Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    23-08-2024 21:06

General

  • Target

    https://github.com/Endermanch/MalwareDatabase

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 21 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 43 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Endermanch/MalwareDatabase
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:932
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0x100,0x110,0x7ffbebd33cb8,0x7ffbebd33cc8,0x7ffbebd33cd8
      2⤵
        PID:4368
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,3415777639114517088,12597977750121723147,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:2
        2⤵
          PID:2160
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,3415777639114517088,12597977750121723147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1320
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,3415777639114517088,12597977750121723147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2584 /prefetch:8
          2⤵
            PID:1416
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,3415777639114517088,12597977750121723147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1
            2⤵
              PID:4844
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,3415777639114517088,12597977750121723147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:1
              2⤵
                PID:240
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1924,3415777639114517088,12597977750121723147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:1016
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,3415777639114517088,12597977750121723147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:1
                2⤵
                  PID:2280
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,3415777639114517088,12597977750121723147,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:1
                  2⤵
                    PID:1144
                  • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,3415777639114517088,12597977750121723147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5908 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4296
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,3415777639114517088,12597977750121723147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1
                    2⤵
                      PID:4512
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,3415777639114517088,12597977750121723147,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:1
                      2⤵
                        PID:4656
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,3415777639114517088,12597977750121723147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:1
                        2⤵
                          PID:4120
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1924,3415777639114517088,12597977750121723147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6072 /prefetch:8
                          2⤵
                          • NTFS ADS
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2280
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1924,3415777639114517088,12597977750121723147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 /prefetch:8
                          2⤵
                          • NTFS ADS
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1568
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,3415777639114517088,12597977750121723147,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6304 /prefetch:2
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2080
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:3492
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:2528
                          • C:\Windows\System32\rundll32.exe
                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                            1⤵
                              PID:1012
                            • C:\Users\Admin\AppData\Local\Temp\Temp1_Walliant (1).zip\ska2pwej.aeh.exe
                              "C:\Users\Admin\AppData\Local\Temp\Temp1_Walliant (1).zip\ska2pwej.aeh.exe"
                              1⤵
                              • System Location Discovery: System Language Discovery
                              PID:2332
                              • C:\Users\Admin\AppData\Local\Temp\is-4CH44.tmp\ska2pwej.aeh.tmp
                                "C:\Users\Admin\AppData\Local\Temp\is-4CH44.tmp\ska2pwej.aeh.tmp" /SL5="$4020E,4511977,830464,C:\Users\Admin\AppData\Local\Temp\Temp1_Walliant (1).zip\ska2pwej.aeh.exe"
                                2⤵
                                • Executes dropped EXE
                                • Adds Run key to start application
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of FindShellTrayWindow
                                PID:4216
                                • C:\Users\Admin\AppData\Local\Programs\Walliant\walliant.exe
                                  "C:\Users\Admin\AppData\Local\Programs\Walliant\walliant.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • System Location Discovery: System Language Discovery
                                  • Modifies system certificate store
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  • Suspicious use of SetWindowsHookEx
                                  PID:3836
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
                              1⤵
                                PID:1568
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService
                                1⤵
                                  PID:4184

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  9828ffacf3deee7f4c1300366ec22fab

                                  SHA1

                                  9aff54b57502b0fc2be1b0b4b3380256fb785602

                                  SHA256

                                  a3d21f0fb6563a5c9d0f7a6e9c125ec3faaa86ff43f37cb85a8778abc87950f7

                                  SHA512

                                  2e73ea4d2fcd7c8d52487816110f5f4a808ed636ae87dd119702d1cd1ae315cbb25c8094a9dddf18f07472b4deaed3e7e26c9b499334b26bdb70d4fa7f84168d

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  6fdbe80e9fe20761b59e8f32398f4b14

                                  SHA1

                                  049b1f0c6fc4e93a4ba6b3c992f1d6cecf3ada1f

                                  SHA256

                                  b7f0d9ece2307bdc4f05a2d814c947451b007067ff8af977f77f06c3d5706942

                                  SHA512

                                  cf25c7fd0d6eccc46e7b58949c16d17ebeefb7edd6c76aa62f7ab5da52d1c6fc88bde620be40396d336789bd0d62b2162209a947d7ab69389e8c03682e880234

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\526b2663-31a2-46d8-9cef-a4fd27a6994a.tmp

                                  Filesize

                                  5KB

                                  MD5

                                  d85542dac65a13a7cc0601a3397771cd

                                  SHA1

                                  2f38734a2ec5c1575ee334483980c80d0d5b17e0

                                  SHA256

                                  8fae334d37a1ab5b55273a824fa68bfab5cf17c651e633ffd15422a00a15d73e

                                  SHA512

                                  c6a8d976a8565cc50e7643610735e6b5cb41f26a04fef3d6cd74d8d7c783bb3b64a82c3ae6dddce445451247f7fe7d45ac6f0ee39ef2c6981d8c8258a70a6c26

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000013

                                  Filesize

                                  4.5MB

                                  MD5

                                  33968a33f7e098d31920c07e56c66de2

                                  SHA1

                                  9c684a0dadae9f940dd40d8d037faa6addf22ddb

                                  SHA256

                                  6364269dbdc73d638756c2078ecb1a39296ddd12b384d05121045f95d357d504

                                  SHA512

                                  76ccf5f90c57915674e02bc9291b1c8956567573100f3633e1e9f1eaa5dbe518d13b29a9f8759440b1132ed897ff5a880bef395281b22aaf56ad9424a0e5e69a

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  2KB

                                  MD5

                                  150d70e1486454b18840e9c9d6d36af7

                                  SHA1

                                  3487f792cc4c4d95d4eb4bd1c75dc2336ed5bae0

                                  SHA256

                                  9c4dff19ff8c0a2c5158379ea7a7936e6348d9994241a57f9eb1193e0e79cc2c

                                  SHA512

                                  15254648cfb61c43479a6cc2ad6478ee8a45070377abc3a7908986b23feddcb7186f22cafe3a618606ab7ec302615cdec7b225ac3569e629e2a2cf220f78bb17

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  2KB

                                  MD5

                                  40eb2e582007c7c58571a75f266c6666

                                  SHA1

                                  7676d1094d143abc7a2571b5145abe0e8669ab0b

                                  SHA256

                                  bdec5e2c8d92f53fd3f92024126b102dced4b6578334018d340480569b2246ac

                                  SHA512

                                  25e72d8963b6ed1a4c47443196709d063f0f3dc1b63e6ac0759f3ab16fdb43952b96144306e4e832e7689f7ac95a5685e3399f810480d9db39cbcee71b12462c

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                  Filesize

                                  595B

                                  MD5

                                  aab27555e7a463caded4f29d822c83b3

                                  SHA1

                                  6cf256241088d23ddfd332efab796f282be1bdb3

                                  SHA256

                                  61ee79248875f3044a61c3fe7df3e6637544b3ad59b124da575ab25921b05b9e

                                  SHA512

                                  0dbb85b5b19dbbe741446c3a83bafb1109c810de1761ff3d15969d3c345b499e26c24dab78c85227e6305f652e1425022dd52fb3909275f69ec776f251bbaec3

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  80553107ad354dfa7abbca1cd29ed6e8

                                  SHA1

                                  7bea3ed946fcf995a58a7305bc4f2a5e5a341edc

                                  SHA256

                                  fbacb1646a8e45beae2d2ca737c5b91028f388f147262527d745b2ac7445d0bb

                                  SHA512

                                  5041ede5803374bed8c5d0d759e6158c5ed5a6e9cea7c3bf169eb35546f00c3ca1939be2cff7851df63632c42dca12e088019c304c225a2f94ea1979bdefddb8

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  30ddeea067ef05aee983fade7a95c39a

                                  SHA1

                                  45260a26f8cc02f2e07217b80870bc76e3448c30

                                  SHA256

                                  96d3b478dc08b848687e0b0db67a936635db458d3f2303cedab6693a99f2729e

                                  SHA512

                                  4bc9ed4dda1d08945a314caad4556b082faf8c38ead2688e26c0ed8a0c6e82821a29277a943a2987a82da76c36b57c12d9aee6fdbfddf5553d6c19c5d56d93e2

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                  Filesize

                                  1KB

                                  MD5

                                  c36838757fea2b2cf7e2dc81451a3381

                                  SHA1

                                  146e9d304b4446ca1e0ee3700892c6e7aba9e19b

                                  SHA256

                                  ce2a81d904ee65bb2ce0f150c1dc5af293c1e9f1fe097c4bcec901e752a2c1e2

                                  SHA512

                                  3c57827b5098ab07b897b21f447e7d0869dc1733ba0c9a0fafe665d8a182896d9fb1d97c9a9f1f06444b501da1ebe3d597fafbb5dc092976b5b788282da81592

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                  Filesize

                                  1KB

                                  MD5

                                  94bdd26de61978f0855c6cb89eb7f7b3

                                  SHA1

                                  85805de97f887b44c11373c1961588cab385ad67

                                  SHA256

                                  0f4c64b7041fb7b01f04145d21c638ae8e1813271cd4b40172970aa4b75e7da3

                                  SHA512

                                  9cb5db42122f5e9a464f9a0155683cd930121ded128082442660b8bc3c04fefed5ae46651437becfce5cbcf81a9152bc4ca00bca9a9e74e3e1181ad347de4c2f

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe597e4e.TMP

                                  Filesize

                                  1KB

                                  MD5

                                  57833e80d346678c8b8a1d657e68ee0e

                                  SHA1

                                  0c064536ca0094dd452eda9ad6b07cdc15c523c3

                                  SHA256

                                  cf26ef535ff4de17b73991253716c7079768fa27cad1e7a7a497f47f2438caae

                                  SHA512

                                  3dadffa79a54c994e5fe67f3d9cba267e289f6f5b6db8c64a035c7caa8d03a261b50c22baa09609f130955793d052e263b2b78987c033f753b4fb6971912a6b7

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  206702161f94c5cd39fadd03f4014d98

                                  SHA1

                                  bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                  SHA256

                                  1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                  SHA512

                                  0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  46295cac801e5d4857d09837238a6394

                                  SHA1

                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                  SHA256

                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                  SHA512

                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  11KB

                                  MD5

                                  6abf85a28e41f679fc042b7341ff6f81

                                  SHA1

                                  d3883e00fb81271a4497eb82ada710b0e0fb4998

                                  SHA256

                                  03d600fdf7c861e37d63f56a753a9e9c24750e65ac2e9240d1a23e11ba6490b5

                                  SHA512

                                  3fbeda1ee7ced4237a5d85a8f02213c17779024783f944cf1b82bce5fd3d1eaa4af757a58a55d50276264d916d46ce20731483dbd39ab2af8a8275c962efad10

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  11KB

                                  MD5

                                  897fece66cb2099fc0fef5a54c428727

                                  SHA1

                                  cbfeb83e396ba45ca0182e1fb5e68576b86993e1

                                  SHA256

                                  a23ed1eaf57be3323bc5d7772568f40dc464484557b93311a13740a47fb40b19

                                  SHA512

                                  2f8fe9004c687200df741ceb5cc02981266f5ae5dc432c261a4bdfb4ff2a56e6168ee7d80d43c7b193b16e1fde9f43b411192815baf1a8fae345de63ed73b5f8

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  10KB

                                  MD5

                                  6fde8db62755759a865df855edc79f8b

                                  SHA1

                                  ac88b9f896bc20ddb022f9273275b4173f7ca747

                                  SHA256

                                  93e2d08b8f35e2045acc43657b063748bd2064171f6e2e583b6872924eeab6e8

                                  SHA512

                                  28aed747a9e6892218b3666c3dd461595ca51770d6f3cb1ce41bf7a92833b6245c47737bb4621bdafba334e15af8270fbc7bb07c373aa3d0f73055dfc82ae3ae

                                • C:\Users\Admin\AppData\Local\Programs\Walliant\AsyncBridge.Net35.dll

                                  Filesize

                                  23KB

                                  MD5

                                  35cbdbe6987b9951d3467dda2f318f3c

                                  SHA1

                                  c0c7bc36c2fb710938f7666858324b141bc5ff22

                                  SHA256

                                  e4915f18fd6713ee84f27a06ed1f6f555cdbebe1522792cf4b4961664550cf83

                                  SHA512

                                  e1f456f0b4db885f8475d2837f32f31c09f4b303c118f59be4786cf4303a31a2d3004656a3fcfbbf354326ed404afcb4d60966bca04a5e5de8fb8feaf581bce7

                                • C:\Users\Admin\AppData\Local\Programs\Walliant\Countly.dll

                                  Filesize

                                  114KB

                                  MD5

                                  bf6a0f5d2d5f54ceb5b899a2172a335b

                                  SHA1

                                  e8992a9d4aeb39647b262d36c1e28ac14702c83e

                                  SHA256

                                  32ef07a1a2954a40436d625814d0ce0e04f4a45e711beebc7e159d4c1b2556b6

                                  SHA512

                                  49a093345160b645209f4fc806ae67a55ff35e50f54c9fa7ec49d153743e448db9c2fafae61659165d0082fabc473c3e7d47573a481161ddb4c9b5fdd079fc90

                                • C:\Users\Admin\AppData\Local\Programs\Walliant\Newtonsoft.Json.dll

                                  Filesize

                                  495KB

                                  MD5

                                  283544d7f0173e6b5bfbfbc23d1c2fb0

                                  SHA1

                                  3e33b2ef50dac60b7411a84779d61bdb0ed9d673

                                  SHA256

                                  9165e595b3a0de91ac91a38e742597e12ebb2a5a8fa53058d964a06ceaef7735

                                  SHA512

                                  150b45cd43dc5cf191c85524c15dea09fbb48766ad802851270eaacfd73f3d097fef8dcf0ea042184220e7bc71413677d88a206d8bbe60374986e4789054040b

                                • C:\Users\Admin\AppData\Local\Programs\Walliant\SharpRaven.dll

                                  Filesize

                                  72KB

                                  MD5

                                  c1a31ab7394444fd8aa2e8fe3c7c5094

                                  SHA1

                                  649a0915f4e063314e3f04d284fea8656f6eb62b

                                  SHA256

                                  64b7231eda298844697d38dd3539bd97fe995d88ae0c5e0c09d63a908f7336c4

                                  SHA512

                                  3514a69552dd1e1b63a235d7e3a1e982a72a9741ade4a931fc8d8e61f402228ad3243be9321d87fdefdfe137fc357925a931966266ec58c19296adb210be9b0e

                                • C:\Users\Admin\AppData\Local\Programs\Walliant\System.Threading.dll

                                  Filesize

                                  378KB

                                  MD5

                                  f5ee17938d7c545bf62ad955803661c7

                                  SHA1

                                  dd0647d250539f1ec580737de102e2515558f422

                                  SHA256

                                  8a791af9e3861e231662b657098a823b21a084cbb6a4901d6ccf363405849a78

                                  SHA512

                                  669a89ad811cda4f3ff4aa318aa03e26e4cb41ea22bc321bad02a671273d867cbd223a64bb30da592a5484a9f1cec77c96f5bf63b1fe586b6d3688b8c9da530c

                                • C:\Users\Admin\AppData\Local\Programs\Walliant\sdk.dll

                                  Filesize

                                  11.3MB

                                  MD5

                                  fddc7534f3281feb4419da7404d89b4c

                                  SHA1

                                  19bdefc2c9e0abd03fe5ee4fad9c813a837f844f

                                  SHA256

                                  f13da9813fa11b81ee4180794cbad2b280422716a080bf4c0791996be7f7908e

                                  SHA512

                                  c5428179dc222366234125bd78f63a9350c9329e4d46646bb3361de143974d261bd7a8df6155bc7ef46ad3725302837f4769a26459b8b4b5b5304a810303b1ea

                                • C:\Users\Admin\AppData\Local\Programs\Walliant\walliant.exe

                                  Filesize

                                  257KB

                                  MD5

                                  60d3737a1f84758238483d865a3056dc

                                  SHA1

                                  17b13048c1db4e56120fed53abc4056ecb4c56ed

                                  SHA256

                                  3436c29dec2c7f633f4766acaf334f6c395d70ea6180c0ea7c1610591d5d89b9

                                  SHA512

                                  d34f42b59349f3be1ac39a57207f616a44f56a6c74157be8116fff5df75275928065065a89f10bd79849e58b14d1e5e0ea156be5996ff8ca4f5d854e107c96fe

                                • C:\Users\Admin\AppData\Local\Programs\Walliant\walliant.exe.config

                                  Filesize

                                  1KB

                                  MD5

                                  b492287271363085810ef581a1be0fa3

                                  SHA1

                                  4b27b7d87e2fdbdda530afcda73784877cc1a691

                                  SHA256

                                  a5fcca5b80f200e9a3ff358d9cac56a0ffabb6f26d97da7f850de14f0fb2709e

                                  SHA512

                                  859fa454d8a72771038dc2ff9e7ec3905f83a6a828cc4fc78107b309bdcd45724c749357011af978163f93e7096eb9e9419e3258ea9bd6b652154fe6dd01d036

                                • C:\Users\Admin\AppData\Local\Temp\is-4CH44.tmp\ska2pwej.aeh.tmp

                                  Filesize

                                  2.5MB

                                  MD5

                                  62e5dbc52010c304c82ada0ac564eff9

                                  SHA1

                                  d911cb02fdaf79e7c35b863699d21ee7a0514116

                                  SHA256

                                  bd54ad7a25594dc823572d9b23a3490ff6b8b1742a75e368d110421ab08909b2

                                  SHA512

                                  b5d863ea38816c18f7778ef12ea4168ceb0dae67704c0d1d4a60b0237ca6e758c1dfc5c28d4fc9679b0159de25e56d5dfff8addacd7a9c52572674d90c424946

                                • C:\Users\Admin\Downloads\Walliant (1).zip:Zone.Identifier

                                  Filesize

                                  26B

                                  MD5

                                  fbccf14d504b7b2dbcb5a5bda75bd93b

                                  SHA1

                                  d59fc84cdd5217c6cf74785703655f78da6b582b

                                  SHA256

                                  eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                  SHA512

                                  aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                • memory/2332-366-0x0000000000400000-0x00000000004D8000-memory.dmp

                                  Filesize

                                  864KB

                                • memory/2332-340-0x0000000000400000-0x00000000004D8000-memory.dmp

                                  Filesize

                                  864KB

                                • memory/2332-445-0x0000000000400000-0x00000000004D8000-memory.dmp

                                  Filesize

                                  864KB

                                • memory/3836-466-0x0000000070F00000-0x00000000719FA000-memory.dmp

                                  Filesize

                                  11.0MB

                                • memory/4216-367-0x0000000000400000-0x000000000068E000-memory.dmp

                                  Filesize

                                  2.6MB

                                • memory/4216-444-0x0000000000400000-0x000000000068E000-memory.dmp

                                  Filesize

                                  2.6MB