Resubmissions

10/04/2024, 19:04

240410-xrc4tsca3w 7

10/04/2024, 18:53

240410-xjnwcsbf7t 7

10/04/2024, 18:50

240410-xhb56sbf21 1

10/04/2024, 18:40

240410-xbpspabd2s 10

10/04/2024, 18:37

240410-w9s3bsgb72 8

10/04/2024, 18:27

240410-w3qzdsba5v 4

10/04/2024, 18:24

240410-w15d1afh52 1

10/04/2024, 18:13

240410-wtrjkaff78 1

10/04/2024, 18:07

240410-wqcw1aaf4x 6

Analysis

  • max time kernel
    418s
  • max time network
    392s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    10/04/2024, 19:04

General

  • Target

    sample.html

  • Size

    18KB

  • MD5

    975aed651740cac29bc0fa6e3992d3cc

  • SHA1

    42033f32c97b6be4e446c0a77690745eafc28112

  • SHA256

    c7a53cef7508f2abb86996be29a075c2ea63bf09b1bb08e1b1b7a592cf074e60

  • SHA512

    53a57fbf3952c5f0e08781879747d059d27a81f58c3f1a9f38c8763ba7aa8d31849e9797092c7624311b626e9aedd4937956bdefc54350ade3d480b04d1eb87d

  • SSDEEP

    384:rTqN2DpmReVoOs41N9ylKeGM+U8HhhbG167uS2LjFrSE3+dVJCBXQL:rTqYBVoOs41ryI1M0Bhb68CFrSEMJQQL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 36 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3624
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffce3dd3cb8,0x7ffce3dd3cc8,0x7ffce3dd3cd8
      2⤵
        PID:3172
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,18343730487421854140,17826893600409275074,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:2
        2⤵
          PID:2712
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1904,18343730487421854140,17826893600409275074,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1792
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1904,18343730487421854140,17826893600409275074,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2608 /prefetch:8
          2⤵
            PID:4776
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,18343730487421854140,17826893600409275074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:1
            2⤵
              PID:2064
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,18343730487421854140,17826893600409275074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:1
              2⤵
                PID:4456
              • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1904,18343730487421854140,17826893600409275074,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:2504
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,18343730487421854140,17826893600409275074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:1
                2⤵
                  PID:1380
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,18343730487421854140,17826893600409275074,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:1
                  2⤵
                    PID:1824
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,18343730487421854140,17826893600409275074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4040 /prefetch:1
                    2⤵
                      PID:908
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,18343730487421854140,17826893600409275074,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:1
                      2⤵
                        PID:3852
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1904,18343730487421854140,17826893600409275074,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1120
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,18343730487421854140,17826893600409275074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:1
                        2⤵
                          PID:1920
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,18343730487421854140,17826893600409275074,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:1
                          2⤵
                            PID:2020
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,18343730487421854140,17826893600409275074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:1
                            2⤵
                              PID:1588
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,18343730487421854140,17826893600409275074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:1
                              2⤵
                                PID:340
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,18343730487421854140,17826893600409275074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:1
                                2⤵
                                  PID:2364
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1904,18343730487421854140,17826893600409275074,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5200 /prefetch:8
                                  2⤵
                                    PID:3692
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1904,18343730487421854140,17826893600409275074,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5184 /prefetch:8
                                    2⤵
                                    • Modifies registry class
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2836
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,18343730487421854140,17826893600409275074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:1
                                    2⤵
                                      PID:1920
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,18343730487421854140,17826893600409275074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:1
                                      2⤵
                                        PID:2456
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,18343730487421854140,17826893600409275074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:1
                                        2⤵
                                          PID:3564
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,18343730487421854140,17826893600409275074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1664 /prefetch:1
                                          2⤵
                                            PID:1408
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,18343730487421854140,17826893600409275074,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6840 /prefetch:2
                                            2⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:4184
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1904,18343730487421854140,17826893600409275074,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2496 /prefetch:8
                                            2⤵
                                            • NTFS ADS
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:4688
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:4616
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:3348
                                            • C:\Windows\System32\rundll32.exe
                                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                              1⤵
                                                PID:3832
                                              • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\ColorBug.exe
                                                "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\ColorBug.exe"
                                                1⤵
                                                • Adds Run key to start application
                                                PID:3224
                                              • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\FreeYoutubeDownloader.exe
                                                "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\FreeYoutubeDownloader.exe"
                                                1⤵
                                                • Adds Run key to start application
                                                • Drops file in Windows directory
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2808
                                                • C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe
                                                  "C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe"
                                                  2⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SendNotifyMessage
                                                  PID:2480
                                                  • C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe
                                                    "C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"
                                                    3⤵
                                                    • Executes dropped EXE
                                                    PID:3732
                                              • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\FreeYoutubeDownloader.exe
                                                "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\FreeYoutubeDownloader.exe"
                                                1⤵
                                                • Drops file in Windows directory
                                                • Suspicious use of SetWindowsHookEx
                                                PID:5028
                                              • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\WindowsUpdate.exe
                                                "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\WindowsUpdate.exe"
                                                1⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of SendNotifyMessage
                                                PID:1824

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                a0407c5de270b9ae0ceee6cb9b61bbf1

                                                SHA1

                                                fb2bb8184c1b8e680bf873e5537e1260f057751e

                                                SHA256

                                                a56989933628f6a677ad09f634fc9b7dd9cf7d06c72a76ddbb8221bc4a62ffcd

                                                SHA512

                                                65162bf07705dfdd348d4eaf0a3feba08dc2c0942a3a052b4492d0675ab803b104c03c945f5608fac9544681e0fe8b81d1aaca859663e79aa87fcb591ddb8136

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                ded21ddc295846e2b00e1fd766c807db

                                                SHA1

                                                497eb7c9c09cb2a247b4a3663ce808869872b410

                                                SHA256

                                                26025f86effef56caa2ee50a64e219c762944b1e50e465be3a6b454bc0ed7305

                                                SHA512

                                                ddfaa73032590de904bba398331fdbf188741d96a17116ada50298b42d6eb7b20d6e50b0cfae8b17e2f145997b8ebce6c8196e6f46fbe11f133d3d82ce3656db

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                Filesize

                                                3KB

                                                MD5

                                                4d9c3a5c4ecd8fa00e2d2034d84f24cd

                                                SHA1

                                                294cbbb115a4151eee16353a6e16044892d4922a

                                                SHA256

                                                c65bb4fb645efb11263713a242784fed890240e3ad1d90b32606353da98f0604

                                                SHA512

                                                341b8f6c1fc555192cef5800a202d2c71282851ed3ee9211e8c925ed22f28fc046fab0d3eabd255ffb0e734b0fbe1c6c705d811430ab37cad48d2641bd85f88c

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                Filesize

                                                111B

                                                MD5

                                                285252a2f6327d41eab203dc2f402c67

                                                SHA1

                                                acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                SHA256

                                                5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                SHA512

                                                11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                Filesize

                                                861B

                                                MD5

                                                7911cda0bd7b9df06c1efedcc25535fb

                                                SHA1

                                                4b09ddfb1d68a010ddb72d9d283bd084eeb3dd3e

                                                SHA256

                                                d8ae2d36aa6b9a587bf54bb9e8c0e10488a061f1dedea32cc91e957378f90582

                                                SHA512

                                                0b206cc232873c5a0a1254450e300702b9857d9b1c747f11ccdaadf600ea6350ee7de20b16b76505fff289d2f4ac83c4cd16f8640a296c9ae94dac5715b7224b

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                5KB

                                                MD5

                                                ef05bdcf3a7e1ee067e3b62aa6c15ac0

                                                SHA1

                                                5fecf6d852c39911eb7ec4617c48729a2a13a476

                                                SHA256

                                                3c2e070a22b20cfd07660db13d8fe1295fb2dd2f2747ea44c88e0052edfe9320

                                                SHA512

                                                8a98db38b3999a13aaeccd6889b2b527cbfbf638aeb4f317b4aa3d20a613505189a6260282664f77395ad0224b3aa2ea57ffecb4bc2263c307b67ab93080020f

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                a6698fd0389c571dee3dcfd5aaf5daeb

                                                SHA1

                                                88030c2b9b43d46d9ff728b0b8c569791ab821fa

                                                SHA256

                                                73d4b706f6be4b56938f9531ce7edc1cfe001c1cd5bc4ffc3b859120ae72aa06

                                                SHA512

                                                2bbc9ff7f21a5707e2f71ea28af22392fa6c6e07cb036ba1952a54928f2e97d2a1813f3c0ddf8bc91f0a0a5f62c39e51762855400e4ae4d9e2fc6208314adbed

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                928a7f62c35fb78da2e051fac6cfcc6c

                                                SHA1

                                                c7b46c960a842b44eb01c9c7893e57fe8af2ef19

                                                SHA256

                                                69b0f2894e0a8f362cd2a0662be6788b222936c2cfd66078533e2e94d5caa019

                                                SHA512

                                                681e180e98843a2e984f4353884213dd9280626b99d3cbaa0873ce89adfbe4ecde839fb40ce2faf5b7b229fa6ecb7f7147f8056ddf9c04acc6152fc4f8206fd5

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                5KB

                                                MD5

                                                5a9de0be9354bf6c975ecf57c1450912

                                                SHA1

                                                fb44ad6a83e316095df5953d0733b69e3d037171

                                                SHA256

                                                c9982e310dc1b8a831e97d0620ce93d2eb41d4698a7a6a4a1d4aa6b144e58daf

                                                SHA512

                                                d30eabf5ba66363dbf3c522cfa12b12a20ab1d0698ddb98869036f3685965efb1c92495059ff4324122c101bac6f756d7ad7cd7310ca2b2075c8bcefd1137efc

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                Filesize

                                                1KB

                                                MD5

                                                8cbb6f7d7f9688fcc78e33e82ca83015

                                                SHA1

                                                50b2c82d92c4ec4058e4e8a987507cc159bef627

                                                SHA256

                                                92be4db4100bcd477b085f7be91331b0385cb4e668b890859ce635760f505bda

                                                SHA512

                                                61472011c6036be1a58acb15ed56d89880169afa8899443893038019e38fe752be48b61ca5d11e722b9139ffbbcaf803f6e0f887ebcc61248a23b6dbf6cdcff2

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57ed00.TMP

                                                Filesize

                                                1KB

                                                MD5

                                                770cf3642d5768d043a388edb2523ebb

                                                SHA1

                                                b610395018f237d89019051549d075d203128c52

                                                SHA256

                                                d0f1479f72318381150c293b0532c129d24487aacfa625ce61b3f384bbe50404

                                                SHA512

                                                c61dfdb4c68b77fffc3148a35665543de838f65235aab844f9af69e368dc36a37cabe1c225c9fc90de3bc742ec20c025764a6565b0afc1a811806458ecb23ef7

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                46295cac801e5d4857d09837238a6394

                                                SHA1

                                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                SHA256

                                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                SHA512

                                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                206702161f94c5cd39fadd03f4014d98

                                                SHA1

                                                bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                SHA256

                                                1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                SHA512

                                                0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                11KB

                                                MD5

                                                eb1227bb5a55589cc45f77bcd4a2d9ba

                                                SHA1

                                                b471430375cf108eab816cce9e8d5b380fc3524b

                                                SHA256

                                                b395145ad289cd85bcc06cd9a752f47904a5227cd7c0c16dadc94075f719cedf

                                                SHA512

                                                34a487cbc52c867820fe30f56101cdcd013d31e6da64e76a175a97a5fece4ee9c4950f546d14c32d2fa22596e31a8f03bdf086578f61b7493c385f5ccc82cd4b

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                11KB

                                                MD5

                                                a868813ea146219119a1eda15ef9e54a

                                                SHA1

                                                ba429314bc4b989677aabc8975227c159a6766d2

                                                SHA256

                                                5f2a925560a9b78c60427bb8c5cc3f7fbf15265a362806fffef6565740d5c58a

                                                SHA512

                                                8790de40d20f178d3e7eb0a5486cc5e46f8d53bcf4c8df2a95b54ee4117c41770d2f3c4437b4e256e2f912518f4db38f49007e0367a019b917c49c9310c20935

                                              • C:\Users\Admin\AppData\Local\Temp\$inst\2.tmp

                                                Filesize

                                                36B

                                                MD5

                                                8708699d2c73bed30a0a08d80f96d6d7

                                                SHA1

                                                684cb9d317146553e8c5269c8afb1539565f4f78

                                                SHA256

                                                a32e0a83001d2c5d41649063217923dac167809cab50ec5784078e41c9ec0f0f

                                                SHA512

                                                38ece3e441cc5d8e97781801d5b19bdede6065a0a50f7f87337039edeeb4a22ad0348e9f5b5542b26236037dd35d0563f62d7f4c4f991c51020552cfae03b264

                                              • C:\Users\Admin\Downloads\The-MALWARE-Repo-master.zip:Zone.Identifier

                                                Filesize

                                                26B

                                                MD5

                                                fbccf14d504b7b2dbcb5a5bda75bd93b

                                                SHA1

                                                d59fc84cdd5217c6cf74785703655f78da6b582b

                                                SHA256

                                                eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                                SHA512

                                                aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                              • C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe

                                                Filesize

                                                438KB

                                                MD5

                                                1bb4dd43a8aebc8f3b53acd05e31d5b5

                                                SHA1

                                                54cd1a4a505b301df636903b2293d995d560887e

                                                SHA256

                                                a2380a5f503bc6f5fcfd4c72e5b807df0740a60a298e8686bf6454f92e5d3c02

                                                SHA512

                                                94c70d592e806bb426760f61122b8321e8dc5cff7f793d51f9d5650821c502c43096f41d3e61207ca6989df5bfdbff57bc23328de16e99dd56e85efc90affdce

                                              • C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe

                                                Filesize

                                                153KB

                                                MD5

                                                f33a4e991a11baf336a2324f700d874d

                                                SHA1

                                                9da1891a164f2fc0a88d0de1ba397585b455b0f4

                                                SHA256

                                                a87524035509ff7aa277788e1a9485618665b7da35044d70c41ec0f118f3dfd7

                                                SHA512

                                                edf066968f31451e21c7c21d3f54b03fd5827a8526940c1e449aad7f99624577cbc6432deba49bb86e96ac275f5900dcef8d7623855eb3c808e084601ee1df20

                                              • memory/1824-506-0x0000000000400000-0x00000000006BC000-memory.dmp

                                                Filesize

                                                2.7MB

                                              • memory/1824-503-0x0000000000400000-0x00000000006BC000-memory.dmp

                                                Filesize

                                                2.7MB

                                              • memory/1824-508-0x0000000000990000-0x0000000000991000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/1824-505-0x0000000000990000-0x0000000000991000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/1824-504-0x0000000000400000-0x00000000006BC000-memory.dmp

                                                Filesize

                                                2.7MB

                                              • memory/2480-502-0x0000018745AD0000-0x0000018745AE0000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/2480-501-0x00007FFCCCC30000-0x00007FFCCD6F2000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/2480-493-0x00007FFCCCC30000-0x00007FFCCD6F2000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/2480-492-0x000001872B390000-0x000001872B3BE000-memory.dmp

                                                Filesize

                                                184KB

                                              • memory/2480-494-0x0000018745AD0000-0x0000018745AE0000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/2808-491-0x0000000000400000-0x000000000043C000-memory.dmp

                                                Filesize

                                                240KB

                                              • memory/3224-449-0x0000000000400000-0x0000000000414000-memory.dmp

                                                Filesize

                                                80KB

                                              • memory/3732-513-0x00000000738B0000-0x0000000074061000-memory.dmp

                                                Filesize

                                                7.7MB

                                              • memory/3732-512-0x0000000000CA0000-0x0000000000D14000-memory.dmp

                                                Filesize

                                                464KB

                                              • memory/3732-514-0x0000000005B30000-0x00000000060D6000-memory.dmp

                                                Filesize

                                                5.6MB

                                              • memory/3732-515-0x0000000005680000-0x0000000005712000-memory.dmp

                                                Filesize

                                                584KB

                                              • memory/3732-516-0x0000000005630000-0x0000000005640000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/3732-517-0x0000000005740000-0x000000000574A000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/3732-518-0x0000000005630000-0x0000000005640000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/3732-521-0x00000000738B0000-0x0000000074061000-memory.dmp

                                                Filesize

                                                7.7MB

                                              • memory/3732-522-0x0000000005630000-0x0000000005640000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/3732-524-0x0000000005630000-0x0000000005640000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/5028-500-0x0000000000400000-0x000000000043C000-memory.dmp

                                                Filesize

                                                240KB