Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2024, 04:21

General

  • Target

    https://filedm.com/NuQqV

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 64 IoCs
  • Checks for any installed AV software in registry 1 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates processes with tasklist 1 TTPs 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 22 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 3 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 8 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • NTFS ADS 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://filedm.com/NuQqV
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c8c046f8,0x7ff9c8c04708,0x7ff9c8c04718
      2⤵
        PID:4864
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:2
        2⤵
          PID:3692
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1944
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:8
          2⤵
            PID:2388
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
            2⤵
              PID:5096
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1
              2⤵
                PID:1340
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:8
                2⤵
                  PID:64
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1724
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:1
                  2⤵
                    PID:972
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5504 /prefetch:8
                    2⤵
                      PID:4504
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:1
                      2⤵
                        PID:5060
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6040 /prefetch:8
                        2⤵
                          PID:4604
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1560
                        • C:\Users\Admin\Downloads\Vega X Windows_16447098.exe
                          "C:\Users\Admin\Downloads\Vega X Windows_16447098.exe"
                          2⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Modifies registry class
                          • Suspicious use of SetWindowsHookEx
                          PID:2976
                          • C:\Users\Admin\AppData\Local\setup16447098.exe
                            C:\Users\Admin\AppData\Local\setup16447098.exe hhwnd=393672 hreturntoinstaller hextras=id:964bc9f9d4b9a45-US-NuQqV
                            3⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            • Modifies system certificate store
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of SetWindowsHookEx
                            PID:1032
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\H2OCleanup.bat""
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:5644
                              • C:\Windows\SysWOW64\tasklist.exe
                                tasklist /FI "PID eq 1032" /fo csv
                                5⤵
                                • Enumerates processes with tasklist
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5744
                              • C:\Windows\SysWOW64\find.exe
                                find /I "1032"
                                5⤵
                                • System Location Discovery: System Language Discovery
                                PID:5592
                              • C:\Windows\SysWOW64\timeout.exe
                                timeout 5
                                5⤵
                                • System Location Discovery: System Language Discovery
                                • Delays execution with timeout.exe
                                PID:5976
                          • C:\Users\Admin\AppData\Local\setup16447098.exe
                            C:\Users\Admin\AppData\Local\setup16447098.exe hready
                            3⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:5252
                        • C:\Users\Admin\Downloads\Vega X Windows_16447098.exe
                          "C:\Users\Admin\Downloads\Vega X Windows_16447098.exe"
                          2⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Modifies registry class
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SetWindowsHookEx
                          PID:3256
                          • C:\Users\Admin\AppData\Local\setup16447098.exe
                            C:\Users\Admin\AppData\Local\setup16447098.exe hhwnd=328154 hreturntoinstaller hextras=id:964bc9f9d4b9a45-US-NuQqV
                            3⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Checks for any installed AV software in registry
                            • System Location Discovery: System Language Discovery
                            • Modifies system certificate store
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of SetWindowsHookEx
                            PID:3788
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\H2OCleanup.bat""
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:5632
                              • C:\Windows\SysWOW64\tasklist.exe
                                tasklist /FI "PID eq 3788" /fo csv
                                5⤵
                                • Enumerates processes with tasklist
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of AdjustPrivilegeToken
                                PID:640
                              • C:\Windows\SysWOW64\find.exe
                                find /I "3788"
                                5⤵
                                • System Location Discovery: System Language Discovery
                                PID:1336
                              • C:\Windows\SysWOW64\timeout.exe
                                timeout 5
                                5⤵
                                • System Location Discovery: System Language Discovery
                                • Delays execution with timeout.exe
                                PID:5424
                          • C:\Users\Admin\AppData\Local\setup16447098.exe
                            C:\Users\Admin\AppData\Local\setup16447098.exe hready
                            3⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:5904
                          • C:\Windows\SysWOW64\NOTEPAD.EXE
                            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\link.txt
                            3⤵
                            • System Location Discovery: System Language Discovery
                            • Opens file in notepad (likely ransom note)
                            PID:5652
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6252 /prefetch:1
                          2⤵
                            PID:5136
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6388 /prefetch:1
                            2⤵
                              PID:5144
                            • C:\Users\Admin\Downloads\Vega X Windows_16447098.exe
                              "C:\Users\Admin\Downloads\Vega X Windows_16447098.exe"
                              2⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of SetWindowsHookEx
                              PID:5840
                              • C:\Users\Admin\AppData\Local\setup16447098.exe
                                C:\Users\Admin\AppData\Local\setup16447098.exe hhwnd=655394 hreturntoinstaller hextras=id:964bc9f9d4b9a45-US-NuQqV
                                3⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of SetWindowsHookEx
                                PID:6092
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\H2OCleanup.bat""
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:6016
                                  • C:\Windows\SysWOW64\tasklist.exe
                                    tasklist /FI "PID eq 6092" /fo csv
                                    5⤵
                                    • Enumerates processes with tasklist
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:6044
                                  • C:\Windows\SysWOW64\find.exe
                                    find /I "6092"
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:6060
                                  • C:\Windows\SysWOW64\timeout.exe
                                    timeout 5
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    • Delays execution with timeout.exe
                                    PID:6128
                              • C:\Users\Admin\AppData\Local\setup16447098.exe
                                C:\Users\Admin\AppData\Local\setup16447098.exe hready
                                3⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:5296
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:1
                              2⤵
                                PID:5420
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6584 /prefetch:1
                                2⤵
                                  PID:5436
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3900 /prefetch:1
                                  2⤵
                                    PID:2488
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6512 /prefetch:1
                                    2⤵
                                      PID:5444
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6228 /prefetch:1
                                      2⤵
                                        PID:5620
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6236 /prefetch:1
                                        2⤵
                                          PID:6012
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6276 /prefetch:8
                                          2⤵
                                            PID:5800
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6528 /prefetch:1
                                            2⤵
                                              PID:2916
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6300 /prefetch:1
                                              2⤵
                                                PID:5636
                                              • C:\Windows\system32\NOTEPAD.EXE
                                                "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Vega X Windows.txt
                                                2⤵
                                                  PID:5288
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:1
                                                  2⤵
                                                    PID:3960
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6688 /prefetch:2
                                                    2⤵
                                                      PID:3200
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6304 /prefetch:1
                                                      2⤵
                                                        PID:5680
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:1
                                                        2⤵
                                                          PID:5296
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8141892479684947463,8282820199593041479,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:1
                                                          2⤵
                                                            PID:4676
                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                          1⤵
                                                            PID:3708
                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                            1⤵
                                                              PID:4516
                                                            • C:\Windows\System32\rundll32.exe
                                                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                              1⤵
                                                                PID:5384

                                                              Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

                                                                      Filesize

                                                                      854B

                                                                      MD5

                                                                      e935bc5762068caf3e24a2683b1b8a88

                                                                      SHA1

                                                                      82b70eb774c0756837fe8d7acbfeec05ecbf5463

                                                                      SHA256

                                                                      a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d

                                                                      SHA512

                                                                      bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      5bb43cd1a75c390e717e8518db0cb0db

                                                                      SHA1

                                                                      2a66ca6c5be175772c055d8a3377a4a858d6e972

                                                                      SHA256

                                                                      9e18905a5f883f1c2b1de176277b1adbcef6685a5daa77a2224bf2e52b49ff7b

                                                                      SHA512

                                                                      452a985cc4f4dc234059f7dc671bf04f61a5e1ded3ca7d31115a054502016b6a7314c6ac5e2b6b3fab2af40cf883fcaf0d52bce23d4fb3a2d62bac8203300e62

                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7AC808F2E889734EBC6F689B70B91F12_618D34F351E24C6C0410CC0C828FF379

                                                                      Filesize

                                                                      471B

                                                                      MD5

                                                                      0373f7a3518d0466c39c4a848cff476f

                                                                      SHA1

                                                                      8d2c3d6bfc16b298f54e645371257c3073059e1f

                                                                      SHA256

                                                                      5f17c7d381789a21745476d084c503df08d985295e3d06835ec6752109b0b7da

                                                                      SHA512

                                                                      a4677987ba8396c635fe2e8a2675eeae85fc958a79369a2e726ea6fb34cba5ec6c68510bef35437c8e77191107dde3bc56924875ded693f5613783454eac8917

                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

                                                                      Filesize

                                                                      170B

                                                                      MD5

                                                                      522be5ffc164d5f4dda6d886451469a3

                                                                      SHA1

                                                                      e15c4f24cf4db01707f4033156b07be93e375bbe

                                                                      SHA256

                                                                      552f06d937981d2025213366de72ad943104607491e710a735e3e92e97f8191d

                                                                      SHA512

                                                                      b66bdfb3eef200407a65fdbc8be710c49770a98b359ab7ccba22be6d690b6c53c24ea43d31cbc86ee9174f1413c9068a022ab4ef73bfb050fa0a8c94385b0deb

                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                                                      Filesize

                                                                      410B

                                                                      MD5

                                                                      c4dad1475d8405a960928d3aea12c1cb

                                                                      SHA1

                                                                      f4a6ed78e40f3f8727fb93e8caa176266a38c5ef

                                                                      SHA256

                                                                      093172314d339302f455d6ecd651c1b67eb808db5701e0438d6aa6a50de6b935

                                                                      SHA512

                                                                      25111d19a36542b65836437b504d2398d54059697b8dcd58cd8d0a31c90d2c2cedcc67a311bde58a281fdc00defc305e1aa1df2de0a85bd40a2b0d648458798d

                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7AC808F2E889734EBC6F689B70B91F12_618D34F351E24C6C0410CC0C828FF379

                                                                      Filesize

                                                                      414B

                                                                      MD5

                                                                      6b74f01bbcc198f34c4b902462511981

                                                                      SHA1

                                                                      429ec41f7ace0fc75c12cbb2632abd6e19f9e4e6

                                                                      SHA256

                                                                      ebefba0180b246ca8f879c8ce402ff7c3a56dc33cb6f9b211b27c0f79d59ca80

                                                                      SHA512

                                                                      efe6bddca5ea016b6f5bde95ccf8e854213f97021d378230463fb92a986f21eab13f8ce43a567f25e5dfc5c60ca6156efc0f2056e3293a6ffd4e6abb82adce6b

                                                                    • C:\Users\Admin\AppData\Local\DT001\setup16447098.exe_Url_qy1qtodlwdxnma3xlwudtfrg5icr0mvs\2.0.5.6649\jx42grzw.newcfg

                                                                      Filesize

                                                                      798B

                                                                      MD5

                                                                      f3da41e2f01ec12a28efa662df2fa963

                                                                      SHA1

                                                                      9760227f497132829ec34fffec6184969043bba1

                                                                      SHA256

                                                                      a4544f806b5637e45e2e702c7997d0b6a52b805670a72aac518d189c3004d1c2

                                                                      SHA512

                                                                      ae4f56f93a2386abe8891ba5ba1cc7de166a28c6a2f3913870bed2926ac43469bbbf0b4b18acf2fce7c7f120056e36b3777aabbdf9715cc12d2159403e392e59

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                      Filesize

                                                                      152B

                                                                      MD5

                                                                      e4f80e7950cbd3bb11257d2000cb885e

                                                                      SHA1

                                                                      10ac643904d539042d8f7aa4a312b13ec2106035

                                                                      SHA256

                                                                      1184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124

                                                                      SHA512

                                                                      2b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                      Filesize

                                                                      152B

                                                                      MD5

                                                                      2dc1a9f2f3f8c3cfe51bb29b078166c5

                                                                      SHA1

                                                                      eaf3c3dad3c8dc6f18dc3e055b415da78b704402

                                                                      SHA256

                                                                      dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa

                                                                      SHA512

                                                                      682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                      Filesize

                                                                      192B

                                                                      MD5

                                                                      2ce5f3ba87c47cd5cee06cfa36ccc6cd

                                                                      SHA1

                                                                      adfed363f0f2930c557bbd41fcb52d72f0b80efa

                                                                      SHA256

                                                                      b7dce422bdf3b7dd08ecad5dd1e76aa6a78641f5aa45b1d051400cc35e8c149f

                                                                      SHA512

                                                                      f4febfdc858933ca4fa1e1c2f9cab1f9d4d2b71670b6f0be05718b3dadd022ced88fcc7d606ecee3c5d66c38413172dc45046cfa527c9e1fcc7fbc1ef7e57831

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                      Filesize

                                                                      216B

                                                                      MD5

                                                                      9d2dd8fc3ad30f23a6d6794c22eef557

                                                                      SHA1

                                                                      405f2e0b17805c1dda8526c530c55dc242aaab8c

                                                                      SHA256

                                                                      803af8291ba40f7793e1509024bcedbb6064eef9c9f82f49874787195a212af2

                                                                      SHA512

                                                                      72786854db081646735743e9760541f2f102f148866986c50ce131ba053f6fae9cd2bb5af46f5218081e1589b1502883a75daadcd13e1f949f4269140ee65835

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT

                                                                      Filesize

                                                                      16B

                                                                      MD5

                                                                      46295cac801e5d4857d09837238a6394

                                                                      SHA1

                                                                      44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                      SHA256

                                                                      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                      SHA512

                                                                      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      f67f249a9c007001ab5bdf4f6c72ebc3

                                                                      SHA1

                                                                      8021a680ec1f88e6b34cb6bf93d5207c9ec661a4

                                                                      SHA256

                                                                      e8a8799f3888c15e71398f3b9011275557da2eb8ec5d8000a5cd5f47457e8f4f

                                                                      SHA512

                                                                      f807f3c6da4f5677dca80de5121361bd6f212c05d7c9168328f566fb67d5f8107d121db76eef82e7d3e0832d8f3dd28c29f89cf5fc038da9104c1bb27f7e965c

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      e5e2711bfb968554a713321a7fd8d4e5

                                                                      SHA1

                                                                      d3c1d4b2bf127312e63684adb9dabc706b8e6b44

                                                                      SHA256

                                                                      3660a9095d382fde75037635a9b8cdd582f1cabd5bf3cc8986ae733421fdcf24

                                                                      SHA512

                                                                      9e2a883358a510961176dba5445bfc139dc0fea95626f9825e4547d1c7b2b9e0b7da97bf8aadfd600371ae2823eb84beec3c5371b1c963a1df514040385bf9c9

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      5KB

                                                                      MD5

                                                                      304afa1a44ff01031ccc5f1d1212af5c

                                                                      SHA1

                                                                      04d04d030e644c3a58d440456382b649a0b55636

                                                                      SHA256

                                                                      059c3b15685a7c25500ac6ef4318bed884f86daa6b4374ff731760edfb1fb8e8

                                                                      SHA512

                                                                      4406daf4aebff1e6c1dd7f0f308e923a4bee8017d6981d1cee55333e5e1ec81fb3cfe48423542fd243c071379b61e95ece452b146e0ecc823fb018f97f7d045e

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      40252cbd0522afd8f66262363ef96d8b

                                                                      SHA1

                                                                      84278b2af3a68eec608a23129aac6bf168d99e99

                                                                      SHA256

                                                                      9ef70b2f0e4909f2ebbc0fd30728f096390532c9582df4a9b85d60171035915a

                                                                      SHA512

                                                                      a012bdfd9e49435a53daa3d961f073091f52ac6ecd57f96124fefca7a7f5c9552a565011ff23d10d3b0def43e10bbbbba46957d89d5033fab3a74c8038d9bf2d

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      8a4404784ee265a226f8742dd643a78e

                                                                      SHA1

                                                                      952e37401cff6e0e37796734094d6597690d6789

                                                                      SHA256

                                                                      7e35fd6a13f91057b474d39496c1de6c18e378efd3486d18e7473149599e3355

                                                                      SHA512

                                                                      a4634154c6b7b8cc6deff49dee720f100083819be9b669221ce762334f181d58e25063da492680357aa4f254d5e40553ba7a9f604eaa2da0c66c35fba2863832

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      ff4a0160afb5dd64c55e27441e6f0574

                                                                      SHA1

                                                                      7bb3b9f28170d75d9a7ae9576e13a47ef8e979ca

                                                                      SHA256

                                                                      24fb88e2a7570ba385e523fac2d26ea3d9505b57f7ed09c42e9a6a35ad1c520d

                                                                      SHA512

                                                                      dea54860b04aa72c5ab41d14fe8d95b07bbd60548eb963f7b0e43d2701dab5430a31479f097295d6cdf82688ca86e7ffc3877ee322b1c991e9cf48d231c2abcb

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001

                                                                      Filesize

                                                                      41B

                                                                      MD5

                                                                      5af87dfd673ba2115e2fcf5cfdb727ab

                                                                      SHA1

                                                                      d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                      SHA256

                                                                      f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                      SHA512

                                                                      de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                      Filesize

                                                                      72B

                                                                      MD5

                                                                      ea5acb1da18595ddc0716d5296d15438

                                                                      SHA1

                                                                      b8dbd8d0a9d89a37c0c06425a58304647555895d

                                                                      SHA256

                                                                      b1f05b0b69abeb1b5e107c3505eebbe63cb84b33e958577fc563ae9357097746

                                                                      SHA512

                                                                      d066c1d03e4e77aa9da8ccbb37ba074b61a49bd846506b7335d867cff16bafb49966c3aa260d2404bc771bc77d6d033dce221290e7708468431a5b3c694374ce

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe598b2f.TMP

                                                                      Filesize

                                                                      48B

                                                                      MD5

                                                                      0a6c27543036da55a5d657eef29ec556

                                                                      SHA1

                                                                      dea8d7032188af1c2d42fd6209aee5c721eee502

                                                                      SHA256

                                                                      696c1cc30f27dbeec303f74a52ba69bdd7d528a5acc85845ee460abe776d7948

                                                                      SHA512

                                                                      cc69ada473316bce1622beacd4e31f589673784f8ee2a251df1e7f0a07185762cbd96cf4bb96f25c45e68555419550db084977b65d4bda1a54be33397fda8171

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                      Filesize

                                                                      532B

                                                                      MD5

                                                                      b953ecb2120a9f524ffbbe7a9dce54a7

                                                                      SHA1

                                                                      0cdf0dd92a95050992093223d5cc86a9666ddb6f

                                                                      SHA256

                                                                      dae1e06ec1d9e703eca4d10d4d782da5a698cbf19ba6c3787321fc8571d7baba

                                                                      SHA512

                                                                      4fc129abf1039906aa09b7791d86f63c77020cb8a0334bba9b511a91128d1d2f1f327644efb8ad1f03be7ab900d7f0a27bc22757443b737bbb2e5afd9935b700

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe595a99.TMP

                                                                      Filesize

                                                                      367B

                                                                      MD5

                                                                      f38308198444f6922521818d633643b1

                                                                      SHA1

                                                                      f5a26c9bfb3f5420375fa40ff144c080d3037b3b

                                                                      SHA256

                                                                      573d2a56c6071744c2a607223fcbd1abb6619aaa064ae331bb5e2cb078795148

                                                                      SHA512

                                                                      48e77a1031bd403c524090aa468067239fe12c4ba898c87211ad95f89b4406608f5ad1567d269de62a878586b11038e6d76b7f432ba027d3c7773f814ed26fc0

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                      Filesize

                                                                      16B

                                                                      MD5

                                                                      6752a1d65b201c13b62ea44016eb221f

                                                                      SHA1

                                                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                      SHA256

                                                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                      SHA512

                                                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                      Filesize

                                                                      11KB

                                                                      MD5

                                                                      d1de0a209519f715094022c532ee9113

                                                                      SHA1

                                                                      64c2697825ba17693bf12494a68577aef5250479

                                                                      SHA256

                                                                      b3495f79b0a6aaddbbc19884d32be1762889f6941c01e92292033b1df400551c

                                                                      SHA512

                                                                      92499541153c4994992f24252e64a0a3b68ad71e2aef5ad4f66d926b759a519895c0a07833d3683ecb68c6eb5d8f82d8637dad5c2b1e0fa753a44ed03f1ab62c

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                      Filesize

                                                                      12KB

                                                                      MD5

                                                                      b889d09eb3eed4390ffe32d0b4e85cff

                                                                      SHA1

                                                                      f8c9ea86582105fca6a42479ed0e0b1bb995890d

                                                                      SHA256

                                                                      369876261b787f67746ab7b88a52c02b9782f7c523059275518c7c064646e085

                                                                      SHA512

                                                                      d03b3c8ab58360399ff2fedd0a7dd014a0cd55ec146e34b1045b389550295d1a78d1533e7647f8740e5e7203be7ca7df75a4542e1a0dbde50d46a73f27ee6ef2

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                      Filesize

                                                                      11KB

                                                                      MD5

                                                                      560f1e707af4447e7991f9a154c4548b

                                                                      SHA1

                                                                      78a4d291e584d93de3f995fc390534d38f96d96d

                                                                      SHA256

                                                                      3f733e61da7d03674a99a6f69329c12de8a400f11a6f5b384610689f13fcebb9

                                                                      SHA512

                                                                      5cfb0837e55e851bff14ea2c226b4d4c16881c7d9439363dcfb1543d91cefaee9acaecb583b355b7759b5b7616d7c310ef6c4d4a693ef290ace47d268baaa63f

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                      Filesize

                                                                      12KB

                                                                      MD5

                                                                      e22e8cebed86059cc5ee232b7eda8f88

                                                                      SHA1

                                                                      31747522a1e9447e8f8802f63618b224fd36a6bf

                                                                      SHA256

                                                                      cd8844a12ab1d8e9c549b3e8af4466f70edec03432e5d52a3621f5217ad518a3

                                                                      SHA512

                                                                      5432f5e433306bea4d529050840b83c6878ec53df2093a0b94e3501c23a992270624f3730886464aa5e34eda731607b8333d356eac0c4cb48e007a45c00028fc

                                                                    • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\GenericSetup.LastScreen.dll

                                                                      Filesize

                                                                      57KB

                                                                      MD5

                                                                      6e001f8d0ee4f09a6673a9e8168836b6

                                                                      SHA1

                                                                      334ad3cf0e4e3c03415a4907b2d6cf7ba4cbcd38

                                                                      SHA256

                                                                      6a30f9c604c4012d1d2e1ba075213c378afb1bfcb94276de7995ed7bbf492859

                                                                      SHA512

                                                                      0eff2e6d3ad75abf801c2ab48b62bc93ebc5a128d2e03e507e6e5665ff9a2ab58a9d82ca71195073b971f8c473f339baffdd23694084eaaff321331b5faaecf6

                                                                    • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\GenericSetup.dll

                                                                      Filesize

                                                                      117KB

                                                                      MD5

                                                                      08112f27dcd8f1d779231a7a3e944cb1

                                                                      SHA1

                                                                      39a98a95feb1b6295ad762e22aa47854f57c226f

                                                                      SHA256

                                                                      11c6a8470a3f2b2be9b8cafe5f9a0afce7303bfd02ab783a0f0ee09a184649fa

                                                                      SHA512

                                                                      afd0c7df58b63c7cfdbedea7169a1617f2ac4bad07347f8ed7757a25ab0719489d93272109b73a1b53e9c5997dedad8da89da7b339d30fc2573ca2f76c630ddb

                                                                    • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\H2ODAL.dll

                                                                      Filesize

                                                                      15KB

                                                                      MD5

                                                                      422be1a0c08185b107050fcf32f8fa40

                                                                      SHA1

                                                                      c8746a8dad7b4bf18380207b0c7c848362567a92

                                                                      SHA256

                                                                      723aea78755292d2f4f87ad100a99b37bef951b6b40b62e2e2bbd4df3346d528

                                                                      SHA512

                                                                      dff51c890cb395665839070d37170d321dc0800981a42f173c6ea570684460146b4936af9d8567a6089bef3a7802ac4931c14031827689ef345ea384ceb47599

                                                                    • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\H2OModels.dll

                                                                      Filesize

                                                                      75KB

                                                                      MD5

                                                                      c06ac6dcfa7780cd781fc9af269e33c0

                                                                      SHA1

                                                                      f6b69337b369df50427f6d5968eb75b6283c199d

                                                                      SHA256

                                                                      b23b8310265c14d7e530b80defc6d39cdc638c07d07cd2668e387863c463741d

                                                                      SHA512

                                                                      ad167ad62913243e97efaeaa7bad38714aba7fc11f48001974d4f9c68615e9bdfb83bf623388008e77d61cee0eaba55ce47ebbb1f378d89067e74a05a11d9fe3

                                                                    • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\H2OResources.dll

                                                                      Filesize

                                                                      19KB

                                                                      MD5

                                                                      554c3e1d68c8b5d04ca7a2264ca44e71

                                                                      SHA1

                                                                      ef749e325f52179e6875e9b2dd397bee2ca41bb4

                                                                      SHA256

                                                                      1eb0795b1928f6b0459199dace5affdc0842b6fba87be53ca108661275df2f3e

                                                                      SHA512

                                                                      58ce13c47e0daf99d66af1ea35984344c0bb11ba70fe92bc4ffa4cd6799d6f13bcad652b6883c0e32c6e155e9c1b020319c90da87cb0830f963639d53a51f9c6

                                                                    • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\H2OServices.dll

                                                                      Filesize

                                                                      160KB

                                                                      MD5

                                                                      6df226bda27d26ce4523b80dbf57a9ea

                                                                      SHA1

                                                                      615f9aba84856026460dc54b581711dad63da469

                                                                      SHA256

                                                                      17d737175d50eee97ac1c77db415fe25cc3c7a3871b65b93cc3fad63808a9abc

                                                                      SHA512

                                                                      988961d7a95c9883a9a1732d0b5d4443c790c38e342a9e996b072b41d2e8686389f36a249f2232cb58d72f8396c849e9cc52285f35071942bec5c3754b213dd5

                                                                    • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\H2OUtilities.dll

                                                                      Filesize

                                                                      119KB

                                                                      MD5

                                                                      9d2c520bfa294a6aa0c5cbc6d87caeec

                                                                      SHA1

                                                                      20b390db533153e4bf84f3d17225384b924b391f

                                                                      SHA256

                                                                      669c812cb8f09799083014a199b0deee10237c95fb49ee107376b952fee5bd89

                                                                      SHA512

                                                                      7e2e569549edb6ddd2b0cb0012386aed1f069e35d1f3045bb57704ef17b97129deb7cde8e23bc49980e908e1a5a90b739f68f36a1d231b1302a5d29b722e7c15

                                                                    • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\H2OViewModels.dll

                                                                      Filesize

                                                                      8KB

                                                                      MD5

                                                                      be4c2b0862d2fc399c393fca163094df

                                                                      SHA1

                                                                      7c03c84b2871c27fa0f1914825e504a090c2a550

                                                                      SHA256

                                                                      c202e4f92b792d34cb6859361aebdbfc8c61cf9e735edfd95e825839920fb88a

                                                                      SHA512

                                                                      d9c531687a5051bbfe5050c5088623b3fd5f20b1e53dd4d3ed281c8769c15f45da36620231f6d0d76f8e2aa7de00c2324a4bf35a815cefc70ca97bc4ab253799

                                                                    • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\HtmlAgilityPack.dll

                                                                      Filesize

                                                                      154KB

                                                                      MD5

                                                                      17220f65bd242b6a491423d5bb7940c1

                                                                      SHA1

                                                                      a33fabf2b788e80f0f7f84524fe3ed9b797be7ad

                                                                      SHA256

                                                                      23056f14edb6e0afc70224d65de272a710b5d26e6c3b9fe2dfd022073050c59f

                                                                      SHA512

                                                                      bfbe284a2ee7361ada9a9cb192580fd64476e70bc78d14e80ad1266f7722a244d890600cf24bfb83d4914e2434272679ba177ee5f98c709950e43192f05e215e

                                                                    • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\MyDownloader.Core.dll

                                                                      Filesize

                                                                      56KB

                                                                      MD5

                                                                      f931e960cc4ed0d2f392376525ff44db

                                                                      SHA1

                                                                      1895aaa8f5b8314d8a4c5938d1405775d3837109

                                                                      SHA256

                                                                      1c1c5330ea35f518bf85fad69dc2da1a98a4dfeadbf6ac0ba0ac7cc51bbcc870

                                                                      SHA512

                                                                      7fa5e582ad1bb094cbbb68b1db301dcf360e180eb58f8d726a112133277ceaa39660c6d4b3248c19a8b5767a4ae09f4597535711d789ca4f9f334a204d87ffe0

                                                                    • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\MyDownloader.Extension.dll

                                                                      Filesize

                                                                      168KB

                                                                      MD5

                                                                      28f1996059e79df241388bd9f89cf0b1

                                                                      SHA1

                                                                      6ad6f7cde374686a42d9c0fcebadaf00adf21c76

                                                                      SHA256

                                                                      c3f8a46e81f16bbfc75de44dc95f0d145213c8af0006bb097950ac4d1562f5ce

                                                                      SHA512

                                                                      9654d451cb2f184548649aa04b902f5f6aff300c6f03b9261ee3be5405527b4f23862d8988f9811987da22e386813e844e7c5068fd6421c91551f5b33c625f29

                                                                    • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\Newtonsoft.Json.dll

                                                                      Filesize

                                                                      541KB

                                                                      MD5

                                                                      9de86cdf74a30602d6baa7affc8c4a0f

                                                                      SHA1

                                                                      9c79b6fbf85b8b87dd781b20fc38ba2ac0664143

                                                                      SHA256

                                                                      56032ade45ccf8f4c259a2e57487124cf448a90bca2eeb430da2722d9e109583

                                                                      SHA512

                                                                      dca0f6078df789bb8c61ffb095d78f564bfc3223c6795ec88aeb5f132c014c5e3cb1bd8268f1e5dc96d7302c7f3de97e73807f3583cb4a320d7adbe93f432641

                                                                    • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\Ninject.dll

                                                                      Filesize

                                                                      133KB

                                                                      MD5

                                                                      8db691813a26e7d0f1db5e2f4d0d05e3

                                                                      SHA1

                                                                      7c7a33553dd0b50b78bf0ca6974c77088da253eb

                                                                      SHA256

                                                                      3043a65f11ac204e65bca142ff4166d85f1b22078b126b806f1fecb2a315c701

                                                                      SHA512

                                                                      d02458180ec6e6eda89b5b0e387510ab2fad80f9ce57b8da548aaf85c34a59c39afaeacd1947bd5eb81bee1f6d612ca57d0b2b756d64098dfc96ca0bf2d9f62f

                                                                    • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\OfferSDK.dll

                                                                      Filesize

                                                                      172KB

                                                                      MD5

                                                                      b199dcd6824a02522a4d29a69ab65058

                                                                      SHA1

                                                                      f9c7f8c5c6543b80fa6f1940402430b37fa8dce4

                                                                      SHA256

                                                                      9310a58f26be8bd453cde5ca6aa05042942832711fbdeb5430a2840232bfa5e4

                                                                      SHA512

                                                                      1d3e85e13ff24640c76848981ca84bafb32f819a082e390cb06fe13445814f50f8e3fc3a8a8e962aae8867e199c1517d570c07f28d5f7e5f007b2bb6e664ddb1

                                                                    • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\SciterWrapper.dll

                                                                      Filesize

                                                                      134KB

                                                                      MD5

                                                                      105a9e404f7ac841c46380063cc27f50

                                                                      SHA1

                                                                      ec27d9e1c3b546848324096283797a8644516ee3

                                                                      SHA256

                                                                      69fe749457218ec9a765f9aac74caf6d4f73084cf5175d3fd1e4f345af8b3b8b

                                                                      SHA512

                                                                      6990cbfc90c63962abde4fdaae321386f768be9fcf4d08bccd760d55aba85199f7a3e18bd7abe23c3a8d20ea9807cecaffb4e83237633663a8bb63dd9292d940

                                                                    • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\ServiceHide.Net.dll

                                                                      Filesize

                                                                      101KB

                                                                      MD5

                                                                      83d37fb4f754c7f4e41605ec3c8608ea

                                                                      SHA1

                                                                      70401de8ce89f809c6e601834d48768c0d65159f

                                                                      SHA256

                                                                      56db33c0962b3c34cba5279d2441bc4c12f28b569eadc1b3885dd0951b2c4020

                                                                      SHA512

                                                                      f5f3479f485b1829bbfb7eb8087353aee569184f9c506af15c4e28bfe4f73bf2cc220d817f6dfc34b2a7a6f69453f0b71e64b79c4d500ff9a243799f68e88b9f

                                                                    • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\ServiceHide.dll

                                                                      Filesize

                                                                      151KB

                                                                      MD5

                                                                      72990c7e32ee6c811ea3d2ea64523234

                                                                      SHA1

                                                                      a7fcbf83ec6eefb2235d40f51d0d6172d364b822

                                                                      SHA256

                                                                      e77e0b4f2762f76a3eaaadf5a3138a35ec06ece80edc4b3396de7a601f8da1b3

                                                                      SHA512

                                                                      2908b8c387d46b6329f027bc1e21a230e5b5c32460f8667db32746bc5f12f86927faa10866961cb2c45f6d594941f6828f9078ae7209a27053f6d11586fd2682

                                                                    • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\msvcp140.dll

                                                                      Filesize

                                                                      426KB

                                                                      MD5

                                                                      8ff1898897f3f4391803c7253366a87b

                                                                      SHA1

                                                                      9bdbeed8f75a892b6b630ef9e634667f4c620fa0

                                                                      SHA256

                                                                      51398691feef7ae0a876b523aec47c4a06d9a1ee62f1a0aee27de6d6191c68ad

                                                                      SHA512

                                                                      cb071ad55beaa541b5baf1f7d5e145f2c26fbee53e535e8c31b8f2b8df4bf7723f7bef214b670b2c3de57a4a75711dd204a940a2158939ad72f551e32da7ab03

                                                                    • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\vcruntime140.dll

                                                                      Filesize

                                                                      74KB

                                                                      MD5

                                                                      1a84957b6e681fca057160cd04e26b27

                                                                      SHA1

                                                                      8d7e4c98d1ec858db26a3540baaaa9bbf96b5bfe

                                                                      SHA256

                                                                      9faeaa45e8cc986af56f28350b38238b03c01c355e9564b849604b8d690919c5

                                                                      SHA512

                                                                      5f54c9e87f2510c56f3cf2ceeb5b5ad7711abd9f85a1ff84e74dd82d15181505e7e5428eae6ff823f1190964eb0a82a569273a4562ec4131cecfa00a9d0d02aa

                                                                    • C:\Users\Admin\AppData\Local\setup16447098.exe

                                                                      Filesize

                                                                      3.8MB

                                                                      MD5

                                                                      29d3a70cec060614e1691e64162a6c1e

                                                                      SHA1

                                                                      ce4daf2b1d39a1a881635b393450e435bfb7f7d1

                                                                      SHA256

                                                                      cc70b093a19610e9752794d757aec9ef07ca862ea9267ec6f9cc92b2aa882c72

                                                                      SHA512

                                                                      69d07437714259536373872e8b086fc4548f586e389f67e50f56d343e980546f92b8a13f28c853fc1daf187261087a9dceb33769ba2031c42382742d86c60e4b

                                                                    • C:\Users\Admin\Downloads\Vega X Windows.txt

                                                                      Filesize

                                                                      987B

                                                                      MD5

                                                                      76fb8e53411c388092e72ba27fc51405

                                                                      SHA1

                                                                      e5b897c2caf3ef6b606023dd57a67f50b76e9ba4

                                                                      SHA256

                                                                      de7a82691da9b1c521f8d3fcc1b684fc0a0a370b4eba44a446ad389723fca47c

                                                                      SHA512

                                                                      7a9146f75820939fbee754af3a599763cff06aaa217c2722aef9d847851d9d05fa78ebc179f145430d58abdc0a54a671777c591c50a129ebee46c32ab35e2348

                                                                    • C:\Users\Admin\Downloads\Vega X Windows_16447098.exe

                                                                      Filesize

                                                                      9.5MB

                                                                      MD5

                                                                      3d50042e3e3991be509f56a2951a2183

                                                                      SHA1

                                                                      f027790afe9d7ce2ddf17973f0778fb9e983ded1

                                                                      SHA256

                                                                      76eee256f1223082e8396611baca498542c656edd0fac5fe903e06e6cb5677e2

                                                                      SHA512

                                                                      120c6a7778bd9f65f469d3335987b780e736bd895ed944d0988372f891b48f9ba09b50ed9dcffd0bf1fa23a12e215ed1f1ffe75d11c925ff4c08d3e48259a873

                                                                    • memory/1032-315-0x0000000006660000-0x000000000666C000-memory.dmp

                                                                      Filesize

                                                                      48KB

                                                                    • memory/1032-304-0x00000000060B0000-0x000000000613C000-memory.dmp

                                                                      Filesize

                                                                      560KB

                                                                    • memory/1032-180-0x00000000050C0000-0x00000000050D4000-memory.dmp

                                                                      Filesize

                                                                      80KB

                                                                    • memory/1032-190-0x0000000005110000-0x0000000005134000-memory.dmp

                                                                      Filesize

                                                                      144KB

                                                                    • memory/1032-318-0x0000000006C40000-0x00000000071E4000-memory.dmp

                                                                      Filesize

                                                                      5.6MB

                                                                    • memory/1032-322-0x00000000077B0000-0x0000000007D64000-memory.dmp

                                                                      Filesize

                                                                      5.7MB

                                                                    • memory/1032-310-0x00000000061A0000-0x00000000064F4000-memory.dmp

                                                                      Filesize

                                                                      3.3MB

                                                                    • memory/1032-346-0x0000000006C10000-0x0000000006C3E000-memory.dmp

                                                                      Filesize

                                                                      184KB

                                                                    • memory/3788-197-0x00000000059B0000-0x00000000059D8000-memory.dmp

                                                                      Filesize

                                                                      160KB

                                                                    • memory/3788-237-0x0000000005B20000-0x0000000005B44000-memory.dmp

                                                                      Filesize

                                                                      144KB

                                                                    • memory/3788-144-0x0000000000CF0000-0x00000000010C8000-memory.dmp

                                                                      Filesize

                                                                      3.8MB

                                                                    • memory/3788-330-0x0000000007110000-0x00000000071A2000-memory.dmp

                                                                      Filesize

                                                                      584KB

                                                                    • memory/3788-205-0x00000000059E0000-0x0000000005A0E000-memory.dmp

                                                                      Filesize

                                                                      184KB

                                                                    • memory/3788-221-0x0000000005AB0000-0x0000000005AE2000-memory.dmp

                                                                      Filesize

                                                                      200KB

                                                                    • memory/3788-229-0x0000000005A70000-0x0000000005A8A000-memory.dmp

                                                                      Filesize

                                                                      104KB

                                                                    • memory/3788-286-0x0000000006230000-0x0000000006242000-memory.dmp

                                                                      Filesize

                                                                      72KB

                                                                    • memory/3788-245-0x0000000005AA0000-0x0000000005AAA000-memory.dmp

                                                                      Filesize

                                                                      40KB

                                                                    • memory/3788-253-0x0000000005B70000-0x0000000005B78000-memory.dmp

                                                                      Filesize

                                                                      32KB

                                                                    • memory/3788-271-0x0000000005B50000-0x0000000005B6D000-memory.dmp

                                                                      Filesize

                                                                      116KB

                                                                    • memory/3788-261-0x0000000005BC0000-0x0000000005BEC000-memory.dmp

                                                                      Filesize

                                                                      176KB

                                                                    • memory/3788-213-0x0000000005A40000-0x0000000005A68000-memory.dmp

                                                                      Filesize

                                                                      160KB

                                                                    • memory/3788-307-0x00000000068A0000-0x00000000068AA000-memory.dmp

                                                                      Filesize

                                                                      40KB

                                                                    • memory/3788-308-0x0000000006B10000-0x0000000006B32000-memory.dmp

                                                                      Filesize

                                                                      136KB

                                                                    • memory/5904-389-0x0000000005280000-0x000000000529D000-memory.dmp

                                                                      Filesize

                                                                      116KB