Resubmissions

27-10-2024 06:37

241027-hdl29asnap 10

27-10-2024 06:34

241027-hbv75ssrav 8

Analysis

  • max time kernel
    565s
  • max time network
    571s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-10-2024 06:37

General

  • Target

    The-MALWARE-Repo

  • Size

    298KB

  • MD5

    07c71f38ba70d3cd08780578f673366b

  • SHA1

    91920288a31959a00ba02ee68dbe64c874203e01

  • SHA256

    a2706ced712d733502af5ba0f15945a7c9744aa2fb1d9d98cc7aa3c128c5b523

  • SHA512

    56b93f6a9f77f715bca4b4fa07bfde2adf7440d8b01b8048bf1eb7cb6b446e15d0b4eaa9299dd001e3ea33d4c9fd30761334aebbccd9eb55528eeb50297b3cf6

  • SSDEEP

    6144:yLouSpOL/saqkPV9FemLtcsDSsmwF9VvZJT3CqbMrhryf65NRPaCieMjAkvCJv1N:AouSpOL/saqkPV9FemLtcsDSsmwF9Vv4

Malware Config

Extracted

Family

crimsonrat

C2

185.136.161.124

Signatures

  • CrimsonRAT main payload 1 IoCs
  • CrimsonRat

    Crimson RAT is a malware linked to a Pakistani-linked threat actor.

  • Crimsonrat family
  • UAC bypass 3 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 6 IoCs
  • Checks computer location settings 2 TTPs 11 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 27 IoCs
  • Loads dropped DLL 2 IoCs
  • Obfuscated with Agile.Net obfuscator 2 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Drops file in Windows directory 9 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 26 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo
    1⤵
      PID:2444
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
      1⤵
      • Enumerates system info in registry
      • Modifies registry class
      • NTFS ADS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4040
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fff5a9546f8,0x7fff5a954708,0x7fff5a954718
        2⤵
          PID:3996
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2012 /prefetch:2
          2⤵
            PID:4252
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:3
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4220
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:8
            2⤵
              PID:4336
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:1
              2⤵
                PID:3984
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:1
                2⤵
                  PID:1136
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:1
                  2⤵
                    PID:404
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:1
                    2⤵
                      PID:3920
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3700 /prefetch:1
                      2⤵
                        PID:1228
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:1
                        2⤵
                          PID:1128
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:1
                          2⤵
                            PID:4984
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3548 /prefetch:8
                            2⤵
                              PID:4144
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3548 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3652
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3612 /prefetch:1
                              2⤵
                                PID:804
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:1
                                2⤵
                                  PID:4560
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:1
                                  2⤵
                                    PID:2304
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:1
                                    2⤵
                                      PID:4636
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:1
                                      2⤵
                                        PID:3004
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3580 /prefetch:1
                                        2⤵
                                          PID:3100
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5908 /prefetch:8
                                          2⤵
                                            PID:4444
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:1
                                            2⤵
                                              PID:4440
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6432 /prefetch:8
                                              2⤵
                                                PID:1136
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6564 /prefetch:8
                                                2⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:2444
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:1
                                                2⤵
                                                  PID:3664
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5684 /prefetch:8
                                                  2⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:4476
                                                • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                                                  "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Downloads\Melissa.doc" /o ""
                                                  2⤵
                                                  • Checks processor information in registry
                                                  • Enumerates system info in registry
                                                  • Suspicious behavior: AddClipboardFormatListener
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:792
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6556 /prefetch:1
                                                  2⤵
                                                    PID:5244
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6716 /prefetch:2
                                                    2⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5324
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7032 /prefetch:8
                                                    2⤵
                                                      PID:5440
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:1
                                                      2⤵
                                                        PID:5600
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6916 /prefetch:8
                                                        2⤵
                                                          PID:5696
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6916 /prefetch:8
                                                          2⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:5868
                                                        • C:\Users\Admin\Downloads\MistInfected_newest.exe
                                                          "C:\Users\Admin\Downloads\MistInfected_newest.exe"
                                                          2⤵
                                                          • Drops file in Drivers directory
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          PID:5968
                                                          • C:\Users\Admin\AppData\Local\Temp\MistInfected_newest.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\MistInfected_newest.exe"
                                                            3⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:6020
                                                        • C:\Users\Admin\Downloads\MistInfected_newest.exe
                                                          "C:\Users\Admin\Downloads\MistInfected_newest.exe"
                                                          2⤵
                                                          • Drops file in Drivers directory
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          PID:6052
                                                        • C:\Users\Admin\Downloads\MistInfected_newest.exe
                                                          "C:\Users\Admin\Downloads\MistInfected_newest.exe"
                                                          2⤵
                                                          • Drops file in Drivers directory
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2440
                                                          • C:\Users\Admin\AppData\Local\Temp\MistInfected_newest.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\MistInfected_newest.exe"
                                                            3⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5052
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6776 /prefetch:1
                                                          2⤵
                                                            PID:224
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6768 /prefetch:8
                                                            2⤵
                                                              PID:4000
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7012 /prefetch:1
                                                              2⤵
                                                                PID:380
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1820 /prefetch:8
                                                                2⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:2068
                                                              • C:\Users\Admin\Downloads\MistInstaller.exe
                                                                "C:\Users\Admin\Downloads\MistInstaller.exe"
                                                                2⤵
                                                                • Drops file in Drivers directory
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                PID:4800
                                                              • C:\Users\Admin\Downloads\MistInstaller.exe
                                                                "C:\Users\Admin\Downloads\MistInstaller.exe"
                                                                2⤵
                                                                • Drops file in Drivers directory
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                PID:5056
                                                              • C:\Users\Admin\Downloads\MistInstaller.exe
                                                                "C:\Users\Admin\Downloads\MistInstaller.exe"
                                                                2⤵
                                                                • Drops file in Drivers directory
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                PID:1604
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6756 /prefetch:8
                                                                2⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:1036
                                                              • C:\Users\Admin\Downloads\MrsMajor3.0.exe
                                                                "C:\Users\Admin\Downloads\MrsMajor3.0.exe"
                                                                2⤵
                                                                • Checks computer location settings
                                                                • Executes dropped EXE
                                                                PID:5212
                                                                • C:\Windows\system32\wscript.exe
                                                                  "C:\Windows\system32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\79E6.tmp\79E7.tmp\79E8.vbs //Nologo
                                                                  3⤵
                                                                  • UAC bypass
                                                                  • Checks computer location settings
                                                                  • System policy modification
                                                                  PID:5364
                                                                  • C:\Users\Admin\AppData\Local\Temp\79E6.tmp\eulascr.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\79E6.tmp\eulascr.exe"
                                                                    4⤵
                                                                    • Executes dropped EXE
                                                                    • Loads dropped DLL
                                                                    PID:5448
                                                              • C:\Users\Admin\Downloads\MrsMajor3.0.exe
                                                                "C:\Users\Admin\Downloads\MrsMajor3.0.exe"
                                                                2⤵
                                                                • Checks computer location settings
                                                                • Executes dropped EXE
                                                                PID:5340
                                                                • C:\Windows\system32\wscript.exe
                                                                  "C:\Windows\system32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\7A72.tmp\7A73.tmp\7A74.vbs //Nologo
                                                                  3⤵
                                                                  • UAC bypass
                                                                  • Checks computer location settings
                                                                  • System policy modification
                                                                  PID:4612
                                                                  • C:\Users\Admin\AppData\Local\Temp\7A72.tmp\eulascr.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\7A72.tmp\eulascr.exe"
                                                                    4⤵
                                                                    • Executes dropped EXE
                                                                    • Loads dropped DLL
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:932
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7152 /prefetch:1
                                                                2⤵
                                                                  PID:5296
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2028 /prefetch:8
                                                                  2⤵
                                                                    PID:5596
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6724 /prefetch:8
                                                                    2⤵
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    PID:4568
                                                                  • C:\Users\Admin\Downloads\FreeYoutubeDownloader.exe
                                                                    "C:\Users\Admin\Downloads\FreeYoutubeDownloader.exe"
                                                                    2⤵
                                                                    • Checks computer location settings
                                                                    • Executes dropped EXE
                                                                    • Adds Run key to start application
                                                                    • Drops file in Windows directory
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:2420
                                                                    • C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe
                                                                      "C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe"
                                                                      3⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SendNotifyMessage
                                                                      PID:2052
                                                                  • C:\Users\Admin\Downloads\FreeYoutubeDownloader.exe
                                                                    "C:\Users\Admin\Downloads\FreeYoutubeDownloader.exe"
                                                                    2⤵
                                                                    • Executes dropped EXE
                                                                    • Drops file in Windows directory
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:5200
                                                                  • C:\Users\Admin\Downloads\FreeYoutubeDownloader.exe
                                                                    "C:\Users\Admin\Downloads\FreeYoutubeDownloader.exe"
                                                                    2⤵
                                                                    • Checks computer location settings
                                                                    • Executes dropped EXE
                                                                    • Adds Run key to start application
                                                                    • Drops file in Windows directory
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:4072
                                                                    • C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe
                                                                      "C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe"
                                                                      3⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SendNotifyMessage
                                                                      PID:5496
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2092 /prefetch:1
                                                                    2⤵
                                                                      PID:5244
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5520 /prefetch:8
                                                                      2⤵
                                                                        PID:5788
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1972,18258078893108844763,15962268896723262540,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5752 /prefetch:8
                                                                        2⤵
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        PID:1612
                                                                      • C:\Users\Admin\Downloads\CrimsonRAT.exe
                                                                        "C:\Users\Admin\Downloads\CrimsonRAT.exe"
                                                                        2⤵
                                                                        • Checks computer location settings
                                                                        • Executes dropped EXE
                                                                        PID:3448
                                                                        • C:\ProgramData\Hdlharas\dlrarhsiva.exe
                                                                          "C:\ProgramData\Hdlharas\dlrarhsiva.exe"
                                                                          3⤵
                                                                          • Executes dropped EXE
                                                                          PID:1084
                                                                      • C:\Users\Admin\Downloads\CrimsonRAT.exe
                                                                        "C:\Users\Admin\Downloads\CrimsonRAT.exe"
                                                                        2⤵
                                                                        • Checks computer location settings
                                                                        • Executes dropped EXE
                                                                        PID:5148
                                                                        • C:\ProgramData\Hdlharas\dlrarhsiva.exe
                                                                          "C:\ProgramData\Hdlharas\dlrarhsiva.exe"
                                                                          3⤵
                                                                          • Executes dropped EXE
                                                                          PID:4456
                                                                      • C:\Users\Admin\Downloads\CrimsonRAT.exe
                                                                        "C:\Users\Admin\Downloads\CrimsonRAT.exe"
                                                                        2⤵
                                                                        • Checks computer location settings
                                                                        • Executes dropped EXE
                                                                        PID:1248
                                                                        • C:\ProgramData\Hdlharas\dlrarhsiva.exe
                                                                          "C:\ProgramData\Hdlharas\dlrarhsiva.exe"
                                                                          3⤵
                                                                          • Executes dropped EXE
                                                                          PID:5680
                                                                      • C:\Users\Admin\Downloads\CrimsonRAT.exe
                                                                        "C:\Users\Admin\Downloads\CrimsonRAT.exe"
                                                                        2⤵
                                                                        • Checks computer location settings
                                                                        • Executes dropped EXE
                                                                        PID:5628
                                                                        • C:\ProgramData\Hdlharas\dlrarhsiva.exe
                                                                          "C:\ProgramData\Hdlharas\dlrarhsiva.exe"
                                                                          3⤵
                                                                          • Executes dropped EXE
                                                                          PID:2364
                                                                      • C:\Users\Admin\Downloads\CrimsonRAT.exe
                                                                        "C:\Users\Admin\Downloads\CrimsonRAT.exe"
                                                                        2⤵
                                                                        • Checks computer location settings
                                                                        • Executes dropped EXE
                                                                        PID:4436
                                                                        • C:\ProgramData\Hdlharas\dlrarhsiva.exe
                                                                          "C:\ProgramData\Hdlharas\dlrarhsiva.exe"
                                                                          3⤵
                                                                          • Executes dropped EXE
                                                                          PID:1240
                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                      1⤵
                                                                        PID:1752
                                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                        1⤵
                                                                          PID:4636

                                                                        Network

                                                                        MITRE ATT&CK Enterprise v15

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\ProgramData\Hdlharas\dlrarhsiva.exe

                                                                          Filesize

                                                                          9.1MB

                                                                          MD5

                                                                          64261d5f3b07671f15b7f10f2f78da3f

                                                                          SHA1

                                                                          d4f978177394024bb4d0e5b6b972a5f72f830181

                                                                          SHA256

                                                                          87f51b4632c5fbc351a59a234dfefef506d807f2c173aac23162b85d0d73c2ad

                                                                          SHA512

                                                                          3a9ff39e6bc7585b0b03f7327652e4c3b766563e8b183c25b6497e30956945add5684f1579862117e44c6bac2802601fc7c4d2a0daa1824f16c4da1fd6c9c91a

                                                                        • C:\ProgramData\Hdlharas\mdkhm.zip

                                                                          Filesize

                                                                          56KB

                                                                          MD5

                                                                          b635f6f767e485c7e17833411d567712

                                                                          SHA1

                                                                          5a9cbdca7794aae308c44edfa7a1ff5b155e4aa8

                                                                          SHA256

                                                                          6838286fb88e9e4e68882601a13fa770f1b510a0a86389b6a29070a129bf2e5e

                                                                          SHA512

                                                                          551ba05bd44e66685f359802b35a8c9775792a12844906b4b53e1a000d56624c6db323754331c9f399072790991c1b256d9114a50fb78111652a1c973d2880af

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\eulascr.exe.log

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          8b325485d0cc4762f87c0857e27c0e35

                                                                          SHA1

                                                                          1514778327d7c7b705dbf14f22ff9d8bdfdca581

                                                                          SHA256

                                                                          c18709d3ab63bebbbeba0791cd188db4121be8007c896a655d7f68535026cadf

                                                                          SHA512

                                                                          9bf9da14e50301d68246dc9f3a21319a8fbfc866d5b57ee44cd9ed96c1a6dfecabcec06b66be5ec5625ff708d460e23d00849c581957ab84c4f2941cee07ff33

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                          Filesize

                                                                          152B

                                                                          MD5

                                                                          8749e21d9d0a17dac32d5aa2027f7a75

                                                                          SHA1

                                                                          a5d555f8b035c7938a4a864e89218c0402ab7cde

                                                                          SHA256

                                                                          915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304

                                                                          SHA512

                                                                          c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                          Filesize

                                                                          152B

                                                                          MD5

                                                                          34d2c4f40f47672ecdf6f66fea242f4a

                                                                          SHA1

                                                                          4bcad62542aeb44cae38a907d8b5a8604115ada2

                                                                          SHA256

                                                                          b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33

                                                                          SHA512

                                                                          50fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000004

                                                                          Filesize

                                                                          62KB

                                                                          MD5

                                                                          c3c0eb5e044497577bec91b5970f6d30

                                                                          SHA1

                                                                          d833f81cf21f68d43ba64a6c28892945adc317a6

                                                                          SHA256

                                                                          eb48be34490ec9c4f9402b882166cd82cd317b51b2a49aae75cdf9ee035035eb

                                                                          SHA512

                                                                          83d3545a4ed9eed2d25f98c4c9f100ae0ac5e4bc8828dccadee38553b7633bb63222132df8ec09d32eb37d960accb76e7aab5719fc08cc0a4ef07b053f30cf38

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000006

                                                                          Filesize

                                                                          67KB

                                                                          MD5

                                                                          fb2f02c107cee2b4f2286d528d23b94e

                                                                          SHA1

                                                                          d76d6b684b7cfbe340e61734a7c197cc672b1af3

                                                                          SHA256

                                                                          925dd883d5a2eb44cf1f75e8d71346b98f14c4412a0ea0c350672384a0e83e7a

                                                                          SHA512

                                                                          be51d371b79f4cc1f860706207d5978d18660bf1dc0ca6706d43ca0375843ec924aa4a8ed44867661a77e3ec85e278c559ab6f6946cba4f43daf3854b838bb82

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000007

                                                                          Filesize

                                                                          19KB

                                                                          MD5

                                                                          76a3f1e9a452564e0f8dce6c0ee111e8

                                                                          SHA1

                                                                          11c3d925cbc1a52d53584fd8606f8f713aa59114

                                                                          SHA256

                                                                          381396157ed5e8021dd8e660142b35eb71a63aecd33062a1103ce9c709c7632c

                                                                          SHA512

                                                                          a1156a907649d6f2c3f7256405d9d5c62a626b8d4cd717fa2f29d2fbe91092a2b3fdd0716f8f31e59708fe12274bc2dea6c9ae6a413ea290e70ddf921fe7f274

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000008

                                                                          Filesize

                                                                          63KB

                                                                          MD5

                                                                          710d7637cc7e21b62fd3efe6aba1fd27

                                                                          SHA1

                                                                          8645d6b137064c7b38e10c736724e17787db6cf3

                                                                          SHA256

                                                                          c0997474b99524325dfedb5c020436e7ea9f9c9a1a759ed6daf7bdd4890bdc2b

                                                                          SHA512

                                                                          19aa77bed3c441228789cf8f931ca6194cc8d4bc7bb85d892faf5eaeda67d22c8c3b066f8ceda8169177da95a1fe111bd3436ceeaf4c784bd2bf96617f4d0c44

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                          Filesize

                                                                          3KB

                                                                          MD5

                                                                          3129aff79b4354cdef531639364f1e57

                                                                          SHA1

                                                                          1458fb56a73e44bad448dcef46f0dcc2a6ac5460

                                                                          SHA256

                                                                          0e2612313255131c4f5149335ef68673a50d5eee10097d37891689e0659b2dde

                                                                          SHA512

                                                                          933964edb4e171c4ce71bbd65031c22ef6968113a2a7af940a16f1806cdcca01ff0023f8dc5165368cd435596af7efa9a9f96819b57f48301cbfa411350cdb3f

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                          Filesize

                                                                          871B

                                                                          MD5

                                                                          67cd834d26090c4de38f21ce940f88ae

                                                                          SHA1

                                                                          e11f24f314b2a09ede21c61066b7e89c3e18db80

                                                                          SHA256

                                                                          06127c670115dde00865b216cc79de96ff0c27bc1c0ff8788f1467786dccd91c

                                                                          SHA512

                                                                          8571f0168799e483247739ebad0b9d844992ecf6b2ca0c503438162fd90b3bef0402878c65cebcf7708e3de84e2e6039f166f14a22ff17440075a3cf4753c4bb

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                          Filesize

                                                                          5KB

                                                                          MD5

                                                                          219974fa3140103e7ad48e4cb9fd2f68

                                                                          SHA1

                                                                          676c39c3a5fc70c42c31ad533dd4319f4dcf3320

                                                                          SHA256

                                                                          4f1792187d0f1b748f494fb7bd642b18cd310c2a712def64d6bc84113ee8eed6

                                                                          SHA512

                                                                          25c8b060e73b011555b5697e59bdf6c3aeb5c379c720e628b748b632a6168415292472f9b25cbc7e80c6772d7930794446c2bda0d2c759026efdfa3d572c6ce8

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                          Filesize

                                                                          6KB

                                                                          MD5

                                                                          9cc202e7ab4320a322dc60eed5cddcd3

                                                                          SHA1

                                                                          aca34233e0f94d3ac7df60ae768f1cafa457f5f7

                                                                          SHA256

                                                                          113dc4f906ec0081dac0824cd7a029d2d6427fc29e135c436dfdd44f7db6aa0b

                                                                          SHA512

                                                                          843f05758e881b0c38ab999c06f18b11688b0dc588b6bb6504a9b5f48f386e4b184d6e5149421e52557b41d54b0618a934dcf4a330a9219a89a19ddcc0727045

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                          Filesize

                                                                          6KB

                                                                          MD5

                                                                          dbc45528f5f411a0bb8b539b42639a92

                                                                          SHA1

                                                                          27c0a4b0adcdfc6584252a38d1f37d74fef9764d

                                                                          SHA256

                                                                          dd5c31df9c5149532a6b0e51b203a7be91640cd1c03cd28d5b236f335cf45db1

                                                                          SHA512

                                                                          0be86390eee2c2431ce05580d3f2160957a173a4185ce6eddf99000ec411645df94724692eca73d2c62a0a68f4881712fc2c5de993719b3c7f48beaf40776891

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                          Filesize

                                                                          6KB

                                                                          MD5

                                                                          d0e28d4d899b55c4273813f98791ef14

                                                                          SHA1

                                                                          eb298c7101a6b14e5fa88cdc84185ae515144baa

                                                                          SHA256

                                                                          31624effaf50c6ed1eab490e9dc82e7cc3dd948d30a423a33fdbf819387142e7

                                                                          SHA512

                                                                          28df38573e6488c90bcafe08c0a921c7f3da01e08939495316f36121c64b4bca1c6060f6cc9be850893c62a36529b53a8b02e14475c5082caa75eb6ed3197cd2

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          4d05e78526bb38630cd201233ed66cbc

                                                                          SHA1

                                                                          19b7d9e368b61c562a78f8cbbebe517420972496

                                                                          SHA256

                                                                          ac3ce9532bd264f4abb7867797b8a8156583142dfb1555a3972a9a176d139d51

                                                                          SHA512

                                                                          8822d8de9ccfb8baafa68248ae81d65c20642caac318288ee6bbf4cf69ce672ccd33cc0013f710faae339ad30811c5be8cca6c8d46d234e517d19f93a5f9aba7

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          68f6f0b5c4651b7b124aa837af26ceb4

                                                                          SHA1

                                                                          2fa95c6bd182ed796968d1c6f6df829eb5a64212

                                                                          SHA256

                                                                          22cb38ca590d811060892094b27434de9fd9b80834297ba0ec89fbe07bb48c93

                                                                          SHA512

                                                                          860c559bcfce1f1ff1c59cc969158b17025ea35fd931490575fa50cdc1e894dc774111fc5de904650724f6132fec711fda0a3f2a10cbda1d891e1211e267dc10

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          c7d855e9b4c701e7cccf5cb78df385cf

                                                                          SHA1

                                                                          d33358f3349bc8a0c34eda5b1c7226960636c5e7

                                                                          SHA256

                                                                          84f56289765d59647f98a3023485e111375630652870427a86d7e9d79e5556cd

                                                                          SHA512

                                                                          f05045bd5a5bdd90a3d726bb7f89ce5bf6457ee95597dcbf2f23c9ae654bb8c5d247ef4cfd2549032d93631d17ee3e674a11b6432b03bb8db1a7c0ee9ba2dcdc

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          4289f5a34d543e5a20c94c543db76d63

                                                                          SHA1

                                                                          fbb41dc0e7321d2b713473e90cc2e305c8101faf

                                                                          SHA256

                                                                          401eb7a31282c261dc9e475969c13fa9d5e8ef0c672d19922908a5bfd61e3871

                                                                          SHA512

                                                                          6ae76a13afe6bb65acb13208daa6f73b1d14a47b90fc88f6dc3db7d858b531ea31cf7ebfdd0ca90feea9dac59115498d3b4151db3fab37e99483730192737579

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          cf50de836ba7c0b1ca9c94332a4c5562

                                                                          SHA1

                                                                          a8dcb6909e80c6989e73ac832aa7ffd27eddb1ce

                                                                          SHA256

                                                                          14451afe76879b7a6957514cf2fa8c368c11b1701e3a1a1d0b2ae80b01749cd0

                                                                          SHA512

                                                                          ac6fb50c83829fe6bfce78cf8dc4bfa47b242c6b860fe1ce1f3e2bd49679f0c6f9d02d6e16bd35d7d1ce61c39eda3da8920b379e40c2d838075a54e0ac758129

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          acbb6a333c2835791f26432778beb653

                                                                          SHA1

                                                                          91eef74fc9c428aa90fc8571a61e525a8fe795a5

                                                                          SHA256

                                                                          47f57db1073f6a2e6495961e158ce10530b941691fcb63d2fade8682040a4e6c

                                                                          SHA512

                                                                          d0a20cc2e0f09936c15af3aae9a7f03de29a13e7c391633b3dce2481f5502e5d7ad1448ab4c9291aa49f5b584be268602028b3eb8c40673aed3bce2b75e4dfcc

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          5f73eeea852a4a742528c88030ee6869

                                                                          SHA1

                                                                          f63fb437c412d2136d2fb25702ad544556ceeb19

                                                                          SHA256

                                                                          df1298a77ae4f1a67eeb45dff5df9bdc673629d0a4b5aefd0aa4d51c30d3ca8d

                                                                          SHA512

                                                                          102ffbf9a5714d2087de42cf179fa2277f1f41d3207f582062fafa41f352965b4c40eaa08d69dd9f6f2429c18cf6eefeac122575685d0e3891b3b7530dfdf059

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          354d3e62bad31478983be7486a4d35b0

                                                                          SHA1

                                                                          3161074f6e024246db1fe8c02896de5aa61f0981

                                                                          SHA256

                                                                          cfc0098667bf99e86408aa1c91ee581b004478b89a11bb55f3c7e772d105ab66

                                                                          SHA512

                                                                          cdd890bd43f58d898091554074ec9f5b11e83d269c78a2c425499a24d9d543d463b32a254a520bf1537b25917380d145dd82b976707ef620fc8107c2c4df7317

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          030cb9fde3690155553395c3706bc733

                                                                          SHA1

                                                                          d49b7ae7946a32a7ff4805abf66f620626ae06b8

                                                                          SHA256

                                                                          410b93a7a0400af5c3489422cfc604680944110a212714048297671da4a7641b

                                                                          SHA512

                                                                          7f8e39835fb8f6b810ecd594503cf165a2c335e8dbab173bc9550f2a4bebf013d1af9336ad51ac22b95f9ada74cab39a6c789459830b49d8be4142e8a2d9b1b5

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          7154095933386bbdfbf8d080a21a586b

                                                                          SHA1

                                                                          65931093f3b31a11466eff3b2ea57b130571caba

                                                                          SHA256

                                                                          93d43e571026ca5f5bfb05619d6c6a8703b13d258655f7aeaf5f36210c9e72d9

                                                                          SHA512

                                                                          ea228d91aa4cdc62c00daee67fe975ec82208e00f28168d0da74c1b4214c6767ee140d05c48258b56d9cc3cbf76df7e044c963a2bb9a034063451b127e91949b

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          40fe95e370132491e522707550b588af

                                                                          SHA1

                                                                          9a8ce3b8927d64c01c9ecd457b7c7673e1e0de0e

                                                                          SHA256

                                                                          ae1df57d1e24b0de433f79dc0ecd150cc84a65c7c751a45f55bdd97f4d12112c

                                                                          SHA512

                                                                          40d30f3079daf4050fb2e2486c573e3f0ee584a0e0f723b9a5dd1cb79dfe1c533ce66a647f6d74af6c46b09157e0c5636f78985824f77e1b7c44891461436982

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          964c8f68ec73795b12da9b5b52b07b73

                                                                          SHA1

                                                                          b157ae0ba5977a3baca8a204cc84d1ee2af6d727

                                                                          SHA256

                                                                          c0eadab0842bed73b8f85d1bcfbd3e6591df7b95f7c9de07939461ea21473334

                                                                          SHA512

                                                                          1da51c7aa84d4d3955848531c362fc942d21c6fd3468c47a48d3535e5360f2c54787c9be11159657b465152b6208f7a4c5bc51715e543278d5f0798f425c7a20

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5ac0d1.TMP

                                                                          Filesize

                                                                          538B

                                                                          MD5

                                                                          26af79c97a0f6074e69500c460b6b647

                                                                          SHA1

                                                                          b2d23e10a930d593a3fa876c155c2910483f97b0

                                                                          SHA256

                                                                          ee4b932b8b72a156f69601a6e6f40070826a1a1af6d689ac853911f7ee1c0106

                                                                          SHA512

                                                                          0678d42a852918f9dbaf8a2fead346e1ddc3486a61c776c39f740798973a6ef6b3db7e6abac7cf10c86050bb1ef9174bcc8e09f9dd81bca665d4da4b811c73ca

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                          Filesize

                                                                          16B

                                                                          MD5

                                                                          6752a1d65b201c13b62ea44016eb221f

                                                                          SHA1

                                                                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                          SHA256

                                                                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                          SHA512

                                                                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                          Filesize

                                                                          11KB

                                                                          MD5

                                                                          8b92358041c8a3f9810a89193d67a1dc

                                                                          SHA1

                                                                          0b67a3c3134c91239cf9657dc9cd87a37676f493

                                                                          SHA256

                                                                          0182ece96d2a92330b35907e0e4e400a097875d21b1375d710a48bbe420e7207

                                                                          SHA512

                                                                          bed567194a835b87c9715fbc51c7d6a112abdb9fc97dfea723623841023542ea65cc056bb85aa3170aaeb9501a49b0ca0c7719346bdad6f3acb7d6bfd9842e7c

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                          Filesize

                                                                          12KB

                                                                          MD5

                                                                          f4fb5fe48df5e61c14b29a19d087180f

                                                                          SHA1

                                                                          cfca88763bab6aa0ef2756f13aea614f1de30405

                                                                          SHA256

                                                                          8c66c3b39fe40845571ab97e0151fd18184d6a6a275e3cd5dfb556510e90a7c1

                                                                          SHA512

                                                                          0f41bbf966054ce12391c8675fdecfe7b424dc7197bcf1dcc20703724cd9790c8a1d56928c40487032143d5d24510d3124cb185efb9c74a92c0db9c4cd63cd62

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                          Filesize

                                                                          12KB

                                                                          MD5

                                                                          97624088e89eeec4dc58b924702725fe

                                                                          SHA1

                                                                          ca772582db4507b2f76bf0e794b94343d8d2d587

                                                                          SHA256

                                                                          0b8c6be53074ec46c80d3421c63a6ec2123d2410770427cc8c2f2bfdfc4474d2

                                                                          SHA512

                                                                          a468be8f56e78174da33e9f3406c739a19d72f06c310289336d688495d2d4639d7baedd2d352d0f9c95a58db6e00ea9251c80379caadf145c6fa1730482e8bce

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                          Filesize

                                                                          12KB

                                                                          MD5

                                                                          e8833915787bf2f6df5a53085448e498

                                                                          SHA1

                                                                          9fb1e4af5f0c96111f525a977791de4c2d9f33ac

                                                                          SHA256

                                                                          c77be7f3b44845d7682fc9e863dd6dd4b28dda1854a4a45c53c68c23d3b19784

                                                                          SHA512

                                                                          b162c7657f1c1934f41c08eed59b13007b825c4eb7494b2617b1edc69abcefd97e7cd7170a8e194a696d683c7e11b30df2853f4739ac9683e24e7c3dedac9d69

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                          Filesize

                                                                          12KB

                                                                          MD5

                                                                          210409a3842c3bc7d3ddeb1f2e1d3d50

                                                                          SHA1

                                                                          bebfa15c9dffc933052358f02f669c88acfa81e7

                                                                          SHA256

                                                                          6e25bf4ebc3321379091109c359e34f8868989fd19e0aea397e75106b97096e5

                                                                          SHA512

                                                                          de596d3a92b4f45bbb5f9cc27d5f3eb3c13b2fef589ed20c83565b60afee726b80fd7a20c148b7fd855be7d6dad941b77e248811ad033f9de0b9d367029d62e4

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                          Filesize

                                                                          12KB

                                                                          MD5

                                                                          86296b6762fc4f9b03a05426ce4f7468

                                                                          SHA1

                                                                          7e42a060d8da3d0b78f2a66ea7681a0660bcf96f

                                                                          SHA256

                                                                          ce2526f79ca86ab9b0e56e5bea9ecb00f52b80cf97e219ae2e43ebb0ca2ee0cf

                                                                          SHA512

                                                                          b6202042b15c35542c5965a29e9522832588894d1d33466eb08e612bdec3e8332ce36fae9827174220863d4f54dd5c687348f2f78b7aa3161f7b78009097fad8

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                          Filesize

                                                                          12KB

                                                                          MD5

                                                                          eb694332bc67915ae73df148d72856af

                                                                          SHA1

                                                                          d74e4a62009bf587351000cfc537c30f4918bc7a

                                                                          SHA256

                                                                          1f673a4b9b6a58d0c761e5165cc082ab92b11a99808fdd2694e1d632d4bdf278

                                                                          SHA512

                                                                          32ff61031573c0503677fb792389f3b5279536719126e45e9688f9c9618921731b40bec654857f585c0817ea0a73f947435b1ebe9bb4b97c6dbb6456e0b6d395

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\9cd93bc6dcf544bae69531052e64647ec02f2bb4.tbres

                                                                          Filesize

                                                                          4KB

                                                                          MD5

                                                                          d9ebf5ae24910518ab52a15fcd36e98b

                                                                          SHA1

                                                                          07788557e17555e7df1825ecfcb4bf4402f4a8f4

                                                                          SHA256

                                                                          05d8dabcd27168a8b870efab09b27d4e565a22af72d77c89b579215829f2deb4

                                                                          SHA512

                                                                          23b34cd03f5f1c850a3a0edbbd6e92631f9d73348a928af5301e388625aeebcb67f2af95b914182800e7859e47fa3df4bdf23bdbc761b755760506a5512e88c8

                                                                        • C:\Users\Admin\AppData\Local\Temp\$inst\2.tmp

                                                                          Filesize

                                                                          36B

                                                                          MD5

                                                                          8708699d2c73bed30a0a08d80f96d6d7

                                                                          SHA1

                                                                          684cb9d317146553e8c5269c8afb1539565f4f78

                                                                          SHA256

                                                                          a32e0a83001d2c5d41649063217923dac167809cab50ec5784078e41c9ec0f0f

                                                                          SHA512

                                                                          38ece3e441cc5d8e97781801d5b19bdede6065a0a50f7f87337039edeeb4a22ad0348e9f5b5542b26236037dd35d0563f62d7f4c4f991c51020552cfae03b264

                                                                        • C:\Users\Admin\AppData\Local\Temp\$inst\temp_0.tmp

                                                                          Filesize

                                                                          176KB

                                                                          MD5

                                                                          bc82784f4aa47bcfed93e81a3b9950f2

                                                                          SHA1

                                                                          f5f2238d45733a6dde53c7b7dfe3645ee8ae3830

                                                                          SHA256

                                                                          dd47684334f0a2b716e96f142e8915266d5bc1725853fd0bdc6d06148db6167f

                                                                          SHA512

                                                                          d2378f324d430f16ce7dcf1f656b504009b005cdb6df9d5215fe0786c112e8eba8c1650a83192b6a9afad5892a1a456714665233f6767765619ccb5ff28e2b8a

                                                                        • C:\Users\Admin\AppData\Local\Temp\5a530dfd-bc51-4992-a05d-f09d41a331d4\AgileDotNetRT64.dll

                                                                          Filesize

                                                                          75KB

                                                                          MD5

                                                                          42b2c266e49a3acd346b91e3b0e638c0

                                                                          SHA1

                                                                          2bc52134f03fcc51cb4e0f6c7cf70646b4df7dd1

                                                                          SHA256

                                                                          adeed015f06efa363d504a18acb671b1db4b20b23664a55c9bc28aef3283ca29

                                                                          SHA512

                                                                          770822fd681a1d98afe03f6fbe5f116321b54c8e2989fb07491811fd29fca5b666f1adf4c6900823af1271e342cacc9293e9db307c4eef852d1a253b00347a81

                                                                        • C:\Users\Admin\AppData\Local\Temp\79E6.tmp\79E7.tmp\79E8.vbs

                                                                          Filesize

                                                                          352B

                                                                          MD5

                                                                          3b8696ecbb737aad2a763c4eaf62c247

                                                                          SHA1

                                                                          4a2d7a2d61d3f4c414b4e5d2933cd404b8f126e5

                                                                          SHA256

                                                                          ce95f7eea8b303bc23cfd6e41748ad4e7b5e0f0f1d3bdf390eadb1e354915569

                                                                          SHA512

                                                                          713d9697b892b9dd892537e8a01eab8d0265ebf64867c8beecf7a744321257c2a5c11d4de18fcb486bb69f199422ce3cab8b6afdbe880481c47b06ba8f335beb

                                                                        • C:\Users\Admin\AppData\Local\Temp\79E6.tmp\eulascr.exe

                                                                          Filesize

                                                                          143KB

                                                                          MD5

                                                                          8b1c352450e480d9320fce5e6f2c8713

                                                                          SHA1

                                                                          d6bd88bf33de7c5d4e68b233c37cc1540c97bd3a

                                                                          SHA256

                                                                          2c343174231b55e463ca044d19d47bd5842793c15954583eb340bfd95628516e

                                                                          SHA512

                                                                          2d8e43b1021da08ed1bf5aff110159e6bc10478102c024371302ccfce595e77fd76794658617b5b52f9a50190db250c1ba486d247d9cd69e4732a768edbb4cbc

                                                                        • C:\Users\Admin\AppData\Local\Temp\MistInfected_newest.exe

                                                                          Filesize

                                                                          3KB

                                                                          MD5

                                                                          459f3d7499adf6570cd98bbc2635f74c

                                                                          SHA1

                                                                          e2f1ffe536315c83e65d099e84c1ec8728bbee85

                                                                          SHA256

                                                                          5c5ecc47ad85aadb5acf9d057461073ec37c9407510379dd16985284b821cda7

                                                                          SHA512

                                                                          748b9ef6c075036d6cda5840864e10b92fad80416578b51e37a0e7a01ddac1b80f2af192897e2e68b023904ac7f2f2bd17c5840161c51ac09e551f4641520490

                                                                        • C:\Users\Admin\AppData\Local\Temp\TCDC93B.tmp\gb.xsl

                                                                          Filesize

                                                                          262KB

                                                                          MD5

                                                                          51d32ee5bc7ab811041f799652d26e04

                                                                          SHA1

                                                                          412193006aa3ef19e0a57e16acf86b830993024a

                                                                          SHA256

                                                                          6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

                                                                          SHA512

                                                                          5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

                                                                          Filesize

                                                                          313B

                                                                          MD5

                                                                          51bc1562e3e546929133f747935da5cb

                                                                          SHA1

                                                                          170b4207c5ad6a7477cdb317b31849506882c496

                                                                          SHA256

                                                                          2a7513624598ae0cbd4683118d8e8389aadfede2a55a8f94058e09b9c1d42b18

                                                                          SHA512

                                                                          586197c8b46d4d7c2f6c2462f8f0318705ef13528bde12cf64bff9e879ba01fd370b26c5750ba669b58bdec002d5beebe9b4519e5685e2252c8e727ba016254e

                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

                                                                          Filesize

                                                                          31KB

                                                                          MD5

                                                                          7936bbadc3ed5cfaafb3cfb6469a9277

                                                                          SHA1

                                                                          6db4a64875eecc4dbb67188bea97e49f18521b9a

                                                                          SHA256

                                                                          24f04f861e265665788fd584b50b9bd1062a964cd6af7ef6bbe46e286ce99282

                                                                          SHA512

                                                                          3bf4b677c3724509c8f5a9b200ff7fc79560ce3491a4b4869453775bd0fce287380e95c5202856f56ca61a5ba1a837330f196bd36f7c431ccf4865309a7477ff

                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

                                                                          Filesize

                                                                          2B

                                                                          MD5

                                                                          f3b25701fe362ec84616a93a45ce9998

                                                                          SHA1

                                                                          d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                                                          SHA256

                                                                          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                                                          SHA512

                                                                          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

                                                                          Filesize

                                                                          3KB

                                                                          MD5

                                                                          68f3ed774e4e547f6e0e5f5d6e198cd9

                                                                          SHA1

                                                                          d975ed69409923338e0224f9120b44aad13203b9

                                                                          SHA256

                                                                          81d5ba5e7d2b4ef9a5e62adce86bb05c6e00f27d449516061f008f45234bb97c

                                                                          SHA512

                                                                          8e63591379acdd8adad560639aa68f0e2207178546ac2750fddabb42c59857e140de00422028bf6dc900b08b4245bc7b25a39cf01cbce3365dad7ca8f265f7b4

                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          d9a849a8a9558367e13d77ac42b6cdd0

                                                                          SHA1

                                                                          2b1a30bfd4557cca34cbfd9c30adb0a05ed47ebf

                                                                          SHA256

                                                                          07cfd68ada3b426e667e8f8e769275cf3f603561197e6906c16bce83e4867d37

                                                                          SHA512

                                                                          205119adadb907422da9a6ba00bc6bb9b72ca1db07830d2e27c4f23f124978e9d9abe2dd98b4d610bed54372c1374990b52067d18aa63a4894509af740545364

                                                                        • C:\Users\Admin\Downloads\MadMan.exe

                                                                          Filesize

                                                                          21KB

                                                                          MD5

                                                                          36310e2ce19f06ff25ef516df730d8a0

                                                                          SHA1

                                                                          b12e4d1cf0ccd1ebf409903f605a394b871b612a

                                                                          SHA256

                                                                          c2ad1f6f4ac4ecbe0dd89acb41f3765b1666859dffc0a20d0166aa487aa56a99

                                                                          SHA512

                                                                          49fa78116d1d2ae273f425fb16ba2ee1ccd9a325a8e0344adea85ef3ccdea9a916b20700d3017c9e707a8e2c6d976ee4663f93c0416c790804c90d39f3cc667b

                                                                        • C:\Users\Admin\Downloads\Melissa.doc

                                                                          Filesize

                                                                          40KB

                                                                          MD5

                                                                          4b68fdec8e89b3983ceb5190a2924003

                                                                          SHA1

                                                                          45588547dc335d87ea5768512b9f3fc72ffd84a3

                                                                          SHA256

                                                                          554701bc874da646285689df79e5002b3b1a1f76daf705bea9586640026697ca

                                                                          SHA512

                                                                          b2205ad850301f179a078219c6ce29da82f8259f4ec05d980c210718551de916df52c314cb3963f3dd99dcfb9de188bd1c7c9ee310662ece426706493500036f

                                                                        • C:\Users\Admin\Downloads\Unconfirmed 196282.crdownload

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          a56d479405b23976f162f3a4a74e48aa

                                                                          SHA1

                                                                          f4f433b3f56315e1d469148bdfd835469526262f

                                                                          SHA256

                                                                          17d81134a5957fb758b9d69a90b033477a991c8b0f107d9864dc790ca37e6a23

                                                                          SHA512

                                                                          f5594cde50ca5235f7759c9350d4054d7a61b5e61a197dffc04eb8cdef368572e99d212dd406ad296484b5f0f880bdc5ec9e155781101d15083c1564738a900a

                                                                        • C:\Users\Admin\Downloads\Unconfirmed 252980.crdownload

                                                                          Filesize

                                                                          84KB

                                                                          MD5

                                                                          b6e148ee1a2a3b460dd2a0adbf1dd39c

                                                                          SHA1

                                                                          ec0efbe8fd2fa5300164e9e4eded0d40da549c60

                                                                          SHA256

                                                                          dc31e710277eac1b125de6f4626765a2684d992147691a33964e368e5f269cba

                                                                          SHA512

                                                                          4b8c62ddfc7cd3e5ce1f8b5a1ba4a611ab1bfccf81d80cf2cfc831cffa1d7a4b6da0494616a53b419168bc3a324b57382d4a6186af083de6fc93d144c4503741

                                                                        • C:\Users\Admin\Downloads\Unconfirmed 280741.crdownload

                                                                          Filesize

                                                                          83KB

                                                                          MD5

                                                                          8813125a606768fdf8df506029daa16f

                                                                          SHA1

                                                                          48e825f14522bd4d149ef8b426af81eec0287947

                                                                          SHA256

                                                                          323060680fed9a3205e3e36d2b62b7b5b6c6e6245e4555dcc733cf6ef390f41c

                                                                          SHA512

                                                                          9486a027029a27cbf0424760625c08d73aa62e28e45081751c5bada7c07ca05b4e44239da7774cf4f76298fb6b71769ae62595ae439b470c8308d39e1b2289d8

                                                                        • C:\Users\Admin\Downloads\Unconfirmed 409337.crdownload

                                                                          Filesize

                                                                          396KB

                                                                          MD5

                                                                          13f4b868603cf0dd6c32702d1bd858c9

                                                                          SHA1

                                                                          a595ab75e134f5616679be5f11deefdfaae1de15

                                                                          SHA256

                                                                          cae57a60c4d269cd1ca43ef143aedb8bfc4c09a7e4a689544883d05ce89406e7

                                                                          SHA512

                                                                          e0d7a81c9cdd15a4ef7c8a9492fffb2c520b28cebc54a139e1bffa5c523cf17dfb9ffe57188cf8843d74479df402306f4f0ce9fc09d87c7cca92aea287e5ff24

                                                                        • C:\Users\Admin\Downloads\Unconfirmed 409337.crdownload:SmartScreen

                                                                          Filesize

                                                                          7B

                                                                          MD5

                                                                          4047530ecbc0170039e76fe1657bdb01

                                                                          SHA1

                                                                          32db7d5e662ebccdd1d71de285f907e3a1c68ac5

                                                                          SHA256

                                                                          82254025d1b98d60044d3aeb7c56eed7c61c07c3e30534d6e05dab9d6c326750

                                                                          SHA512

                                                                          8f002af3f4ed2b3dfb4ed8273318d160152da50ee4842c9f5d9915f50a3e643952494699c4258e6af993dc6e1695d0dc3db6d23f4d93c26b0bc6a20f4b4f336e

                                                                        • C:\Users\Admin\Downloads\Unconfirmed 669059.crdownload

                                                                          Filesize

                                                                          381KB

                                                                          MD5

                                                                          35a27d088cd5be278629fae37d464182

                                                                          SHA1

                                                                          d5a291fadead1f2a0cf35082012fe6f4bf22a3ab

                                                                          SHA256

                                                                          4a75f2db1dbd3c1218bb9994b7e1c690c4edd4e0c1a675de8d2a127611173e69

                                                                          SHA512

                                                                          eb0be3026321864bd5bcf53b88dc951711d8c0b4bcbd46800b90ca5116a56dba22452530e29f3ccbbcc43d943bdefc8ed8ca2d31ba2e7e5f0e594f74adba4ab5

                                                                        • C:\Users\Admin\Downloads\Unconfirmed 988984.crdownload

                                                                          Filesize

                                                                          22KB

                                                                          MD5

                                                                          1e527b9018e98351782da198e9b030dc

                                                                          SHA1

                                                                          647122775c704548a460d6d4a2e2ff0f2390a506

                                                                          SHA256

                                                                          5f7471c215b433f1b28dd4b328b99362099b6df7cb9e5c1d86a756388e0c7aeb

                                                                          SHA512

                                                                          4a11c811f30016218075d43a9f983fa7a484a06f22d625b1bd2d92b4cfabbfb142945ca0a9ca1cf91391a3e73c154f6121140d2f1d42aa35ad7f10817534a21b

                                                                        • C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe

                                                                          Filesize

                                                                          438KB

                                                                          MD5

                                                                          1bb4dd43a8aebc8f3b53acd05e31d5b5

                                                                          SHA1

                                                                          54cd1a4a505b301df636903b2293d995d560887e

                                                                          SHA256

                                                                          a2380a5f503bc6f5fcfd4c72e5b807df0740a60a298e8686bf6454f92e5d3c02

                                                                          SHA512

                                                                          94c70d592e806bb426760f61122b8321e8dc5cff7f793d51f9d5650821c502c43096f41d3e61207ca6989df5bfdbff57bc23328de16e99dd56e85efc90affdce

                                                                        • C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe

                                                                          Filesize

                                                                          153KB

                                                                          MD5

                                                                          f33a4e991a11baf336a2324f700d874d

                                                                          SHA1

                                                                          9da1891a164f2fc0a88d0de1ba397585b455b0f4

                                                                          SHA256

                                                                          a87524035509ff7aa277788e1a9485618665b7da35044d70c41ec0f118f3dfd7

                                                                          SHA512

                                                                          edf066968f31451e21c7c21d3f54b03fd5827a8526940c1e449aad7f99624577cbc6432deba49bb86e96ac275f5900dcef8d7623855eb3c808e084601ee1df20

                                                                        • C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Uninstall.exe

                                                                          Filesize

                                                                          110KB

                                                                          MD5

                                                                          139df873521412f2aebc4b45da0bc3e9

                                                                          SHA1

                                                                          3fd72fd5bad8ee9422fb9efa5f601f6b485404df

                                                                          SHA256

                                                                          efe6bd2e0fc7030994fc2837b389da22c52a7b0bbdbd41852fcaf4308a23da10

                                                                          SHA512

                                                                          d85cf83d3b2cf9af3076e40d7419be42a561bce1160376ba580b3078b581ed2bd6d274fb2a0767aa81a9e92052762f39c1c391ca0cac3043ad85a72862713bd3

                                                                        • C:\Windows\SysWOW64\drivers\mistdrv.sys

                                                                          Filesize

                                                                          14KB

                                                                          MD5

                                                                          fb021609c5635e3afd5d65384f83a77e

                                                                          SHA1

                                                                          f2783bdb8c969e6a156438834873fbe59ed1a5d3

                                                                          SHA256

                                                                          40fd2d7e99c37b89bf8145000ed30479aa6d0a7c82d28eebb00d2377d0ac9f17

                                                                          SHA512

                                                                          f8e9f93c35a8837a454fa82578c02a4df3079bb03500cd023e4f1bd6ed5acd8cdbed19b5a5d3a930304f593410607060390b03de790d378060ea56cd1b767a33

                                                                        • memory/792-619-0x00007FFF29AD0000-0x00007FFF29AE0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/792-1199-0x00007FFF29AD0000-0x00007FFF29AE0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/792-1201-0x00007FFF29AD0000-0x00007FFF29AE0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/792-1200-0x00007FFF29AD0000-0x00007FFF29AE0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/792-623-0x00007FFF279D0000-0x00007FFF279E0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/792-1198-0x00007FFF29AD0000-0x00007FFF29AE0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/792-633-0x00007FFF279D0000-0x00007FFF279E0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/792-622-0x00007FFF29AD0000-0x00007FFF29AE0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/792-621-0x00007FFF29AD0000-0x00007FFF29AE0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/792-620-0x00007FFF29AD0000-0x00007FFF29AE0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/792-618-0x00007FFF29AD0000-0x00007FFF29AE0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/932-1437-0x00007FFF4BC20000-0x00007FFF4BD6E000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/1084-1694-0x000002355D310000-0x000002355DC24000-memory.dmp

                                                                          Filesize

                                                                          9.1MB

                                                                        • memory/2052-1569-0x0000021F86630000-0x0000021F8665E000-memory.dmp

                                                                          Filesize

                                                                          184KB

                                                                        • memory/2420-1568-0x0000000000400000-0x000000000043C000-memory.dmp

                                                                          Filesize

                                                                          240KB

                                                                        • memory/3448-1664-0x00000153BBC70000-0x00000153BBC8E000-memory.dmp

                                                                          Filesize

                                                                          120KB

                                                                        • memory/4072-1612-0x0000000000400000-0x000000000043C000-memory.dmp

                                                                          Filesize

                                                                          240KB

                                                                        • memory/5200-1594-0x0000000000400000-0x000000000043C000-memory.dmp

                                                                          Filesize

                                                                          240KB

                                                                        • memory/5200-1592-0x0000000000400000-0x000000000043C000-memory.dmp

                                                                          Filesize

                                                                          240KB

                                                                        • memory/5448-1436-0x00007FFF4BC20000-0x00007FFF4BD6E000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/5448-1438-0x000000001D110000-0x000000001D2D2000-memory.dmp

                                                                          Filesize

                                                                          1.8MB

                                                                        • memory/5448-1430-0x00000000001A0000-0x00000000001CA000-memory.dmp

                                                                          Filesize

                                                                          168KB

                                                                        • memory/5448-1439-0x000000001D810000-0x000000001DD38000-memory.dmp

                                                                          Filesize

                                                                          5.2MB