b4f16899d
SHA256183081ad0819c5ce6f37ed8577a2400437399085863042f4f79d3e57c32a82d6
SHA5124e1c0de7184e97e0e406a343eee4220cde86ca2a42455d14b8e47a0f132f3f71a1b1b309734e8a64a58b775f797ea79c68b4fa248bc896ff027c0fadeffabc0f
-
Filesize
23KB
MD525fb72f4d31c94826dcdbe1653981151
SHA1d30c7a9a7d65feff7307ae431d80341ebd637ac2
SHA256b9f706e2a3825bac38795813bdd86322dd41d11745a82172cfdbbcfa9ae68fc4
SHA51213475795f0fa3b822fd7aab0ef0ef59e6c5af4ade8162fd8ef3cffdf10f3479e913b7f6f17ce4c47dc38f78bfe64c5b7dbca7b29ff29283c9b6a2bdce4cbaff2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XJ0RD6PK\WARFALCHECKER_Installer[1].exe
Filesize15.4MB
MD5dd617876ecb38c1b24898b65695e3f6a
SHA1ad14cbd0629beebd85e46c4870b3756d16ea11a8
SHA256423e8a53fb9c8f22503b4c795a0c9aaf27fe4dc866983a553180fe83102598e4
SHA5121c04f273294c4d17633b2aeb8bb53bc77b9a8f66023e16ab22a118cef467865fc46440177fd67d02d59b6609076794dfbbad4d46473593bb6be2d253df219ce3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XJ0RD6PK\favicon[1].ico
Filesize32KB
MD5bb797e3d12d7c484b76b807efa2cf3b3
SHA15ef5e20be499b7b92abb8881633425a4188aff17
SHA25644b11bc4be4a9c3f47ca27011c460707a9355deceaae1db98d166caad8d5f527
SHA512b67f34caff4fc24c1543a284b0bd36a31a7a9ebed84c95ef3d953312de3898aeff1754587d3c372e8cc528e4a1d3516a7ba27fee7cb16d3591a86a4eb393b017
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bm46du9w.default-release\cache2\entries\569C61B7C5AF4CF1CD3C872D4AA55B34BC2D473F
Filesize33KB
MD5597e36ba83e798ed9231d0c99ff5e1b7
SHA1a3ad69c31c3b4186fd34e265d38fc14a08cd8965
SHA25622dfa253db6d25d16b54f5f2b0757013de4caf831c3d115f2a12257efcf38307
SHA51263c1a1b7d13e116a89e2e20d1693f124bfe20577060842cd4e8d1aa44ec8e3302edcfe547b628f38cb1dd2d10178f897345568e0873f6eaf8c961ca4bcde77f4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
16KB
MD5315e961f3c3d5a405d2e184b6dc7f26d
SHA1f9d0c468dd1f34f4d650f8fbef215a682925fd2c
SHA25643db36f1201618ff1ca9ae44d0f707287b68e78c5dfcb9d2a7ef09e5e4a4af26
SHA512b801e04c4c2a190fe3cbc3b3b679fc3ee8c8f05035895b94914f15671079ed23727e322142cdc4937393a6be2cf6650bbcd1c959715970e7825bf3eb11d8c39d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bm46du9w.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD54734450647b7f70832ea8448a075695a
SHA1981367152be22d91545c8a9362381986a94a2f8f
SHA256b20f6620ceb8e9d9f020327931cef408434be37207a250bb955e0ccf7af6f45b
SHA512b5e1a8d5fd598bb9cf5fcb431bd7e0119e46f298db4f02d14a293d348541a2f1ae9039477a14b3ae33d46e84c1657ca6b88ef645306be01f31d7f33864f0890d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bm46du9w.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD52d64f83d90533e27d183ac75ae4c3b37
SHA1818eebe00ea6bea13766243c4e10bc3e61e5c5e2
SHA25657249181d20e497da5e29d8cf4f348d831f25d1a95713c9152ec2a9d48dd7d1a
SHA512fc0b8116a7c0ea2499d7ea3de59ae323933261923a7dcb787c0541f0bf63c668a5411abf56444edbeacbbecade9ca71c3118256c890db9f246b3c8dd08c265b0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bm46du9w.default-release\datareporting\glean\pending_pings\1609115c-bb7b-4a67-8352-dc2b43942934
Filesize11KB
MD5097a914b5bfe52e34baa1da9564165d5
SHA197206107212ec37bba04a30abf0fa8572d7feb3d
SHA256cacdf8291c471909db86f2bf738bf8c89e3c407c9106408bb019afbb298b64b3
SHA512e24cf44c6f9e3bea23e56823ec97d9c88b527e4b63b8f955742d6b31475b199d86f0612a3ccc92d1f2477cecbca1eed19f1f0e3f99642cc10a68aa7a05607516
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bm46du9w.default-release\datareporting\glean\pending_pings\651f3b43-ec73-435c-9b98-6e07a393832a
Filesize745B
MD5d891bce75f5039d306eb95e94b59ccac
SHA1ba2d06f30846c76fbb37ad827e267126e623de8b
SHA25692ea6049fd62f81fe8ae47612041375d09d6672a62a5a578229bb5418d655435
SHA512c7e3ace26ab358cc8d63712e734cd52c5e32d3396ac445f6d2cd25319624bcd453b8399926a4967fac20e7bc6d9570dae9d5121882848773b5b28c3fbf31a2b9
-
Filesize
6KB
MD5be9e537a39dee0d4116cd5171074f17c
SHA16e3bb6812942ca016d600001388433bd83c34256
SHA256699083b3ce7d5dc0856bf48c44128394f0d2ef019a7812903f1304f1cdb2a625
SHA51293f9a5500e085daf62e40420bbeab00df4453914c70030f4c4e85791c4cdb01d6edb75a504a4da9759690f9d16b8d83e75c9d3f4f9c0a5ce7ac37eec974226a6
-
Filesize
6KB
MD5faab85505b820ab02b683a2064cbe4a2
SHA13ce760c436c5f8a1b4eca5abc6f4844afc40d469
SHA256a60d8cb4ddf4e33c3d5061e4c60c62f923c3776d85332b2db29edffa3c6a441c
SHA512ec6444c2743bb6705fdde10192da09bb046eb50e5bd5f326ecb3b6358f9ee43f53e699d426d595d6e1a998e6a17355659cda91eed2537a86200f34a8dc267cf7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bm46du9w.default-release\sessionstore-backups\recovery.jsonlz4
Filesize3KB
MD567b1cb591574ca426c193639352a4117
SHA1524253914a5279aa6becbe42c04e656ed301e3d5
SHA256a738c1c4349794d71bc8d93a6c284388357756291bc5bcecd32515432190e093
SHA512d45b5c8838e7707b2c41420dfea43592c31d5340d634fff70b9d04ff9df726c6bd6b31b4f66aae04e38d63ef0144df3b53d2bdff1ad1fa98a424807dde4bb13f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bm46du9w.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD559c0c44170ba6900681df44cde6e3a4b
SHA15cf36c2117a03b42278894ef53a92a83a65755a4
SHA25618678f1e450308076d7043f93129179f1bec67611aa7d42fb314b395a1ccc5a8
SHA512f73264f0daace34070f6c4ccb616c16d907cfd9c39143db91a059311a562b81ff47d7c5bea72dd17f82f030689d4c6b28f2d1d1e66bc84c57fd1e4086673758d
-
Filesize
15.2MB
MD588ad86ef9c1182b397cf0a23f1a4fba0
SHA17e9d7414d2b8ed1efbc681c9581a85d19d99211f
SHA256b2066147b808b662c2b37b067a00bd8844ce1c22df51f26b0a1d49f763b6704a
SHA5124a36b98005c9f4e6a6ed76adeb143e9816de9058fa9d3194f6e9b2fd8c778d1a6326582d1361862eed7232f68ed03c78a9f7882e419d877c7a041e6e1f51de43
-
Filesize
16.7MB
MD57df4cb07dd88a9a3d8c9f3a118493e40
SHA1d5d93e054d62c7fbc7bfb128f5f4dd100a8bf348
SHA2566ae580e0b681f952a9cfe4749d399e58477ed400d17583d7cdca7d5632bdd5ae
SHA512b0a55c8a6b7c3ce702fbaeb33242b3d0487d27b1a6bb9d048f6fc1a62fed9101ea86d33809ff5aad94601c4b71600ceb92ba4c80391b25175dd2f549ed585108