Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/04/2024, 11:29

General

  • Target

    2024-04-30_a513b78dbeb8812f596aeb483ee18fff_mafia.exe

  • Size

    8.3MB

  • MD5

    a513b78dbeb8812f596aeb483ee18fff

  • SHA1

    a74578687884801fafdb8f0dc7357ac76e600cf9

  • SHA256

    ab189ea48bea31159a35dbc810496a47a3fca3368370a04922967a78bdea4510

  • SHA512

    b43cf01048d845bea8d58667df599685176f8255bed5f9a12ef8b2db658be506f54261e10ecc2a86468903b085cd010eafb2790ab3770681c50e939267427cb2

  • SSDEEP

    196608:K6eyyDdxk4pCHG9RNQJXz/lU9E+JGeo9T/4erWY+1WXB6:czY4pCHG9RNQbUO4o/lWYCW

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Registers COM server for autorun 1 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-30_a513b78dbeb8812f596aeb483ee18fff_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-30_a513b78dbeb8812f596aeb483ee18fff_mafia.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3724
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /F /IM msiexec.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:752
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /i C:\Users\Admin\AppData\Local\Temp\smartbar\Installer.msi /quiet
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1008
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4892
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 46C158A98109F82C495A0ADB6DCE0FEF
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI9C01.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240622750 2 Smartbar.Installer.CustomActions!Linkury.Installer.CustomActions.CustomActions.InstallationStart
        3⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1924
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\e_sfu0xz.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3268
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA22C.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCA22B.tmp"
            5⤵
              PID:2444
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe "C:\Windows\Installer\MSIA395.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240624546 6 Smartbar.Installer.CustomActions!Linkury.Installer.CustomActions.CustomActions.InstallationRemoveFiles
          3⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:992
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe "C:\Windows\Installer\MSIAED1.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240627421 73 Smartbar.Installer.CustomActions!Linkury.Installer.CustomActions.CustomActions.InstallationComplete
          3⤵
          • Checks computer location settings
          • Loads dropped DLL
          • Drops file in Windows directory
          • Modifies Internet Explorer settings
          • Modifies Internet Explorer start page
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:384
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" /codebase "C:\Users\Admin\AppData\Local\Smartbar\Application\SmartbarInternetExplorerExtension.dll"
            4⤵
            • Modifies Internet Explorer settings
            • Modifies registry class
            PID:2388
          • C:\windows\microsoft.net\Framework64\v2.0.50727\RegAsm.exe
            "C:\windows\microsoft.net\Framework64\v2.0.50727\RegAsm.exe" /codebase "C:\Users\Admin\AppData\Local\Smartbar\Application\SmartbarInternetExplorerExtension.dll"
            4⤵
            • Registers COM server for autorun
            • Modifies Internet Explorer settings
            • Modifies registry class
            PID:4276
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" /codebase "C:\Users\Admin\AppData\Local\Smartbar\Application\SmartbarInternetExplorerBHO.dll"
            4⤵
            • Installs/modifies Browser Helper Object
            PID:3544
          • C:\windows\microsoft.net\Framework64\v2.0.50727\RegAsm.exe
            "C:\windows\microsoft.net\Framework64\v2.0.50727\RegAsm.exe" /codebase "C:\Users\Admin\AppData\Local\Smartbar\Application\SmartbarInternetExplorerBHO.dll"
            4⤵
            • Registers COM server for autorun
            • Installs/modifies Browser Helper Object
            • Modifies registry class
            PID:408
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" "C:\Users\Admin\AppData\Local\Smartbar\Application\Microsoft.mshtml.dll"
            4⤵
            • Modifies registry class
            PID:4340
          • C:\windows\microsoft.net\Framework64\v2.0.50727\RegAsm.exe
            "C:\windows\microsoft.net\Framework64\v2.0.50727\RegAsm.exe" "C:\Users\Admin\AppData\Local\Smartbar\Application\Microsoft.mshtml.dll"
            4⤵
            • Registers COM server for autorun
            • Modifies registry class
            PID:4312
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" "C:\Users\Admin\AppData\Local\Smartbar\Application\Interop.SHDocVw.dll"
            4⤵
              PID:4088
            • C:\windows\microsoft.net\Framework64\v2.0.50727\RegAsm.exe
              "C:\windows\microsoft.net\Framework64\v2.0.50727\RegAsm.exe" "C:\Users\Admin\AppData\Local\Smartbar\Application\Interop.SHDocVw.dll"
              4⤵
              • Modifies registry class
              PID:3008
            • C:\Users\Admin\AppData\Local\Smartbar\Application\Smartbar.exe
              "C:\Users\Admin\AppData\Local\Smartbar\Application\Smartbar.exe"
              4⤵
              • Executes dropped EXE
              • Drops desktop.ini file(s)
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              PID:3808
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\7c3ulrem.cmdline"
                5⤵
                  PID:2264
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC9E8.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCC9E7.tmp"
                    6⤵
                      PID:5064
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ieku54w7.cmdline"
                    5⤵
                      PID:4988
                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCB30.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCCB2F.tmp"
                        6⤵
                          PID:4936
                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cpqadejx.cmdline"
                        5⤵
                          PID:3908
                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCBBD.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCCBBC.tmp"
                            6⤵
                              PID:1440
                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\psix0ynf.cmdline"
                            5⤵
                              PID:3860
                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCC69.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCCC58.tmp"
                                6⤵
                                  PID:3312
                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\l0oqnrzs.cmdline"
                                5⤵
                                  PID:4812
                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                    C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCD15.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCCD14.tmp"
                                    6⤵
                                      PID:1348
                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\gkgh7eqo.cmdline"
                                    5⤵
                                      PID:4996
                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCDB1.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCCDB0.tmp"
                                        6⤵
                                          PID:5064
                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\6gdgd8mj.cmdline"
                                        5⤵
                                          PID:2504
                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCE6D.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCCE6C.tmp"
                                            6⤵
                                              PID:4312
                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\q2h9jkvp.cmdline"
                                            5⤵
                                              PID:3588
                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCF47.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCCF46.tmp"
                                                6⤵
                                                  PID:3412
                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mlp0_klx.cmdline"
                                                5⤵
                                                  PID:4832
                                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                    C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCFE4.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCCFE3.tmp"
                                                    6⤵
                                                      PID:3476
                                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                                                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\1yythvym.cmdline"
                                                    5⤵
                                                      PID:2368
                                                      • C:\Windows\System32\Conhost.exe
                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        6⤵
                                                          PID:4996
                                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD0CE.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCD0CD.tmp"
                                                          6⤵
                                                            PID:4896
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.ynet.co.il/
                                                        4⤵
                                                        • Enumerates system info in registry
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                        • Suspicious use of FindShellTrayWindow
                                                        • Suspicious use of SendNotifyMessage
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:3556
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe4a946f8,0x7fffe4a94708,0x7fffe4a94718
                                                          5⤵
                                                            PID:4368
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,13271472420706213379,3322700476435103447,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:2
                                                            5⤵
                                                              PID:3976
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,13271472420706213379,3322700476435103447,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:3
                                                              5⤵
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:4788
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,13271472420706213379,3322700476435103447,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2552 /prefetch:8
                                                              5⤵
                                                                PID:3912
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13271472420706213379,3322700476435103447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2992 /prefetch:1
                                                                5⤵
                                                                  PID:4520
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13271472420706213379,3322700476435103447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3000 /prefetch:1
                                                                  5⤵
                                                                    PID:3688
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13271472420706213379,3322700476435103447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3976 /prefetch:1
                                                                    5⤵
                                                                      PID:4300
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13271472420706213379,3322700476435103447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:1
                                                                      5⤵
                                                                        PID:1652
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,13271472420706213379,3322700476435103447,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 /prefetch:8
                                                                        5⤵
                                                                          PID:4404
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,13271472420706213379,3322700476435103447,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 /prefetch:8
                                                                          5⤵
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:2248
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13271472420706213379,3322700476435103447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:1
                                                                          5⤵
                                                                            PID:4428
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13271472420706213379,3322700476435103447,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:1
                                                                            5⤵
                                                                              PID:2716
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13271472420706213379,3322700476435103447,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:1
                                                                              5⤵
                                                                                PID:3696
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13271472420706213379,3322700476435103447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3832 /prefetch:1
                                                                                5⤵
                                                                                  PID:1472
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13271472420706213379,3322700476435103447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2876 /prefetch:1
                                                                                  5⤵
                                                                                    PID:2648
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13271472420706213379,3322700476435103447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:1
                                                                                    5⤵
                                                                                      PID:4016
                                                                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                                                                                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\v-4kc_-f.cmdline"
                                                                                    4⤵
                                                                                    • Suspicious use of WriteProcessMemory
                                                                                    PID:4920
                                                                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                                                      C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC7A6.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCC7A5.tmp"
                                                                                      5⤵
                                                                                        PID:2716
                                                                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                                                                                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\lq4tl7vi.cmdline"
                                                                                      4⤵
                                                                                        PID:4924
                                                                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                                                          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCB21.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCCB20.tmp"
                                                                                          5⤵
                                                                                            PID:3008
                                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                    1⤵
                                                                                      PID:676
                                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                      1⤵
                                                                                        PID:5088

                                                                                      Network

                                                                                      MITRE ATT&CK Enterprise v15

                                                                                      Replay Monitor

                                                                                      Loading Replay Monitor...

                                                                                      Downloads

                                                                                      • C:\Config.Msi\e579b1a.rbs

                                                                                        Filesize

                                                                                        88KB

                                                                                        MD5

                                                                                        44e85f4a3a33fa519bb67fff1e5a2a3f

                                                                                        SHA1

                                                                                        cd20703e3b2de12ed18de4df577b8022884f5f0f

                                                                                        SHA256

                                                                                        db8c8298fad294ef3f08f8b40a518206e8ed1a802103615ab2b3c6d8078bf072

                                                                                        SHA512

                                                                                        2371e608ae951a285e4ee604b0ffd9c0e016d089a3e764039995065e11b0be2a4c221a9035d60d72e827bcc4a2feb98420725e17a933aeef2d75b59c67242a07

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\rundll32.exe.log

                                                                                        Filesize

                                                                                        491B

                                                                                        MD5

                                                                                        8e28079704db4d073e6c39636eadc0e0

                                                                                        SHA1

                                                                                        210a60b4d7139f1779c41babc4c7e7c6b71f26cb

                                                                                        SHA256

                                                                                        34462d5da310b13b1000c3ab514350bc17395de96f9bbe4ec161128ca1171b84

                                                                                        SHA512

                                                                                        a6bf25f6440d549e2547016f01dd16345fa04655d36b225e87a96bce43195f80d82a1664f001c5ed2db2cd155681ab8cd913834d96e9459ff342012857deff91

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                        Filesize

                                                                                        152B

                                                                                        MD5

                                                                                        1cbd0e9a14155b7f5d4f542d09a83153

                                                                                        SHA1

                                                                                        27a442a921921d69743a8e4b76ff0b66016c4b76

                                                                                        SHA256

                                                                                        243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c

                                                                                        SHA512

                                                                                        17e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                        Filesize

                                                                                        152B

                                                                                        MD5

                                                                                        4e96ed67859d0bafd47d805a71041f49

                                                                                        SHA1

                                                                                        7806c54ae29a6c8d01dcbc78e5525ddde321b16b

                                                                                        SHA256

                                                                                        bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d

                                                                                        SHA512

                                                                                        432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                        Filesize

                                                                                        6KB

                                                                                        MD5

                                                                                        783a9e44702798479061fd778ef6497d

                                                                                        SHA1

                                                                                        50a0014106de40cc6ab01fa5f75a2c4323d4137a

                                                                                        SHA256

                                                                                        cd16296a4bfdea34985220ab2b1908d2cb8bdb7df6338cf994429c69605d5fe8

                                                                                        SHA512

                                                                                        21956e94d4691cf7987e8410447ee2c9e94c01888b180c9a4d5761efaba68b678712e8e5581d48e8bf95821312bb23b3e51f33d4b2da8ff6b22b1f9e18851136

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                        Filesize

                                                                                        6KB

                                                                                        MD5

                                                                                        862fc3f1b1687e193d429ab842a63234

                                                                                        SHA1

                                                                                        0e82e2e6cc515cd8cb52c52883fde2bfa5431af9

                                                                                        SHA256

                                                                                        3790c09304fd640705c07a59ea7c703bf0382db389f7df7ffc20a74d870abce3

                                                                                        SHA512

                                                                                        a050e651dd490d995d7cea7be6ef2d26092bffe2e695432e873a1dacce7a1042dd6deadff23c9e8026aa8bc1bacafc54f4ec88018e24c2d5c414721b4534a758

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                        Filesize

                                                                                        16B

                                                                                        MD5

                                                                                        6752a1d65b201c13b62ea44016eb221f

                                                                                        SHA1

                                                                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                        SHA256

                                                                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                        SHA512

                                                                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                        Filesize

                                                                                        8KB

                                                                                        MD5

                                                                                        24542a0e74871463f584c28daa990cf7

                                                                                        SHA1

                                                                                        7fe44004aae01912c477654f0627af949a65177c

                                                                                        SHA256

                                                                                        bc992c7f20dfb52f7ab859663b995234d341cabc2346962622e9e351b37df697

                                                                                        SHA512

                                                                                        10c059aacb4f98b1dc910d6f3f6a5a8a06e74d2955b59b9d2e9d447576b7ae059b03c6cd584c9c529bd7d3900add5209f65d8dab803fa124e4c45eab6938ad36

                                                                                      • C:\Users\Admin\AppData\Local\Smartbar\Application\bf4etysu.newcfg

                                                                                        Filesize

                                                                                        12KB

                                                                                        MD5

                                                                                        02afe6dc961f4498c6876a5e366834a4

                                                                                        SHA1

                                                                                        7d3b202bf1bb8fadc0c819b9fe9490711b2e1229

                                                                                        SHA256

                                                                                        38d819907e0a1742cce76a87ae62cd0d190935b8e69cb090abd281303519f578

                                                                                        SHA512

                                                                                        e297bb7c7a9097f822b6baec332699f74a7eb4e07631dec0908fd7565bc088ad21fcc0a5273ce9b1bc1a974938547872789f27297041744a77ce2953ed682151

                                                                                      • C:\Users\Admin\AppData\Local\Smartbar\Common\icons\B1BEF453-913F-4EC4-B057-A2BB21C09DCBpress.png

                                                                                        Filesize

                                                                                        4KB

                                                                                        MD5

                                                                                        e6ab030a2d47b1306ad071cb3e011c1d

                                                                                        SHA1

                                                                                        ed5f9a6503c39832e8b1339d5b16464c5d5a3f03

                                                                                        SHA256

                                                                                        054e94c94e34cef7c2fad7a0f3129c4666d07f439bfec39523dca7441a49bd7c

                                                                                        SHA512

                                                                                        4cbb002cc2d593bafd2e804cb6f1379187a9cae7d6cc45068fda6d178746420cc90bcd72ba40fc5b8b744170e64df2b296f2a45c8640819aa8b3c775e6120163

                                                                                      • C:\Users\Admin\AppData\Local\Smartbar\DistributionFiles\Configs\PublisherSettings.xml

                                                                                        Filesize

                                                                                        16KB

                                                                                        MD5

                                                                                        88b0468d9bd76c7c23f0b1d7b7e3a7c2

                                                                                        SHA1

                                                                                        c1357cdf8e2ef27419d7577bb47e1bf00d4332d3

                                                                                        SHA256

                                                                                        fc1209d341967e2d7b7e51d83a5f34cf49ff58308ffcd3266b8aa9d1f60feaa3

                                                                                        SHA512

                                                                                        03672d965fdf5319172492c7169ad3ff9852e40ddc36dba66f7f7fdaf3daf554af0a3a96a989ee7ce41a930c3817808460aff84a44d26ec34f69a7614eb6d475

                                                                                      • C:\Users\Admin\AppData\Local\Smartbar\DistributionFiles\Configs\UserSettings.xml

                                                                                        Filesize

                                                                                        2KB

                                                                                        MD5

                                                                                        4a9459e0b5e0121b3c3a11c3dbbbd28e

                                                                                        SHA1

                                                                                        96ab18d756c2e6acd4849045a467793b7987f236

                                                                                        SHA256

                                                                                        144f5e442df25d9f34127a16f952590cfc118e060a03198934f1f5da5f7edf40

                                                                                        SHA512

                                                                                        86ba05da60608808f1e9ccb0d4676aa5f425003aad34367403fdedaee8d883ede476a0a1f8f178df1356bc5578fcdb1ab704e9d38d39e8da19f72ee2923682a7

                                                                                      • C:\Users\Admin\AppData\Local\Temp\RESA22C.tmp

                                                                                        Filesize

                                                                                        1KB

                                                                                        MD5

                                                                                        8736a294d7874b8c748ea60f45682ffa

                                                                                        SHA1

                                                                                        c758e8c09e1563f58fdd28ea350f867e51d92600

                                                                                        SHA256

                                                                                        d87487d65506da3e8324ad597dd3aaf6731617fb5edeaf15e00e17509d4fe108

                                                                                        SHA512

                                                                                        a1a4ac0024d6679b5768301d40964a1c05828730a25bdd9b5c79c821a6cc52ef72860128fd587867e52a6ef399343c42c304d4bae02a08e0525026ce830ebebf

                                                                                      • C:\Users\Admin\AppData\Local\Temp\e_sfu0xz.dll

                                                                                        Filesize

                                                                                        68KB

                                                                                        MD5

                                                                                        7bd63fcd215fc1813a24da055ce47c68

                                                                                        SHA1

                                                                                        9b4b91f137440d3d966a00846b1f782e8c433a07

                                                                                        SHA256

                                                                                        555ef508e7ec207bc7da5c396a8e4fe1902db58c2129f9b842f05eb5b1c0b52b

                                                                                        SHA512

                                                                                        f1d2256ca93f90f846ed477d4c4c692ab5e83dce62b0f7f97d721cc72cb2bcc8a8722fe09962622c0413714ddc201a6c66d23eca89f52e48e1a328758a0dc8d8

                                                                                      • C:\Users\Admin\AppData\Local\Temp\smartbar\HistoryWrapperService.dll

                                                                                        Filesize

                                                                                        383KB

                                                                                        MD5

                                                                                        0fb00dcd1887e0e1339c630137c422f4

                                                                                        SHA1

                                                                                        40e83a2b22610e3d718dff15955cca69b54d7d2a

                                                                                        SHA256

                                                                                        d9cc21c8899168bbd783d8488405af97f19a18f2402d76683fb3f08733f402c3

                                                                                        SHA512

                                                                                        66ba4cc70217ed30f3a5c203e0515025400e03ccd605ab4151ebcaaa078a67c8e9d36d5c7ccbd1883a1a75de5bb5b5c04dff1a975d3e1c0a5cef4eccae4be4a1

                                                                                      • C:\Users\Admin\AppData\Local\Temp\smartbar\Installer.msi

                                                                                        Filesize

                                                                                        7.0MB

                                                                                        MD5

                                                                                        ab3c448a172f887a9a41a98bc37baeb6

                                                                                        SHA1

                                                                                        4f564531b856433e34755d5f28ed91db09238fb0

                                                                                        SHA256

                                                                                        e59bd7fa9ff296101ce04bbdff361af630a4dbe5fa2020d5da11e9ecd8e490fd

                                                                                        SHA512

                                                                                        413960883fca3da12fbef69b6501a114fa9f7e9f2e420fc6bca69a8feb19b110745fb22e8709058ac187c13932efb84921e0e31d0adad99ec2f0a6b1d063e6a2

                                                                                      • C:\Users\Admin\AppData\Local\Temp\smartbar\Setter.dll

                                                                                        Filesize

                                                                                        299KB

                                                                                        MD5

                                                                                        8b809d7fdef6c276791186b0d97ae839

                                                                                        SHA1

                                                                                        ad1202b0578aca08feee0f6937a14ec66fc7d653

                                                                                        SHA256

                                                                                        ee7ce728fc421cd33250ad55c5ef0effa3ecc71a0f2ac3b918636dee0f5f84d1

                                                                                        SHA512

                                                                                        aef7f1eba4fc8942c67873fd48377bbcfff83aafc0f7a5a32d85df00f13ceada6c60544b57c674b4e9595e7f67ef24f5855b9ce27bdab045fb9502b349f91539

                                                                                      • C:\Users\Admin\AppData\Local\Temp\smartbar\sqlite3.dll

                                                                                        Filesize

                                                                                        353KB

                                                                                        MD5

                                                                                        fec17d5fb09a03376d3aa204c65562a7

                                                                                        SHA1

                                                                                        2966508d76523b2c2d28713612b472e7256c66fc

                                                                                        SHA256

                                                                                        1e384af4479ba64bd2fa02b00603205c4b0a99a468cfa4cc33cdca7bac845bec

                                                                                        SHA512

                                                                                        4e250955a0b6e2a22d41cf24eecc88d3a36de1308c089d8f8ab02beed434f0ed44583f048ca2b436788b7c80ec1c7f0cd79166b3e62d040566c99aa536b9c11e

                                                                                      • C:\Windows\Installer\MSI9C01.tmp

                                                                                        Filesize

                                                                                        968KB

                                                                                        MD5

                                                                                        50431b75630bbf6b3c245e3c675a90c7

                                                                                        SHA1

                                                                                        3e99780baa1447056e63bdb677f4d3248e65d855

                                                                                        SHA256

                                                                                        4bbcb65193711559141311b1bbcde46471a3836248a96b374c4316e1e0cee161

                                                                                        SHA512

                                                                                        62377d84c8db9ef2361db6adc65efd6835405b945156e7680d6c102b4184d5a259dd61ca3822173781ec09d2f2d7784ce62bee256138b0918e01768629257050

                                                                                      • C:\Windows\Installer\MSI9C01.tmp-\Microsoft.Deployment.WindowsInstaller.dll

                                                                                        Filesize

                                                                                        172KB

                                                                                        MD5

                                                                                        34d4a23cab5f23c300e965aa56ad3843

                                                                                        SHA1

                                                                                        68c62a2834f9d8c59ff395ec4ef405678d564ade

                                                                                        SHA256

                                                                                        27cf8a37f749692ab4c7a834f14b52a6e0b92102e34b85ffcb2c4ee323df6b9c

                                                                                        SHA512

                                                                                        7853f1bc1e40c67808da736e30011b3f8a5c19ddf4c6e29b3e0eb458bea2e056fe0b12023ceac7145c948a6635395e466e47bdd6f0cfa1bd7f6a840e31e4694c

                                                                                      • C:\Windows\Installer\MSI9C01.tmp-\Microsoft.Practices.EnterpriseLibrary.ExceptionHandling.dll

                                                                                        Filesize

                                                                                        77KB

                                                                                        MD5

                                                                                        7868ed46c34a1b36bea10560f453598f

                                                                                        SHA1

                                                                                        72330dac6f8aed0b8fde9d7f58f04192a0303d6b

                                                                                        SHA256

                                                                                        5c17864f1572acec1f93cf6355cfd362c1e96236dcba790234985a3f108d8176

                                                                                        SHA512

                                                                                        0cc913337e3334ff0653bc1fad044d9df60a8728c233dcc2c7f6139f14608740b70b57c25a9d2d895cbc4d59508779f342a72406e623d30365ae89fb2a3607ba

                                                                                      • C:\Windows\Installer\MSI9C01.tmp-\Smartbar.Infrastructure.Utilities.dll

                                                                                        Filesize

                                                                                        12KB

                                                                                        MD5

                                                                                        5514445cbc6717bc543e993a27b45614

                                                                                        SHA1

                                                                                        463fea10195dc9d95c3b185ddc0216154f138843

                                                                                        SHA256

                                                                                        515f391b52077e9c54f0dab77b39195378b12be557af43be4d60d078a9c59c2c

                                                                                        SHA512

                                                                                        1aceac5534980905717ea30424ef3c8822cec68093ff3dbaf4ea7be52efb2db7f2869bffe5a059c401c50c852d387882233bbba6db544ed77ee81ddd2eb613b8

                                                                                      • C:\Windows\Installer\MSI9C01.tmp-\Smartbar.Installer.CustomActions.dll

                                                                                        Filesize

                                                                                        126KB

                                                                                        MD5

                                                                                        6e7e63c2978f2139fc480fa3987c2454

                                                                                        SHA1

                                                                                        494c95837404aea3a17f558a70124350cbe0b665

                                                                                        SHA256

                                                                                        ef4fbe7fb8ea3db0a6c1d2e3ea85dbdc3b2fe9e203eb4f47f286f9686b70b0c9

                                                                                        SHA512

                                                                                        8201f6808cebbf8054fd430605d3f792ccf30816d115cee6087b856d07abb7198a028155113ca66d39a6aaf9c8cf33a40c50e1d40a358050d70a7cac8f8ff097

                                                                                      • C:\Windows\Installer\MSI9C01.tmp-\Smartbar.Resources.BrowserHelperUtils.dll

                                                                                        Filesize

                                                                                        7KB

                                                                                        MD5

                                                                                        528b6340928ec73f7d3726396e3b8607

                                                                                        SHA1

                                                                                        36fececd456ed486e83185a39266aaa93d9a3851

                                                                                        SHA256

                                                                                        aaecb4c15e8a307714a92d2d962c12b35943058165369140abeda750fdc2bccf

                                                                                        SHA512

                                                                                        8cc45713604754832c6f70883f67996564d62e6c41f660fd3c69dd1900c50afa4360b97842c95e9a0fcb39007070549d8bbae069dedd1573511de99b33bf26ef

                                                                                      • C:\Windows\Installer\MSI9C01.tmp-\Smartbar.Resources.HistoryAndStatsWrapper.XmlSerializers.dll

                                                                                        Filesize

                                                                                        72KB

                                                                                        MD5

                                                                                        685a150a95abcc23eff7167e45b55eee

                                                                                        SHA1

                                                                                        7f6f6e6fb67b4eb578598f423ea284e01e12da00

                                                                                        SHA256

                                                                                        29feba57a0184ab164d6c5d0195c3b9c1f21e120a5853eee0afc6a66c5ef6a29

                                                                                        SHA512

                                                                                        f499ad24337adec2e78a6a4236877b27530d61deaf73cc09263f34c66c0ea84fbcdb057a70dd692c79e1608b69bc8945eff6ee346bb0a4efb3c8c5d4a2f8e703

                                                                                      • C:\Windows\Installer\MSI9C01.tmp-\Smartbar.Resources.HistoryAndStatsWrapper.dll

                                                                                        Filesize

                                                                                        61KB

                                                                                        MD5

                                                                                        5828e61533ad8765e34c8bd5b2684768

                                                                                        SHA1

                                                                                        819ca2ba6ceaac7042f0d106f9bbd5b299dea954

                                                                                        SHA256

                                                                                        026e85591c1d8f9f6f9103ba5aa1c18ba23c28bd57e56823f4e11ac0abacd4f3

                                                                                        SHA512

                                                                                        b5fb79e30c3ca749a5478231ca3bcdfd558db9ef0d87852849b29e6554af305b4eda4f4be9b24e0fd4fa3e371d413f19b0b5f1e1f913b9e31dcb8e5b0b1442c8

                                                                                      • C:\Windows\Installer\MSI9C01.tmp-\Smartbar.Resources.SetBrowsersSettings.dll

                                                                                        Filesize

                                                                                        142KB

                                                                                        MD5

                                                                                        68462e5ccace2103619f9501c7accf51

                                                                                        SHA1

                                                                                        54e402eef5863227eb1128e17ccfc96bcc1b0c73

                                                                                        SHA256

                                                                                        bc31faeea673328c8624334b8d9f699a71221a570043d43f90d1f4672939e776

                                                                                        SHA512

                                                                                        162c45d1775e0c77ec6b7c7bbf483142a020193f6f07812e4e48c1686cd791758736d75317f3c796bba30464a92f41fd95c80d8a1d176f13aa7aa6623a13066e

                                                                                      • C:\Windows\Installer\MSIA395.tmp-\CustomAction.config

                                                                                        Filesize

                                                                                        806B

                                                                                        MD5

                                                                                        796621b6895449a5f70ca6b78e62f318

                                                                                        SHA1

                                                                                        2423c3e71fe5fa55fd71c00ae4e42063f4476bca

                                                                                        SHA256

                                                                                        09be5df7a85545fd93d9fd3cd1d6c04c6bfe6e233c68da6f81c49e7a35fcbb84

                                                                                        SHA512

                                                                                        081cf1dadb3a0e50f0a31ab03e2b08e80298c06070cd6f9b2806c08d400c07134623f7229a6c99910c6243dfa53c6e2c05d09a497aae1e701bc34b660cf9e4c9

                                                                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch

                                                                                        Filesize

                                                                                        416B

                                                                                        MD5

                                                                                        5b7cf489957eb2952242bb4f1163b491

                                                                                        SHA1

                                                                                        133454c6f94d74d32b9bdf29ee6cc338c5af3652

                                                                                        SHA256

                                                                                        ef44f9f4fa3f70a614b768d0c7781e5d5084a7a86a085264569f0d95f45f7605

                                                                                        SHA512

                                                                                        88fe9e04aff1064f42f083be22fa516f1800903df47017b73b311ba506f074fdfc8dbf031693708a758dfccc6035bf8e57910aa735e67b5d018429564f78d5ac

                                                                                      • C:\Windows\assembly\GAC\Microsoft.VisualStudio.OLE.Interop\7.1.40304.0__b03f5f7f11d50a3a\Microsoft.VisualStudio.OLE.Interop.dll

                                                                                        Filesize

                                                                                        116KB

                                                                                        MD5

                                                                                        459ff9c6762b7fdd91c156ff3e096478

                                                                                        SHA1

                                                                                        7179debce9a271450b1241e7435a999aea1ddd05

                                                                                        SHA256

                                                                                        93865c89e1507409fbbeb9433542a303cdd2fd5acda3d51fecd83e4a8fb8072c

                                                                                        SHA512

                                                                                        8b95330d364413122427604af1c0e848694975eb8c541b911aeb0d50fbb5cd15a60863f68593f1088b26f83500f400f52292a2891511223f796be750c6a7583a

                                                                                      • C:\Windows\assembly\GAC_MSIL\Interop.IWshRuntimeLibrary\1.0.0.0__64637c62d0471340\Interop.IWshRuntimeLibrary.dll

                                                                                        Filesize

                                                                                        48KB

                                                                                        MD5

                                                                                        7a5a5de7b05c00821ed6348afff2627b

                                                                                        SHA1

                                                                                        66f34183d38c9f4da9c9c669bda1149ebe766e97

                                                                                        SHA256

                                                                                        ff9d8658fa81697e8f51b105c067996e5aaff2c46cb147667bbcc9fc4929b959

                                                                                        SHA512

                                                                                        23730bd76ae297765fa8954affbd71437a7d7bdb5bdf246563a945af353ceca9abd5275d973d8c981fc6ab6d7e25032aab2888f04e33394d95474febee02a0fd

                                                                                      • C:\Windows\assembly\tmp\95WWNDTO\Interop.SHDocVw.dll

                                                                                        Filesize

                                                                                        136KB

                                                                                        MD5

                                                                                        cc0611a32becda6d37695f38755a891f

                                                                                        SHA1

                                                                                        2b987c4cbe8de69b40f4096d424aca5469f90fe5

                                                                                        SHA256

                                                                                        9daf27aea3c266457e50501cbaf1485a81c15f2dc51a84609bb5417d286a2769

                                                                                        SHA512

                                                                                        bcae75594167257341ac903fbe2a7cb4da6b49044bfaad6bc523f2efcf8aac98a417564d48cdfc57fafa7a74c6a7041b725a7b5112082b499ff2d23d05bcccac

                                                                                      • C:\Windows\assembly\tmp\VLKXDRPP\System.Data.SQLite.dll

                                                                                        Filesize

                                                                                        889KB

                                                                                        MD5

                                                                                        5b3d3a627813bcef2d7a8651941f2a96

                                                                                        SHA1

                                                                                        18713ace817081d3b99bb71e01030842345dc750

                                                                                        SHA256

                                                                                        2f7e3f285a523b3d918fe8b3cbd3d42d2380835779a1a8b50ccf6bb365a915bc

                                                                                        SHA512

                                                                                        fc6754246a071a40bf64d8a66bb7b4f926f031dfe17c25a3e7d37d8421757afad99837f28bf754fb894ca0e19f7b13850557b208b21c4566479619e77cafdff3

                                                                                      • \??\c:\Users\Admin\AppData\Local\Temp\CSCA22B.tmp

                                                                                        Filesize

                                                                                        652B

                                                                                        MD5

                                                                                        c69a91d8338e903c33dd770b64475cdd

                                                                                        SHA1

                                                                                        3d43390de94e7f82612b82f64fc031c6a575326e

                                                                                        SHA256

                                                                                        f4bdedce26245ea4519c4ff9cbf09152a1d7e3fe9201d9e7d5dafafa0840547f

                                                                                        SHA512

                                                                                        9153f29d6f1fcca469d98f1175502285b020cd67c705e172d1d4cef994feb363c9bf8825c7044b68d055a3ccca8ffaf8059f6796d0b7e1a1c3e863956f66f8cb

                                                                                      • \??\c:\Users\Admin\AppData\Local\Temp\e_sfu0xz.0.cs

                                                                                        Filesize

                                                                                        144KB

                                                                                        MD5

                                                                                        80d63b882b411290f39d49cd220b9099

                                                                                        SHA1

                                                                                        c045a403ee8e63bf0f745ae71d573371cc5fd547

                                                                                        SHA256

                                                                                        588b5a7b7054402f78db94a328401454031310687eb90aa81871d3dc029c9da2

                                                                                        SHA512

                                                                                        df6ddc155b36e3440023b3cfe7b6f86aaa8c9a525d2154fc432f4db03068e8ef0734da57fede2606e011d70392b3ae4744ce11387d23267b656eca2028a207bd

                                                                                      • \??\c:\Users\Admin\AppData\Local\Temp\e_sfu0xz.cmdline

                                                                                        Filesize

                                                                                        614B

                                                                                        MD5

                                                                                        e546e6ae42b4b4786fa021ea77edc503

                                                                                        SHA1

                                                                                        5cbe6e463fe9f8f66e40ff1fdba49058c7c0a653

                                                                                        SHA256

                                                                                        9a0f48304e2ab8476b08663024f785a4ecf7367e6797eae94c31a15e1b6047bc

                                                                                        SHA512

                                                                                        f1bb837932c77e4d0441a0b08bed1c6cae313f8cf989819e7fc19a0ffce71191b5f84ff80edf3ee15bc07b47d7cd5f1a9ed6f008d3c9a38d9fc8b81db4fb1463

                                                                                      • memory/408-837-0x000000001CCC0000-0x000000001CCE6000-memory.dmp

                                                                                        Filesize

                                                                                        152KB

                                                                                      • memory/3008-840-0x000000001C7B0000-0x000000001C7D6000-memory.dmp

                                                                                        Filesize

                                                                                        152KB

                                                                                      • memory/3724-19-0x0000000060900000-0x000000006094F000-memory.dmp

                                                                                        Filesize

                                                                                        316KB

                                                                                      • memory/4276-835-0x000000001D560000-0x000000001D5FC000-memory.dmp

                                                                                        Filesize

                                                                                        624KB

                                                                                      • memory/4276-834-0x000000001CFF0000-0x000000001D4BE000-memory.dmp

                                                                                        Filesize

                                                                                        4.8MB

                                                                                      • memory/4276-833-0x000000001CB00000-0x000000001CB18000-memory.dmp

                                                                                        Filesize

                                                                                        96KB

                                                                                      • memory/4312-839-0x000000001E2A0000-0x000000001EA46000-memory.dmp

                                                                                        Filesize

                                                                                        7.6MB

                                                                                      • memory/4312-838-0x000000001DAF0000-0x000000001E296000-memory.dmp

                                                                                        Filesize

                                                                                        7.6MB

                                                                                      • memory/4892-738-0x0000000000910000-0x00000000009F3000-memory.dmp

                                                                                        Filesize

                                                                                        908KB

                                                                                      • memory/4892-652-0x000001F776160000-0x000001F776180000-memory.dmp

                                                                                        Filesize

                                                                                        128KB

                                                                                      • memory/4892-622-0x000001F776130000-0x000001F776156000-memory.dmp

                                                                                        Filesize

                                                                                        152KB

                                                                                      • memory/4892-619-0x000001F775CF0000-0x000001F775D00000-memory.dmp

                                                                                        Filesize

                                                                                        64KB