Analysis
-
max time kernel
356s -
max time network
306s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
16-12-2024 15:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://datalake.abuse.ch/malware-bazaar/daily/2024-12-15.zip
Resource
win11-20241007-en
General
-
Target
https://datalake.abuse.ch/malware-bazaar/daily/2024-12-15.zip
Malware Config
Signatures
-
Detected Gafgyt variant 1 IoCs
resource yara_rule behavioral1/files/0x001a00000002adc9-5260.dat family_gafgyt -
Gafgyt family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3416 created 3268 3416 MBSetup.exe 52 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MalTester2.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 7 IoCs
description ioc Process File opened for modification C:\Windows\system32\DRIVERS\MbamElam.sys MBAMService.exe File created C:\Windows\system32\DRIVERS\mbamswissarmy.sys MBAMService.exe File created C:\Windows\system32\DRIVERS\MbamChameleon.sys MBAMService.exe File opened for modification C:\Windows\SysWOW64\drivers\mbamtestfile.dat MBSetup.exe File created C:\Windows\SysWOW64\drivers\mbamtestfile.dat MBSetup.exe File created C:\Windows\system32\drivers\mbae64.sys MBAMInstallerService.exe File created C:\Windows\system32\DRIVERS\MbamElam.sys MBAMService.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MBAMSwissArmy\ImagePath = "\\SystemRoot\\System32\\Drivers\\mbamswissarmy.sys" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mbamchameleon\ImagePath = "\\SystemRoot\\System32\\Drivers\\MbamChameleon.sys" MBAMService.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate MBAMService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MalTester2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MalTester2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MBSetup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate MBSetup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MBAMService.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 10 IoCs
pid Process 3416 MBSetup.exe 3524 MBAMInstallerService.exe 2352 MBVpnTunnelService.exe 4752 MBAMService.exe 1064 MBAMService.exe 6376 Malwarebytes.exe 6516 Malwarebytes.exe 6628 Malwarebytes.exe 6468 Malwarebytes_Assistant.exe 2348 MalTester2.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\MBAMService MBAMInstallerService.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\MBAMService\ = "Service" MBAMInstallerService.exe -
Loads dropped DLL 64 IoCs
pid Process 3524 MBAMInstallerService.exe 3524 MBAMInstallerService.exe 3524 MBAMInstallerService.exe 2352 MBVpnTunnelService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 3524 MBAMInstallerService.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MalTester2.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: MBAMInstallerService.exe File opened (read-only) \??\W: MBAMInstallerService.exe File opened (read-only) \??\Y: MBAMInstallerService.exe File opened (read-only) \??\U: MBAMService.exe File opened (read-only) \??\I: MBAMInstallerService.exe File opened (read-only) \??\Y: MBAMService.exe File opened (read-only) \??\N: MBAMInstallerService.exe File opened (read-only) \??\L: MBAMService.exe File opened (read-only) \??\V: MBAMService.exe File opened (read-only) \??\X: MBAMService.exe File opened (read-only) \??\L: MBAMInstallerService.exe File opened (read-only) \??\Q: MBAMInstallerService.exe File opened (read-only) \??\G: MBAMService.exe File opened (read-only) \??\K: MBAMService.exe File opened (read-only) \??\J: MBAMService.exe File opened (read-only) \??\P: MBAMService.exe File opened (read-only) \??\Z: MBAMService.exe File opened (read-only) \??\A: MBAMInstallerService.exe File opened (read-only) \??\H: MBAMInstallerService.exe File opened (read-only) \??\K: MBAMInstallerService.exe File opened (read-only) \??\B: MBAMService.exe File opened (read-only) \??\H: MBAMService.exe File opened (read-only) \??\M: MBAMService.exe File opened (read-only) \??\R: MBAMService.exe File opened (read-only) \??\W: MBAMService.exe File opened (read-only) \??\B: MBAMInstallerService.exe File opened (read-only) \??\G: MBAMInstallerService.exe File opened (read-only) \??\M: MBAMInstallerService.exe File opened (read-only) \??\A: MBAMService.exe File opened (read-only) \??\I: MBAMService.exe File opened (read-only) \??\U: MBAMInstallerService.exe File opened (read-only) \??\V: MBAMInstallerService.exe File opened (read-only) \??\X: MBAMInstallerService.exe File opened (read-only) \??\Z: MBAMInstallerService.exe File opened (read-only) \??\P: MBAMInstallerService.exe File opened (read-only) \??\S: MBAMInstallerService.exe File opened (read-only) \??\J: MBAMInstallerService.exe File opened (read-only) \??\N: MBAMService.exe File opened (read-only) \??\T: MBAMService.exe File opened (read-only) \??\R: MBAMInstallerService.exe File opened (read-only) \??\O: MBAMService.exe File opened (read-only) \??\S: MBAMService.exe File opened (read-only) \??\E: MBAMInstallerService.exe File opened (read-only) \??\T: MBAMInstallerService.exe File opened (read-only) \??\E: MBAMService.exe File opened (read-only) \??\Q: MBAMService.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 12 raw.githubusercontent.com 43 raw.githubusercontent.com -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\netwtw08.inf_amd64_62f41b89e0dc2537\netwtw08.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netavpna.inf_amd64_b98aa91c766be0ea\netavpna.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netathr10x.inf_amd64_2691c4f95b80eb3b\netathr10x.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netg664.inf_amd64_84cd7b2798e0a666\netg664.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\bcmdhd64.inf_amd64_e0bae6831f60ea5f\bcmdhd64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\net1yx64.inf_amd64_8604d8a50804b9c1\net1yx64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netefe3e.inf_amd64_7830581a689ef40d\netefe3e.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netsstpa.inf_amd64_8a3d09c4ce3bae33\netsstpa.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netk57a.inf_amd64_d823e3edc27ae17c\netk57a.PNF MBVpnTunnelService.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d31ef65d-b84e-8d43-9b53-4ed09451442f}\SET575A.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\nete1g3e.inf_amd64_af58b4e19562a3f9\nete1g3e.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netr28ux.inf_amd64_d5996f2a9d9aa9e3\netr28ux.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\e2xw10x64.inf_amd64_04c2ae40613a06ff\e2xw10x64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netloop.inf_amd64_09e02e589e7afd83\netloop.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\net7400-x64-n650.inf_amd64_557ce3b37c3e0e3b\net7400-x64-n650.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\net8192se64.inf_amd64_167684f9283b4eca\net8192se64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netrtwlane.inf_amd64_35c52a008b0fba12\netrtwlane.PNF MBVpnTunnelService.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d31ef65d-b84e-8d43-9b53-4ed09451442f}\SET5749.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\netv1x64.inf_amd64_30040c3eb9d7ade4\netv1x64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\qcwlan64.inf_amd64_71c84e1405061462\qcwlan64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netnvm64.inf_amd64_35bbbe80dec15683\netnvm64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\msux64w10.inf_amd64_749854ac3f28f846\msux64w10.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\rt640x64.inf_amd64_6150ccb5b6a4c3cd\rt640x64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\nett4x64.inf_amd64_54eacac1858c78ab\nett4x64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netvg63a.inf_amd64_9f5493180b1252cf\netvg63a.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netwew01.inf_amd64_153e01d761813df2\netwew01.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\wnetvsc.inf_amd64_2518575b045d267b\wnetvsc.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\rndiscmp.inf_amd64_04b60d124553a40f\rndiscmp.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netvwwanmp.inf_amd64_2299fee965b7e92c\netvwwanmp.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\usbnet.inf_amd64_5229ee1dac1c624e\usbnet.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netmlx4eth63.inf_amd64_3809a4a3e7e07703\netmlx4eth63.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\netvf63a.inf_amd64_a090e6cfaf18cb5c\netvf63a.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\mwlu97w8x64.inf_amd64_23bc3dc6d91eebdc\mwlu97w8x64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\mrvlpcie8897.inf_amd64_07fc330c5a5730ca\mrvlpcie8897.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netl1e64.inf_amd64_8d5ca5ab1472fc44\netl1e64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netjme.inf_amd64_752bf22f1598bb7e\netjme.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netbc63a.inf_amd64_7ba6c9cea77dd549\netbc63a.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netwsw00.inf_amd64_24d55504ae3587aa\netwsw00.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\bthpan.inf_amd64_a31306bfdf7135b0\bthpan.PNF MBVpnTunnelService.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d31ef65d-b84e-8d43-9b53-4ed09451442f} DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\netelx.inf_amd64_7812e4e45c4a5eb1\netelx.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netl160a.inf_amd64_e4cbe375963a69e9\netl160a.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\rtucx21x64.inf_amd64_d70642620058e2a4\rtucx21x64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netrtwlanu.inf_amd64_1815bafd14dc59f0\netrtwlanu.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netl260a.inf_amd64_783312763f8749c7\netl260a.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\rtux64w10.inf_amd64_a39ece60dbc76c55\rtux64w10.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\Temp\{d31ef65d-b84e-8d43-9b53-4ed09451442f}\SET575A.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{d31ef65d-b84e-8d43-9b53-4ed09451442f}\SET575B.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\netmyk64.inf_amd64_1f949c30555f4111\netmyk64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\net8187bv64.inf_amd64_bc859d32f3e2f0d5\net8187bv64.PNF MBVpnTunnelService.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d31ef65d-b84e-8d43-9b53-4ed09451442f}\SET575B.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\mbtun.inf_amd64_add82795013a7c3b\mbtun.cat DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\net1ic64.inf_amd64_1e173acb8f2f340f\net1ic64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netwtw10.inf_amd64_3b49c2812809f919\netwtw10.PNF MBVpnTunnelService.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\mbtun.inf_amd64_add82795013a7c3b\mbtun.sys DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\netrtl64.inf_amd64_8e9c2368fe308df2\netrtl64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\net8192su64.inf_amd64_66c8bfc7a4b1feed\net8192su64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\net8185.inf_amd64_7a30f5a9441cd55b\net8185.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netr7364.inf_amd64_310ee0bc0af86ba3\netr7364.PNF MBVpnTunnelService.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d31ef65d-b84e-8d43-9b53-4ed09451442f}\mbtun.cat DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\dc21x4vm.inf_amd64_d54f628acb9dea33\dc21x4vm.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netrtwlane_13.inf_amd64_992f4f46e65f30d4\netrtwlane_13.PNF MBVpnTunnelService.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2348 MalTester2.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.NETCore.App\6.0.33\System.Transactions.Local.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.NETCore.App\6.0.33\System.Xml.XPath.XDocument.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\de\PresentationUI.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\es\ReachFramework.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\es\UIAutomationTypes.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\it\System.Windows.Input.Manipulations.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.NETCore.App\6.0.33\System.Globalization.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.NETCore.App\6.0.33\System.Security.Cryptography.Primitives.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\ScanControllerImpl.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\pt-BR\System.Xaml.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\zh-Hant\PresentationCore.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\fr\PresentationCore.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\ko\System.Windows.Forms.Primitives.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\pl\System.Windows.Input.Manipulations.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\MbamUI.Services.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\MbamUI.UICommon.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\Microsoft.Extensions.DependencyInjection.Abstractions.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.NETCore.App\6.0.33\System.Net.Http.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.NETCore.App\6.0.33\System.Security.Cryptography.X509Certificates.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\SecurityProductInformation.ini MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\cs\PresentationFramework.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\es\System.Windows.Input.Manipulations.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\es\System.Xaml.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\SelfProtectionSdk.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\sdk\mbamchameleon.cat MBAMService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.NETCore.App\6.0.33\api-ms-win-core-errorhandling-l1-1-0.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.NETCore.App\6.0.33\System.Core.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\malwarebytes_assistant.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\sdk\mbamchameleon.sys MBAMService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\PresentationFramework-SystemXmlLinq.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\zh-Hant\System.Xaml.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.NETCore.App\6.0.33\System.Net.NameResolution.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.NETCore.App\6.0.33\System.Net.Ping.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\ja\WindowsBase.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\pt-BR\System.Windows.Forms.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\System.Diagnostics.EventLog.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\Microsoft.Data.Sqlite.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\1dcdbfd9-369d-4573-be5a-72edd6368001 MBSetup.exe File opened for modification C:\Program Files\Malwarebytes\Anti-Malware\mbuns.exe MBAMInstallerService.exe File opened for modification C:\Program Files\Malwarebytes\Anti-Malware\Malwarebytes.exe MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.NETCore.App\6.0.33\System.Drawing.Primitives.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\SwissarmyShim.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\Malwarebytes.UI.Theme.Primitives.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\sdk\MBAMSwissArmy.tmf MBAMService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\ko\Microsoft.VisualBasic.Forms.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\zh-Hant\UIAutomationClient.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\MWACControllerImpl.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\pl\System.Windows.Forms.Primitives.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\System.Drawing.Design.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\fr\System.Xaml.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\ja\System.Xaml.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.NETCore.App\6.0.33\System.Collections.Specialized.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\es\UIAutomationClient.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\PresentationFramework.Royale.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\zh-Hans\UIAutomationClientSideProviders.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\zh-Hant\WindowsFormsIntegration.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\Microsoft.Extensions.Caching.Memory.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\Sentry.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\assistant.runtimeconfig.json MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.NETCore.App\6.0.33\System.Linq.Queryable.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\ja\ReachFramework.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\PresentationFramework.Classic.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.33\ru\System.Xaml.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\RTPControllerImpl.dll MBAMInstallerService.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.dev.log MBVpnTunnelService.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File created C:\Windows\inf\oem3.inf DrvInst.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 2 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\MalTester2.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\MBSetup.exe:Zone.Identifier msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MBSetup.exe -
Checks SCSI registry key(s) 3 TTPs 62 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MBAMService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MBAMService.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION MBAMInstallerService.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\Malwarebytes.exe = "11000" MBAMInstallerService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION MBAMService.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\mbam.exe = "11000" MBAMService.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\mbamtray.exe = "11000" MBAMService.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-20\Software MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Malwarebytes MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-19\Software\Policies\Microsoft\Office\15.0\Common\Security\Trusted Protocols\All Applications MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\Office MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-19\Software\Policies\Microsoft\Office\16.0\Common\Security MBAMInstallerService.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Policies\Microsoft\Office\16.0\Common\Security\Trusted Protocols\All Applications\malwarebytes:\ MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\Office\15.0\Common MBAMInstallerService.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\Office\16.0\Common\Security\Trusted Protocols\All Applications\malwarebytes:\ MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software MBAMInstallerService.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\Office\15.0\Common\Security\Trusted Protocols\All Applications\malwarebytes:\ MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-19\Software\Policies\Microsoft\Office\15.0\Common MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\Office\16.0\Common MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\Office\16.0\Common\Security\Trusted Protocols MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\Office\15.0\Common\Security MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\Office\16.0\Common\Security\Trusted Protocols\All Applications MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-19\Software\Policies\Microsoft\Office\16.0\Common\Security\Trusted Protocols\All Applications\malwarebytes: MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-19\Software\Policies\Microsoft\Office\16.0 MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\Office\15.0\Common\Security\Trusted Protocols\All Applications\malwarebytes: MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\S-1-5-19\Software\Policies\Microsoft MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\Office\15.0\Common\Security\Trusted Protocols\All Applications\malwarebytes: MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\Office\16.0\Common\Security MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\Office\15.0\Common\Security\Trusted Protocols\All Applications MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\Office\16.0 MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MBAMService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\Office\15.0 MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\Office\16.0\Common\Security\Trusted Protocols\All Applications\malwarebytes: MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-19\Software\Policies\Microsoft\Office\16.0\Common\Security\Trusted Protocols\All Applications MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT MBAMService.exe Key created \REGISTRY\USER\S-1-5-19\Software\Policies MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\Office\16.0\Common\Security\Trusted Protocols MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Malwarebytes\FirstRun = "false" MBAMInstallerService.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{02143C0F-1656-4B2E-95E7-EA8178A29E2E} MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E95BF32A-DE84-4E41-B836-E2A7BAB962AF}\ = "IRTPControllerV19" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{995A8F3B-6B5F-4773-898A-862D50142B4C}\TypeLib\ = "{2446F405-83F0-460F-B837-F04540BB330C}" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{964AD404-A1EF-4EDA-B8FA-1D8003B29B10}\TypeLib\ = "{0E2822AB-0447-4F28-AF4C-FFDB1E8595AE}" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{17BE78EE-B40A-4B9E-835F-38EC62F9D479}\LocalServer32 MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{108E7F3D-FB06-4024-94FB-3B8E687587E4}\ = "_IScanControllerEventsV7" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFB94DF8-FC15-411C-B443-E937085E2AC1}\1.0\0\win64\ = "C:\\Program Files\\Malwarebytes\\Anti-Malware\\MBAMService.exe\\10" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6CE18DD5-2BD7-4844-B9AD-DF6A995750A1}\ProxyStubClsid32 MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MB.AEController MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A34647B-D9A8-40D9-B563-F9461E98030E}\ = "IUpdateControllerV8" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FFBD938D-3ABA-4895-97EF-5A0BDF7AC07D} MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0070F531-5D6B-4302-ACA0-6920E95D9A31}\TypeLib MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1A173904-D20F-4872-93D5-CBC1336AE0D6}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DE351550-6C4E-4662-AD87-FEB0707F6C62}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5250E5C8-A09C-4F87-A0DA-A46A62A0EACF}\ = "IArwControllerV3" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3A7FB145-B72D-466E-A3AC-21599BBE9E8C} MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3C0ECFDC-317D-406B-ADF5-C0E8217E244F}\TypeLib MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6A3E14F0-01F5-492E-AA97-3D880941D814}\TypeLib\ = "{49F6AC60-2104-42C6-8F71-B3916D5AA732}" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C3249828-A4B2-4146-A323-EA5FD2F2FC75}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1C510D99-F27D-457F-9469-CFC179DBE0C7}\ = "IAEControllerV7" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EBA4A79D-9F4E-4E7A-AC00-49ECE23C20B6}\ = "IScanControllerV21" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{09FAE0FE-2897-496A-9FD2-39C86556F1D2} MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6EC225D5-FD37-4F9B-B80F-09FAE36103AE}\TypeLib MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{983849D5-BFE9-43E9-A9A0-CBAFBC917F39}\TypeLib MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8E1F91DE-30AF-469B-9A09-FCF176207F0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4F3822FA-CCD5-4934-AB6D-3382B2F91DB9}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9A30501F-26D0-4C5F-818A-9F7DFC5F8ABC} MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2A153977-1A37-4EF7-9226-9E128FA51AE1}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0070F531-5D6B-4302-ACA0-6920E95D9A31}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MB.TelemetryController\CurVer MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7F95C137-46FC-42FB-A66A-F0482F3C749C}\TypeLib MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{63A6AB57-4679-4529-B78D-143547B22799} MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D7A05281-DB9E-4E02-9680-E4D83CDAA6AB}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{01222402-A8AB-4183-8843-8ADBF0B11869}\TypeLib\ = "{49F6AC60-2104-42C6-8F71-B3916D5AA732}" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DF39921A-6060-472F-A358-1CE8D2F8779C} MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3498D9E4-6476-4AC0-B53A-75BC9955EF37}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{68E3012A-E3EC-4D66-9132-4E412F487165}\ProxyStubClsid32 MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A0EB1521-C843-47D5-88D2-5449A2F5F40B}\TypeLib\Version = "1.0" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2E3F70EF-D9BE-485F-A6F5-816DD0EDC757}\ = "IRTPControllerV16" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3A34647B-D9A8-40D9-B563-F9461E98030E}\ = "IUpdateControllerV8" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D372F21-E6DA-4B82-881A-79F6CA6B6AE1}\TypeLib\ = "{0E2822AB-0447-4F28-AF4C-FFDB1E8595AE}" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9CFA1689-38D3-4AE9-B1E8-B039EB7AD988}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{55E4B8FB-921C-4751-8B2D-AE33BD7D0B74}\TypeLib\Version = "1.0" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{015FAC74-0374-494A-A02D-316D562C0FCE}\ = "IMBAMShlExt" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7AEBAD20-B80A-427D-B7D5-D2983291132E}\TypeLib\ = "{5709DEEB-F05E-4D5C-8DC4-3B0D924EE08F}" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BF153224-DA64-41F1-AA87-321B345870FA} MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EA248A19-F84E-4407-ADD3-8563AFD81269}\TypeLib\ = "{A23C190D-C714-42C7-BDBB-F4E1DE65AF27}" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{473BC184-760C-4255-A118-E8064C4EC595}\TypeLib MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{278637DA-FDFB-45C7-8CD8-F2D8A9199AB0}\LocalServer32 MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{94E6A9DF-4AAB-48E7-8A94-65CA2481D1F6}\TypeLib\ = "{5709DEEB-F05E-4D5C-8DC4-3B0D924EE08F}" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6A3E14F0-01F5-492E-AA97-3D880941D814}\TypeLib\Version = "1.0" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{834906DC-FA0F-4F61-BC62-24B0BEB3769C} MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DB82CDC6-F12A-4156-8DBF-EC7465B9C0B9}\ = "ISPController" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{61DF8ACF-EC61-4D69-A543-20EA450E1A84}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{ADCD8BEB-8924-4876-AE14-2438FF14FA17}\ = "IPoliciesControllerV5" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{115D004C-CC20-4945-BCC8-FE5043DD42D0} MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{560EB17C-4365-4DFC-A855-F99B223F02AF}\ProxyStubClsid32 MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6696D5DD-4143-482C-ABF4-3B215CF3DBFC}\TypeLib\Version = "1.0" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DD3CFEBD-3B8E-4651-BB7C-537D1F03E59C}\TypeLib\Version = "1.0" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{566DC5CA-A3C4-4959-AB92-37606E12AAFF}\TypeLib MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4A0A45F1-CFB6-49A7-BBC4-8776F94857A8}\TypeLib\Version = "1.0" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6655E528-3168-47A4-BF82-A71E9E6AB5F7}\ProxyStubClsid32 MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA226B90-F6FF-4618-8AE6-1114E82CB162}\TypeLib MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9CFA1689-38D3-4AE9-B1E8-B039EB7AD988}\TypeLib MBAMService.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\0D44DD8C3C8C1A1A58756481E90F2E2AFFB3D26E\Blob = 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 MBAMInstallerService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\1C58A3A8518E8759BF075B76B750D4F2DF264FCD MBAMInstallerService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\8DA7F965EC5EFC37910F1C6E59FDC1CC6A6EDE16 MBAMInstallerService.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F6108407D6F8BB67980CC2E244C2EBAE1CEF63BE\Blob = 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 MBAMInstallerService.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\2AD974A775F73CBDBBD8F5AC3A49255FA8FB1F8C\Blob = 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 MBAMInstallerService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 MBAMInstallerService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2 MBAMInstallerService.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 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 MBAMInstallerService.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 MBAMInstallerService.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5A8CEF45D7A69859767A8C8B4496B578CF474B1A\Blob = 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 MBAMInstallerService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F6108407D6F8BB67980CC2E244C2EBAE1CEF63BE MBAMInstallerService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5A8CEF45D7A69859767A8C8B4496B578CF474B1A MBAMInstallerService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\0D44DD8C3C8C1A1A58756481E90F2E2AFFB3D26E MBAMInstallerService.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\1C58A3A8518E8759BF075B76B750D4F2DF264FCD\Blob = 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 MBAMInstallerService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\2AD974A775F73CBDBBD8F5AC3A49255FA8FB1F8C MBAMInstallerService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\B51C067CEE2B0C3DF855AB2D92F4FE39D4E70F0E MBAMInstallerService.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\B51C067CEE2B0C3DF855AB2D92F4FE39D4E70F0E\Blob = 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 MBAMInstallerService.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\8DA7F965EC5EFC37910F1C6E59FDC1CC6A6EDE16\Blob = 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 MBAMInstallerService.exe -
NTFS ADS 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\MalTester2.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 472233.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\MBSetup.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\2024-12-15.zip:Zone.Identifier msedge.exe File created C:\Program Files\Malwarebytes\Anti-Malware\mbuns.exe\:SmartScreen:$DATA MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\mbuns.exe\:Zone.Identifier:$DATA MBAMInstallerService.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 97776.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 59 IoCs
pid Process 704 msedge.exe 704 msedge.exe 560 msedge.exe 560 msedge.exe 1356 msedge.exe 1356 msedge.exe 3428 identity_helper.exe 3428 identity_helper.exe 4968 msedge.exe 4968 msedge.exe 2356 msedge.exe 2356 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 3416 MBSetup.exe 3416 MBSetup.exe 3752 msedge.exe 3752 msedge.exe 3524 MBAMInstallerService.exe 3524 MBAMInstallerService.exe 3524 MBAMInstallerService.exe 3524 MBAMInstallerService.exe 3524 MBAMInstallerService.exe 3524 MBAMInstallerService.exe 3524 MBAMInstallerService.exe 3524 MBAMInstallerService.exe 3524 MBAMInstallerService.exe 3524 MBAMInstallerService.exe 3524 MBAMInstallerService.exe 3524 MBAMInstallerService.exe 3524 MBAMInstallerService.exe 3524 MBAMInstallerService.exe 3524 MBAMInstallerService.exe 3524 MBAMInstallerService.exe 3524 MBAMInstallerService.exe 3524 MBAMInstallerService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe 1064 MBAMService.exe -
Suspicious behavior: LoadsDriver 4 IoCs
pid Process 676 Process not Found 676 Process not Found 676 Process not Found 676 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 27 IoCs
pid Process 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe Token: SeDebugPrivilege 3524 MBAMInstallerService.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe -
Suspicious use of SendNotifyMessage 29 IoCs
pid Process 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 6376 Malwarebytes.exe 6376 Malwarebytes.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3416 MBSetup.exe 6376 Malwarebytes.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 560 wrote to memory of 1112 560 msedge.exe 77 PID 560 wrote to memory of 1112 560 msedge.exe 77 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 2380 560 msedge.exe 78 PID 560 wrote to memory of 704 560 msedge.exe 79 PID 560 wrote to memory of 704 560 msedge.exe 79 PID 560 wrote to memory of 1268 560 msedge.exe 80 PID 560 wrote to memory of 1268 560 msedge.exe 80 PID 560 wrote to memory of 1268 560 msedge.exe 80 PID 560 wrote to memory of 1268 560 msedge.exe 80 PID 560 wrote to memory of 1268 560 msedge.exe 80 PID 560 wrote to memory of 1268 560 msedge.exe 80 PID 560 wrote to memory of 1268 560 msedge.exe 80 PID 560 wrote to memory of 1268 560 msedge.exe 80 PID 560 wrote to memory of 1268 560 msedge.exe 80 PID 560 wrote to memory of 1268 560 msedge.exe 80 PID 560 wrote to memory of 1268 560 msedge.exe 80 PID 560 wrote to memory of 1268 560 msedge.exe 80 PID 560 wrote to memory of 1268 560 msedge.exe 80 PID 560 wrote to memory of 1268 560 msedge.exe 80 PID 560 wrote to memory of 1268 560 msedge.exe 80 PID 560 wrote to memory of 1268 560 msedge.exe 80 PID 560 wrote to memory of 1268 560 msedge.exe 80 PID 560 wrote to memory of 1268 560 msedge.exe 80 PID 560 wrote to memory of 1268 560 msedge.exe 80 PID 560 wrote to memory of 1268 560 msedge.exe 80 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3268
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://datalake.abuse.ch/malware-bazaar/daily/2024-12-15.zip2⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffeafa03cb8,0x7ffeafa03cc8,0x7ffeafa03cd83⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1924 /prefetch:23⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:83⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:13⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:13⤵PID:324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:13⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:13⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:13⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3888 /prefetch:13⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:13⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6120 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:13⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:13⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:13⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:13⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6384 /prefetch:13⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6440 /prefetch:83⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6584 /prefetch:13⤵PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:83⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:13⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:13⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6732 /prefetch:13⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:13⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6708 /prefetch:13⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3572 /prefetch:13⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:13⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3552 /prefetch:13⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7100 /prefetch:83⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:83⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:13⤵PID:708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6316 /prefetch:13⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6732 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6996 /prefetch:13⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6732 /prefetch:13⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:83⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:13⤵PID:5152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18379967995879335181,869376675386149414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:13⤵PID:5504
-
-
-
C:\Users\Admin\Downloads\MBSetup.exe"C:\Users\Admin\Downloads\MBSetup.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3416
-
-
C:\Program Files\Malwarebytes\Anti-Malware\Malwarebytes.exe"C:\Program Files\Malwarebytes\Anti-Malware\Malwarebytes.exe"2⤵
- Executes dropped EXE
PID:6516 -
C:\Program Files\Malwarebytes\Anti-Malware\Malwarebytes.exe"C:\Program Files\Malwarebytes\Anti-Malware\Malwarebytes.exe"3⤵
- Executes dropped EXE
PID:6628
-
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\viruses\viruse\" -an -ai#7zMap25198:108:7zEvent67872⤵PID:6932
-
-
C:\Users\Admin\Desktop\viruses\Loser\MalTester2.exe"C:\Users\Admin\Desktop\viruses\Loser\MalTester2.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2348 -
C:\Windows\system32\56zyq2b7vc4tk.exe56zyq2b7vc4tk.exe3⤵PID:5340
-
-
C:\Windows\system32\agentactivationruntimestarter.exeagentactivationruntimestarter.exe3⤵PID:1060
-
-
C:\Windows\system32\AgentService.exeAgentService.exe3⤵PID:3864
-
-
C:\Windows\system32\AggregatorHost.exeAggregatorHost.exe3⤵PID:1868
-
-
C:\Windows\system32\aitstatic.exeaitstatic.exe3⤵PID:1880
-
-
C:\Windows\system32\alg.exealg.exe3⤵PID:5384
-
-
C:\Windows\system32\AppHostRegistrationVerifier.exeAppHostRegistrationVerifier.exe3⤵PID:5412
-
-
C:\Windows\system32\appidcertstorecheck.exeappidcertstorecheck.exe3⤵PID:5920
-
-
C:\Windows\system32\appidpolicyconverter.exeappidpolicyconverter.exe3⤵PID:5788
-
-
C:\Windows\system32\appidtel.exeappidtel.exe3⤵PID:6004
-
-
C:\Windows\system32\ApplicationFrameHost.exeApplicationFrameHost.exe3⤵PID:5816
-
-
C:\Windows\system32\ApplySettingsTemplateCatalog.exeApplySettingsTemplateCatalog.exe3⤵PID:5936
-
-
C:\Windows\system32\ApplyTrustOffline.exeApplyTrustOffline.exe3⤵PID:5764
-
-
C:\Windows\system32\ApproveChildRequest.exeApproveChildRequest.exe3⤵PID:5808
-
-
C:\Windows\system32\AppVClient.exeAppVClient.exe3⤵PID:5852
-
-
C:\Windows\system32\AppVDllSurrogate.exeAppVDllSurrogate.exe3⤵PID:5900
-
-
C:\Windows\system32\AppVNice.exeAppVNice.exe3⤵PID:5944
-
-
C:\Windows\system32\AppVShNotify.exeAppVShNotify.exe3⤵PID:5956
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:940
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵PID:3740
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1876
-
C:\Program Files\Malwarebytes\Anti-Malware\MBAMInstallerService.exe"C:\Program Files\Malwarebytes\Anti-Malware\MBAMInstallerService.exe"1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Modifies system certificate store
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3524 -
C:\Program Files\Malwarebytes\Anti-Malware\MBVpnTunnelService.exe"C:\Program Files\Malwarebytes\Anti-Malware\MBVpnTunnelService.exe" /installmbtun2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
PID:2352
-
-
C:\Program Files\Malwarebytes\Anti-Malware\MBAMService.exe"C:\Program Files\Malwarebytes\Anti-Malware\MBAMService.exe" /Service /Protected2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Modifies registry class
PID:4752
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:3460 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "9" "C:\Program Files\Malwarebytes\Anti-Malware\mbtun\mbtun.inf" "9" "4ba9030c7" "0000000000000154" "Service-0x0-3e7$\Default" "000000000000016C" "208" "C:\Program Files\Malwarebytes\Anti-Malware\mbtun"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:1716
-
-
C:\Program Files\Malwarebytes\Anti-Malware\MBAMService.exe"C:\Program Files\Malwarebytes\Anti-Malware\MBAMService.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1064 -
C:\Program Files\Malwarebytes\Anti-Malware\Malwarebytes.exe"C:\Program Files\Malwarebytes\Anti-Malware\Malwarebytes.exe" nowindow2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:6376 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://links.malwarebytes.com/link/pricing-inapp?version=5.2.3.156&x-prodcode=MBAM-C&x-token_secret=0RJqCl-jr1uEbqGi4UPgLv3uWcTEmaWVtH2G-r8DoG0FHui1fB5EyJCNEN5HweM6m2IR-SrcJvGLze1-qd4jL0JLTphw_0CqHGCxaQjiEOJTpQ5VCWJJZSeYKnhfw148&ADDITIONAL_machineid=ea2713616713ed6d099f06d19794adbc02f51a71&days_since_install=0&source=mbwin&varID=mb5-rtp3⤵PID:6068
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffeafa03cb8,0x7ffeafa03cc8,0x7ffeafa03cd84⤵PID:6092
-
-
-
C:\Program Files\Malwarebytes\Anti-Malware\Malwarebytes_Assistant.exe"C:\Program Files\Malwarebytes\Anti-Malware\Malwarebytes_Assistant.exe" --StopService3⤵
- Executes dropped EXE
PID:6468
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k AarSvcGroup -p -s AarSvc1⤵
- Checks SCSI registry key(s)
PID:5372
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D0 0x00000000000004E01⤵PID:5492
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Impair Defenses
1Safe Mode Boot
1Modify Registry
3Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD503d6455dc6934a409082bf8d2ce119d5
SHA1995963c33a268a7ed6408c2e6de1281e52091be2
SHA25682ca2aec64fe151efd59a838c1845111bfb9f94ff277be3afae4e3f684ef3a62
SHA512a0ff71bc01a11c9a95c1a0186a7bbfec9c3f84d7e600d0bca877934fa5f84053627bc59bb355f53ce9e3c9e4c6a841b8f5cb7436fe7f43b63426a8a851392c6d
-
Filesize
10KB
MD58abff1fbf08d70c1681a9b20384dbbf9
SHA1c9762e121e4f8a7ad931eee58ee60c8e9fc3ecb6
SHA2569ceb410494b95397ec1f8fa505d071672bf61f81cc596b8eccd167a77893c658
SHA51237998e0aee93ff47fe5b1636fce755966debe417a790e1aebd7674c86c1583feef04648a7bc79e4dedaabb731051f4f803932ac49ea0be05776c0f4d218b076f
-
Filesize
107KB
MD583d4fba999eb8b34047c38fabef60243
SHA125731b57e9968282610f337bc6d769aa26af4938
SHA2566903e60784b9fa5d8b417f93f19665c59946a4de099bd1011ab36271b267261c
SHA51247faab5fff3e3e2d2aea0a425444aa2e215f1d5bf97edee2a3bb773468e1092919036bcd5002357594b62519bf3a8980749d8d0f6402de0e73c2125d26e78f1e
-
Filesize
8.6MB
MD5f35a6782aea69cda718cc378504db826
SHA15fc4028de1c51089d9f487caa02a78d4d42266fd
SHA25620f89ddb4dd26f98ce006ae2034a87e1c2347788697e0fdb68b87c95af0b680c
SHA5125a5dcf1ecb32addf5fa9ffbce583fbdb4714e5b87553abd57723cb1b199c54bbaf038db1a7ee1cb095b1aad878f8d17919b55cb093c4a869d7356aaf28fb3a4f
-
Filesize
2.9MB
MD546f875f1fe3d6063b390e3a170c90e50
SHA162b901749a6e3964040f9af5ddb9a684936f6c30
SHA2561cf9d3512efffaa2290c105ac8b7534026604067c9b533e7b7df2e017569a4ec
SHA512fdfb348061158f8133380e9a94215f4bfc0f6ce643a129d623cb8034c49144f1489de56cd076da645478506d9fbddc7590fe3d643622210084b15fdf0d16b557
-
Filesize
291KB
MD583e78af5bb3005795455bf25cd655119
SHA1cfb1c565eaf3f22eeb4d7de4e45750d02c0890e9
SHA2569146792296dbfa654c1e074cb4859516f8679c1db4e94833ffc6933491811ae2
SHA51239942d8245599e64f591c1fb09bebc0838f2be7b94e8311d23f24db1673567eb684bb08bd7a88e9682eb0e5da4bcb24fe20a236760da32846753835daff82efc
-
Filesize
621B
MD5a79d1370e377839195119797ba4cbd89
SHA1d213f3069b0544b1cecdd2391fcb9d4e799d8cab
SHA2569d84ed814200aad137112fc6badfc17d301d4060cd088387be6bd938692941e5
SHA5128c61185df897fb221b2cde24556b5b76c114298ac609995b401430b86da6d053d4acd547ed8cc641378fa1b2bf1e33756b03e6591a1c863a042f925f31be0ce4
-
Filesize
654B
MD577334f5ecbc8f04621060ae5cf61005b
SHA17d222d449db828d864d6137d95e48dd0bffba011
SHA256c1ec58befc29065a3eadaed0c251ccc401d53277e68253775926d1b3f5ee11c4
SHA51298b57d02917035f5c8640b66895e432fa1b20225be7651fa626fe351b8426ce69541515edd26e963359bcce5c78541f95af6e0e5e717b05a47f58d2b343970d4
-
Filesize
8B
MD5c50446d6a2722752a12d3f19be21b5e8
SHA1f6e44ba69d2407a35aa80dce0ddfabc9408025db
SHA256761d4e0c1e1cb64f179997fc9fd263864bb325d4c1f3f4575d80191c824c752f
SHA51241842f4bfa84e2864bebff7da2d6515e5ab733ebd0d6230468873b0b01087c68cc5ef8f9912c94fb8b3a30729edc6bfc34a3648c3e465b877e989d409ef309af
-
Filesize
2.2MB
MD5b39ba8b6310037ba2384ff6a46c282f1
SHA1d3a136aab0d951f65b579d22334f4dabbebdb4a4
SHA2563ecbcb6c57af4456111f5f104b8fb8a317cdb0f16e98412249f7a2d62bca584d
SHA512a8b98f47c30503029f2dc80398dacd5f8fc07db562d04c56b8c7902bebf11517223350c41850b81aca770ebc9e68fc365921bd6cce34b57b2c945f1c51b538b7
-
Filesize
2.8MB
MD52bbf63f1dab335f5caf431dbd4f38494
SHA190f1d818ac8a4881bf770c1ff474f35cdaa4fcd0
SHA256f21a980316bd4c57c70e00840ab76d9ad412092d7d2d6a2cff4f1311f7c05364
SHA512ebb9834323329dc01ba2c87e5fad1083a4cb86f5ed761cb63299ac5336a9843a1aadd42fbed706797c2295117af1c00f96806422338352653c8e0255fecc2fd5
-
Filesize
1KB
MD55d1917024b228efbeab3c696e663873e
SHA1cec5e88c2481d323ec366c18024d61a117f01b21
SHA2564a350fc20834a579c5a58352b7a3aa02a454abbbd9eecd3cd6d2a14864a49cd8
SHA51214b345f03284b8c1d97219e3dd1a3910c1e453f93f51753f417e643f50922e55c0e23aab1d437300e6c196c7017d7b7538de4850df74b3599e90f3941b40ab4a
-
Filesize
113KB
MD52ccb84bed084f27ca22bdd1e170a6851
SHA116608b35c136813bb565fe9c916cb7b01f0b20af
SHA256a538caf4ac94708ddb4240d38b1b99914ca3e82283f0d8a2290be28fc05eaccb
SHA5120fd66d241bdebd0052f4972e85b42639e3c5a40affe23170b84bc4068dff8e84446898a77ebf7cc0bef97454abb788faccce508a68bc5e717980ef26d8436986
-
Filesize
10KB
MD5ddb20ff5524a3a22a0eb1f3e863991a7
SHA1260fbc1f268d426d46f3629e250c2afd0518ed24
SHA2565fc1d0838af2d7f4030e160f6a548b10bf5ca03ea60ec55a09a9adbbb056639a
SHA5127c6970e35395663f97e96d5bf7639a082e111fa368f22000d649da7a9c81c285ee84b6cf63a4fccb0990e5586e70e1b9efc15cf5e4d40946736ca51ec256e953
-
Filesize
2KB
MD5d87c2f68057611e687bdb8cc6ebea5b8
SHA127b1311d3b199e4c22772fa1b7ea556805775d37
SHA256ff93773f55bf4a6a0242adf82276a8c95c0b244b9bc05e515c4e810c81a960e8
SHA5124aa65b8911d8a2a0f9ef0ee6e934b94db0a9ad4c2ec543b5edcf21486be43f6ab1fda6617ea2cbb85eff230628c9fa8e7649da915d6de695803b28e55bef5819
-
Filesize
233KB
MD5246a1d7980f7d45c2456574ec3f32cbe
SHA1c5fad4598c3698fdaa4aa42a74fb8fa170ffe413
SHA25645948a1715f0420c66a22518a1a45a0f20463b342ce05d36c18b8c53b4d78147
SHA512265e6da7c9eede8ea61f204b3524893cf9bd1ed11b338eb95c4a841428927cccbed02b7d8757a4153ce02863e8be830ea744981f800351b1e383e71ddaad36ad
-
Filesize
9B
MD5516aab6c475d299cd0616174d51c4103
SHA10792fe0fd54c067b19848d0a7e65a539ecec6cb4
SHA256602d871efd8408a79f8b37e764a2a9884331324bbf602aefff9661a32f010611
SHA5127d144e10bfdc10ac46baf5e8bba893a9d4e420dbabc7d98e5da38638923b30e4ec7bb918b03d48cdd45e15224ba677b646751548f351e586a27ed57b6a87a846
-
Filesize
47B
MD5d374514afe572dc4208777cbaa4ef1a5
SHA1a21d23f8247090893e4466368a52328427f6c197
SHA25693d92d909c7d0271dc996109f276c810fbab137e781be394d733bb13cf4655e1
SHA512ff80d952cad99ed644dbed141dad00b4d4a0392a412481c10919a04cfaed659dece6c688c9da321dca22f9b6a29ff0755d20de84b2f7efdc245770ed7a318a09
-
Filesize
1KB
MD5605912e90cdb996f269a8b1167e1b41b
SHA11d1541753dafca524111f3dbca0fa9aeeecd22fd
SHA256637afc1006292918b178852b24528bc7e551bd3a6ca88c3f39e505c40883e518
SHA5127571380b769eef68cbd1c881d9f71b7d91d7dd2bba7afbdbfccbfafecc0755d85d1251ffbc6ea1a3253ef06811f25cc923fca206b5c9d8f8e92ff662ec5ffbb4
-
Filesize
47KB
MD5cc83fe8fe4bf5d2cbac63a72c00baf2e
SHA1887718d61d48346ad6f1a1af5e0b7cfbdc0621b0
SHA2561a554fe1dac7d2e26954b2ba246557c4bc64ba9a9059021371d96cf307b9173b
SHA512d0c65a52a7431904be22571f254ef04c9120340e4dd0420823c1df37069de1527a800f67508d0a4bfb6e3ac50c0644385f7ffe3b73af9a4973ebe98340a04af1
-
Filesize
66KB
MD5b7c795943b0edef8e7267816bbe48174
SHA18b5a9f168b237d0f26d9e11c84d2688938b0089c
SHA2568cd6280658b40117e6f9adaf2eff5ccc6e1223939b8c1677e27ba4511c646f59
SHA5124079c1001bbf5a0b8546c0bf9ea1cf54092e9e5d368c4b955dac0b8e11ee29f9926ebd279ab1e92870cf327e044a2a2b4dd37ac473ec751e81e4b385d1149e6b
-
Filesize
66KB
MD5e0ab3e885ceb616b12ba980bea1c44ea
SHA11f5533fbb809972546bfd774115c8f8c94d8bac2
SHA2563bb126fb4fd4d3155ac6f1b00682de8e01dd62508a246ca16bbad78cec55226e
SHA5125da7024b367c09bb9f12c7a89c9c8ccd5773fde4778afcadc068bfa8b722d148b750edca4a80d199216b0a26088c60ebbc1a8f615b80351c2cabcb28a02663cd
-
Filesize
607B
MD51505bf8aa64bf7d82f2a6f73231e47d4
SHA11b535b0de18b690d30b1558a973b9c103df5d1e7
SHA25645bc81f30c650108597200bf41b3e644f73878a10fdd2c1502f617b7b01ec34d
SHA512ef5e052048108b111d5f175005d3640786affb5e4ed2ef7f4e17745eeb6d2106aa74e7b2fcdd872f82ec33465ee9d384b9b6c07b49f53ef8bc4f8b29ba1e1f3d
-
Filesize
847B
MD56fc0b18854a997fe92b9b1eb9593fad4
SHA1fb1cd08d7d82f7eb60a84601b9bdebf4445cba8a
SHA256a7869918b1ce8a57e1b13a842a3ab78059a326a80d8383640191bf7e988e2494
SHA512e1ffe7513b8af776f351e8a0c7e3182f7e32115fed94ff35bed3726aa0ecfa966635c16bb20cd0b2971039b7e3e62280a4bc4b96ad5824864fc3230293da57d3
-
Filesize
846B
MD5b1d3fb6f634214924d4ac4658f16d89a
SHA14bdcecdc221d378ab9c79237e860850abf8c0f4e
SHA256a57c00e3f8ec24c63b6308baa3b21665d61db11752f86f5483da8583f812f5d3
SHA5127678158fce031fc4f269f04919ddd3927730ef59d3321946613ee2c2e8570e49cd11ee23dda680cddf5a98b9422275daa6d1003944c5cfa87a648d25c13b1b94
-
Filesize
827B
MD525de78a2153635c70028aa2645c12427
SHA175d453454055aa22fcb3d9062383e1613ebd34d8
SHA2561fb19ba0df7857d2a75ffe3bd79bf152e613418f89efcece90b602460af0293e
SHA512babf8a36b21efb9cc731db9edacdc639394f8f7be22e558577efe70d3c9da3dbc9b551ce6659035cf73f21ae54fcd33e8bd1707e53c3b93a096917b61e1dce7c
-
Filesize
11KB
MD5f9072b68aec1385aa2242cc38967eb69
SHA18e89b7a3d45816dc0b926f31a769cfebf5efb45e
SHA2561916c2385d97b4e573e40ca10fad4c69e1e0926d417c65f405d24a18069bcab0
SHA512567b61e2d9c02a69acb85240c873f06992de86bd222761a57c9594d482cf4dd4eab4572adf274c51ab4db4c1d52f8d07355286dbce7e638eb6de969273a604ce
-
Filesize
12KB
MD59fee0535d06aa49961dac06bf98ea799
SHA13084c46760df6a092bd3bbc4029f4719693726be
SHA2569b5b568f28fa1c0dc64a70147e0ffa03034cb2b45e5525f56de62b0eb7b7aa81
SHA5125a70a08bc9be73338216cd7bbdfc6d4e880e2e8d44854194a2015301c0662397eedea6c4b6f24731d891debb698e9658ec0f76bbc2965703df31fc3066b054ed
-
Filesize
12KB
MD52430d859754b211223ee1f2d7883f87e
SHA1d90481fa9578db0e9147626e2004a0b654a5084d
SHA25650407d79a93686cc61a12a26ae18458a0d557c10f5782a1f9daf4ec31bf01671
SHA5124824737579ad9029ce074e103c5f416061a47ad3337df7e25d86803d4689d19be7059ff583bd3b02586c8c5424e1d1ed5317ed441273b333f5bad9912c4d5a55
-
Filesize
1KB
MD5771ab9ce5d210eaae46bfe5d9eb09303
SHA113cceefe3e38566a4891084a41506b183f07c2e8
SHA2564f0a8c5c5b3331c12be5c93367a24139228d71a95c0aa6d03d599e951518c1dd
SHA51239f081cd35f136c773e36cef9035200cabb8eaf6a8b512a87004007ded79cdbd776c967399c8694c74c088806bc7529602e17d4be94d07b5b4e00a46ded61ebb
-
Filesize
2KB
MD5541a834d4e040edf8498ac4267b1f21d
SHA1bfb03cbf4c23d5ceb2894c276def225e70b72589
SHA25666fbb9e09deef8e6c1817ba99e9eb849452cd9d3dee003d7874b31f3abd2cafa
SHA512fd07e47c1223aaf849b7875cca3ae525c6b2c06d6ce18eb18df9145f1396893b3678a8eeddaf5c3e3ab004faf3324eb24d001a126fa0c4ea5f86c75b08566ef4
-
Filesize
814B
MD54dd36063eb8199cd1dc8ee65f93d5987
SHA1506c9d618253ac9fc4ab6801a7ca1ecae4181006
SHA2565ce26b8d9819040dff5477346f52a6a5163832a169301d871565a8f2088b8731
SHA512d4afdeaa60741a6ec46f33065a31ac1c6c716157cf479ae0540a09da368f77a67305713887f65bde6b5f0036fc955e97725922e1d707690392f5df0f2d7ef25d
-
Filesize
814B
MD538cec9ab24a59ca88cc35da2f5160ed4
SHA100d1c89a2d2dc226d626d0cb3b1d8f95aa27c622
SHA25696bff8bbaca7efdd626a31d9f8a39e6a02b20b206c9cc43b0b1046ced24956ae
SHA5125b70c3b138841102d6f74dd066cf346e2563d0448efe754889ef928691ac31747a657f60fbc7696b59218ca60dd02e3b2b2f0a0d4eea85fe5789eb34fd522b96
-
Filesize
816B
MD53baff338960aa562f05588a1f56ab01c
SHA1b10c57971fd00a287e5eeefd8dd332f4a2d29f33
SHA2568f8666cd5d7a35359a68d273164d5e9f890e516ce00bdbbbed7c02d28820e247
SHA51297daad8a5ff54d1547cf4541e7786cc62d24869939ec61121b8bfad7cb40963093140a55f12880ad0c55dfd6ca2bbf27178b507229ed035eb456cc254a17d7a4
-
Filesize
1KB
MD5714afd299d25820e3638881b90422e27
SHA12ba2162d9ba56029b61d9c07c23186abaeb5a1a7
SHA25660100f757447da1e0a239ac7abafe6c29dc77006a880bb1b75035792cc6fa4ae
SHA5123003a6835eb03b103d4ab238c0a446ada80f9e7a853d635ddfcf3b8a1e33fd5b8db9704f635b397fd3fc4a5d6cdeaef9c285638f68ea532bd75a09387c2c7cf8
-
Filesize
1KB
MD5214306669e0e78ec6a6d4768e824a687
SHA175e910795c3fc9ec4fed95f441b30c453575cb9e
SHA256b6cb991b00e389cb632ad0fec3458a30f710184c37cff52da2627c4da1de4179
SHA512db9c8f1903ec160ebb1a723c3e3b8b46a71722cb205a6e3804a596c753c887349cf03b4d45375f14b0fc02b0e45540273c45a1d4b3de268e4571a9511c70023f
-
Filesize
2KB
MD530c4c9067672a1e4f9b3db65d8910e78
SHA16eaca7f338fd5daac8de3666203fa65f1688706d
SHA256a569df2a56b103ce620887673172e42aa9b70c1ad95d5e823259336f74b9d096
SHA5129b7562a904bab972868f15db30dbcd83efc9935690aaabf8fa3f12dde15a6eb8c8d460081437c77359184936b88186c9c3823fea4c1380c668adf3cb9615b675
-
Filesize
4KB
MD593fe44f429956fa5085ccf2d30e7a3e0
SHA1463d172bd8963a33faf0b733432a6d1340ae6706
SHA256b5e4eb6fd9fc5d60af71d3a68bd2f65a8adeb28aa679eb2f5a3a4ff453c689fc
SHA5123b909d05a7050ea1ddde22ebb3aaba95ed64b7b4721e633b302982e5bd8b27398ef962993b138b685eee22cd7838901318c983f25b51c756bec3f1c89d189b2f
-
Filesize
11KB
MD53f6cc1273637fe48da7976f9cb6038f1
SHA109b8b497b375dcee35fd6e64175a17c53fe6605a
SHA256a9f6a87d8e9e1ead09d453a34d967c3f8beefebb355b3ed7da0452578d56412d
SHA512e72943924a5c2a76599ad118198eba5342ff85a2b820c919b8ae241e479bae4077125b9aca866c30bb66040310649b1891f3f083c442fe47dd5847bb4ee045cd
-
Filesize
1KB
MD5c9fc470759f533ab86fd30dc7b58bfa2
SHA1e1e241907f2d7ca5479faa35c8647318364df1fc
SHA2569032b2004ea86c6c93c419f7aada0f43b67e83694123df73d42ef1d48a8a2668
SHA5122d08eb1948bdd7ffb08fe5839793953f5e7aa22bc2eb374b1f60611da978b2dc033dd7390a59b71d83932e9d5df17902bc46e19dbaf53dfd46b9779772eb8c47
-
Filesize
1KB
MD5129a7477c03a6aa8b3611f35dbda0823
SHA1d06cd027e506fb75b63890bd1bae470033150e89
SHA256bb83a52f536f2dcdf478952a8636e1e49453f340f594dc2645ab1495945c3ab7
SHA5126cb2a9558f6c04bb29db334db0ccb4e14e79e0e9b44745d6ac5c9de50ea47cccd2876608d630c1dd1c8a3c96221bd7966b206959b41f284fa50f774f744ef880
-
Filesize
1KB
MD5dc7278be4abeab25b1864c62addbe90a
SHA1d8a1e3f67744a18bdd395cc4d9d5e6c3f3700149
SHA2563b8b8216bcda22d8aa0be1245ad6f13e56b1401dd0b0023f75c79661cd7e2065
SHA5120388cf339819e91fa04f9b94a4150ac0e8d40efbf16a15bda0b3dd4167cde1c48efd734f36317d2f16eac4e36b14e197d0fb0635de44d4d4c9eb76936bede285
-
Filesize
1KB
MD5a51dfb6459ae7c0921b4d9f2753d4c3e
SHA15ecb524537a2375c60ee508ad2fa87944578dbdf
SHA25698eb143722ff7db7a93c5bdc516ba734b0da3195bad3da07c27a0862c118aba3
SHA51219a9d7656a9e51e40087bada52fa5ea810660c058a5a02595a73e8611bff92403255b8cee58d5dbbc47c41eda9f405843bb3d97d202ce9366b01f1e7ab5f5086
-
Filesize
1KB
MD500d8764b4cc31fe9ffc4cc5cfc513d6d
SHA128cc2ea75abc493eb55d55d6c6281872e006bde2
SHA2561ef65fa6585c011c7e0ee489f1fc682f6c18bd48bd6b3f9161e9460ba47cc5e6
SHA512e782c266393294102f03f726027dd9cee24549bde15d7ad9f86b8cb6caceea34ef0a0bfdfda2ed820d5d671cd51ad8ffbe8a38e365f2b0e67262076e6cdfb483
-
Filesize
1KB
MD5c55fd7edef0832be7dd2a9c033471b61
SHA19a51092c3f166d0ceeca27678f210552963649d7
SHA2569c870d008b5168e487828865187c04f64841ed6c5ac535d26b1a44fdb9b994c3
SHA512d6736e97d0559bfbc358d5de56a0bcffbc01e0c5e455b3f3dc63495839880335b7580c3cf1868ef765800fe837a4ea6c97109e527f6ab7493c88344ae188c526
-
Filesize
1KB
MD5a8f4d50b3b0aacf01e4c84df30bf4b07
SHA13b01b81c88a97bd6ddb8eb6868f2bdcd33938c37
SHA2567436075bc269be38e18c0432fb05226492312862f897d280a312f3ab247da7d8
SHA512f05c481ecd57edd984d966235f8c03407afd33bb7b553434e24ce48b3e8d574af357727e46dc1a74ec1e65117d7e447739bf21ec72dad9a4766d1fea6b4af396
-
Filesize
1KB
MD5747062447758f3252da4ae0693263eb5
SHA19ad07a72e6f7c3f9463c7459e1713dacae533f1b
SHA2560579d1808ca76890b6666d28c2baf529ae044838b3fa60b804ed6ab6950abdba
SHA512d37af559970a9b6368b92c2be652ab0e02d8eadfe628063a9fc795a21f38f873af9915a0039ec8f41f45377882c0dd90855936f8ab57f80353b804903f401a03
-
Filesize
1KB
MD53f9e18272b185ebcc4b9425c26795d0e
SHA1d79468a3e7c1caef9b7ebd000a393d58ada1e5e5
SHA2560d809080774668d8f44fcd8a35607267a9f9c5a8cd2bef484888f85a17e0eddc
SHA512a5cac8ea63d6ab3fe20b8378e411aa5b1dbce170db6bcccfb97d76e2ed977ab0ec0ed7e70e6d0f48791e8c8c4f3c0b6f992c048af9f321a2c6f0c0233894fdb4
-
Filesize
1KB
MD5fa9c9237c13bcd93a14a3baff935442a
SHA1dcd4980ea6f5aeafe7d0c924b5f8119dc85962e6
SHA256cf423c777922e3e5e492bfbd042725f0f174567333bb5a4105027f6b2c67ae97
SHA5126ad7e44f1053fdd95b6bf09d5e55764c05dad700934104f2e18388bec2a1ed5e41d6472c8a2b1c1d2da36076168ab396ee457680386e43b26c035a3459b354af
-
Filesize
1KB
MD5b4c72dcfb502a7c1a9336182c4335821
SHA1542b0d74aca93dd248d0d7ceeaa99cd4eee15384
SHA25681e4ccec02e1310352b641abd29d40876c08e1ae67beea20fdbe93b11feb709a
SHA5121e94f916c8b36cc523cb208ef6ec832ce1586fba4de2cd2c35ca411fbbee562956874e3ed9e3218e154feaee169348a1dea1608097cd3f41f14d58deec225673
-
Filesize
1KB
MD5a3c1c58509fefa3e6090b986e00a65b4
SHA1e5f252ea65e30256667f75b225024e50a771c602
SHA256b30102200757856b373872dceded126ce98182c03d1100f243aa524892557ece
SHA512a8c0ddaca515ebd9fe7322e2bd97637b9fffd37c551161d126e50f9052d264ae8f3ecfc917ab63185de51b7fa85d0cb2b143864dd5b8174628ceb9bb608d5d1b
-
Filesize
125B
MD5bbdf3b4ebf794762e31779a3d0f22924
SHA1ca9c53bd74e275e54d84a20fdf54df5b094da230
SHA256711730d6f18cd6901bf6ae3829052149fb55f4fed0f36fc7d914ccc33b114a14
SHA51248e4a036e630c4d870c63e91b6c66bda5cbb28fd041c4311c9d90209a6593f8e43f22051456fb21fe53c0046acf4c23fea4f83163fc80dcb24578e8a7a3d6310
-
Filesize
4.5MB
MD5f802ae578c7837e45a8bbdca7e957496
SHA138754970ba2ef287b6fdf79827795b947a9b6b4d
SHA2565582e488d79a39cb9309ae47a5aa5ecc5a1ea0c238b2b2d06c86232d6ce5547b
SHA5129b097abeafe0d59ed9650f18e877b408eda63c7ec7c28741498f142b10000b2ea5d5f393361886ba98359169195f2aceeee45ff752aa3c334d0b0cc8b6811395
-
Filesize
5.4MB
MD5956b145931bec84ebc422b5d1d333c49
SHA19264cc2ae8c856f84f1d0888f67aea01cdc3e056
SHA256c726b443321a75311e22b53417556d60aa479bbd11deb2308f38b5ad6542d8d3
SHA512fb9632e708cdae81f4b8c0e39fed2309ef810ca3e7e1045cf51e358d7fdb5f77d4888e95bdd627bfa525a8014f4bd6e1fbc74a7d50e6a91a970021bf1491c57c
-
Filesize
336KB
MD5d8465ece5a05b3e8f20ed8c08fee12bc
SHA1b205e25ab1be02437234811ed6bafdaf50ddcff7
SHA256c56eae6af43e7278950bbf86a974a91549e4c86522a1f44944aa03c5d2168696
SHA512eefae3e12cd61b3303beca8f47def4360ee9830a13a8272749e3a6f1ec2f8cbba84095fae08a58b2ffad75c07e54683235123d83b604a5de184009306b9072d4
-
Filesize
20.2MB
MD56271d84d9d60bbf794ac79fba74d91f7
SHA1b0032b8f2775b0f0d55156fad218c728925d3982
SHA256fdefa8da5add95b790f1ab63ed23cdea8cc67703cb0c3162d0fabbec0e6a6f3d
SHA512c7feb2d1887df5f6321d128d2c222461eeaaf826fa51d22e04cd0356ec6923a2f94b1f91a585a89b28d78b676ec21c3577af04d17cb00baaae577adc977a164b
-
Filesize
935B
MD5de80d1d2eea188b5d91173ad89c619cd
SHA197db4df41d09b4c5cdc50069b896445e91ae0010
SHA2562b68990875509200b2cf5df9f6bdfcda21516e629cab58951aac3be6a1dd470c
SHA5127a8f5f83552dbff21be515c66c66f72753305160606c22b9d8a552ab02943a2c4e371d17dce833020d2779c6d9fe184a1e9ef3d1b8285c77aeb17b2bba154b3f
-
Filesize
16KB
MD527520d6d1114b637e0b81c0a81ea18e4
SHA16a366e02366ac87cafa2f7a99be3b233f6a49be6
SHA256e8389a70e0b22e94bb506491e0ad5c5268592897c938ba6ff4e76d1bb3a6a9ac
SHA512e10f085d6c58c860499f7566f9ceff94ff4c750228838eaa36cdc7fc74ec0de450267dc95c7c258c2618e50209ae186192c6ed0ac3756bbd74c6a6ae248116d0
-
Filesize
924B
MD5680a342686330c75fbdae97d1c3768a7
SHA11d5fab2d6b2e030a9bc21560bbed5a0fdd25a694
SHA25633f909f343778682416ae3600a7e375ab35f9a75c48cac67c7a001c76699ee2c
SHA5125c8781e03a55a6e49937d1c88268a8a58b3635ce2e2eb452cea4eea2647f597525f8c0224bf48c3b55e23644bf9b5bf1478e86a043da6ebc3956b626e23930ff
-
Filesize
39KB
MD510f23e7c8c791b91c86cd966d67b7bc7
SHA13f596093b2bc33f7a2554818f8e41adbbd101961
SHA256008254ca1f4d6415da89d01a4292911de6135b42833156720a841a22685765dc
SHA5122d1b21371ada038323be412945994d030ee8a9007db072484724616c8597c6998a560bc28886ebf89e2c8919fb70d76c98338d88832351823027491c98d48118
-
Filesize
23KB
MD5aef4eca7ee01bb1a146751c4d0510d2d
SHA15cf2273da41147126e5e1eabd3182f19304eea25
SHA2569e87e4c9da3337c63b7f0e6ed0eb71696121c74e18a5da577215e18097715e2f
SHA512d31d21e37b0048050b19600f8904354cff3f3ec8291c5a7a54267e14af9fb88dfb6d11e74a037cc0369ade8a8fb9b753861f3b3fb2219563e8ec359f66c042db
-
Filesize
1.8MB
MD5e19dd0f3c9d4ce5cb7311c3a1d65962f
SHA17123244e7578a3f22daf17bdc882025f3b084baf
SHA2569f21c48b12f45d2f3b34a3326b237bf673de01b7273c2640ba7920d86b35852d
SHA512bd32a1cb3a7f0d72021fdea0f483cfa377176a99e0550f037817607f9f88ba89b4c0ec9ef84a7680cdb633c3eed4f82296290df53950747625dba6501c11810b
-
Filesize
514B
MD5851fc146899ff88b9da796b12df8e86d
SHA185a8b6e11a993a8d0263ef7667a9f26424ecf9fa
SHA256076fb46560fddeeb92e4f228e246527054ace3ec4f08f0c3d298b5bbc2cf1944
SHA512b03313c45590e8b8864d7ef432f9af74d7cda984147ed875d3396a1042e253e2e12a1f613c0c3efe911ef9ab394556cc8877a77eda71364dc114619355ffec29
-
Filesize
24B
MD5546d9e30eadad8b22f5b3ffa875144bf
SHA13b323ffef009bfe0662c2bd30bb06af6dfc68e4d
SHA2566089fbf0c0c1413f62e91dc9497bedc6d8a271e9dc761e20adc0dccf6f4a0c1f
SHA5123478f5dcf7af549dd6fe48ad714604200de84a90120b16a32233b6d44fa7240f5f4e5fe803f54b86bbdfd10fa1bfdd88fb85eb6a78e23e426933f98d0a2565ec
-
Filesize
24B
MD52f7423ca7c6a0f1339980f3c8c7de9f8
SHA1102c77faa28885354cfe6725d987bc23bc7108ba
SHA256850a4ea37a0fd6f68bf95422d502b2d1257264eb90cc38c0a3b1b95aa375be55
SHA512e922ac8a7a2cde6d387f8698207cf5efbd45b646986a090e3549d97a7d552dd74179bd7ac20b7d246ca49d340c4c168982c65b4749df760857810b2358e7eb69
-
Filesize
9.9MB
MD5d97bd6f7bd0555b456fbbfa81741bf2f
SHA1c28d6eb2144462d9eaa481c305193405e12365dc
SHA25689be66efbec5d157c22ed3f68181c86c8a127bdc7532f4e046cf7d2105ae7f50
SHA5125aa01a2bee808eb1221142a24b219d55dbb95ff5eb0f7f82c67431e6885ddcb958245b2d4d523d148df3cbc3be20682011a4f51b8bb1210a9b18df689bce8405
-
Filesize
528KB
MD5ac9b550ed5d28232779eee526b45c595
SHA137f7944a97e5c5800330fc614a0d0eb3aca9f7dd
SHA25628e9e689f703978bc1f90a15af3c64f78d52f23d70f3e48af304290791ce68b0
SHA512731e7788f352e1a447b80a1cfc4e068f4c03e4f7583ac10b5c2e5b39299f03bfed16d8ebf84dbc48b4903f8e6d7ed1668ed53a48994d7fd631c64be0408b22a9
-
Filesize
647KB
MD517eb18de5fd31befb56cd1c86e773e6e
SHA18475ec7758a26b85ea05e383d218c376622bbab0
SHA25655136bb3929d77f4ff6762b64b93239346c210a79b8d169238513aa7d844229b
SHA51200a6111c2c340057ef174af6d1909bf4bcd55d12c9794995b6ffc48b48e5af015944a8e5246712cb9a8a27e088c06254d5200edbbc404f3008c1372300e32785
-
Filesize
153KB
MD5f4427c3a4e9645c4f5ddea7ed27956ec
SHA169aac7fcbe9f54d961f667ac3fb3662e9ec3e217
SHA2563126e1aeeb6e6f373d5cd03446049a5e367986fc6e3e006c300c60afe0f14ffd
SHA512dfb8629aaed93ae317454dbead55617378e29430fda83ba7728434362be2fed764f8e3fc4d661247f94ac66b5c81c4a8a0fbb9a6a318679c8cdbb24f9f3ff995
-
Filesize
22.1MB
MD5cfab192be0dee1d0b70c65ff5b7e628d
SHA12cfbca712245d50579ab74d91f7966ea2cee89eb
SHA256a5c99cb41bf2d4d5114ca5708332d2f419cf758244f3c1e4040682c223d71742
SHA512b1657d0fb58b443d931ad45f26ad4f2e5ee92b5226be8b6781fd37689afd66d411fe582a14218001707683342674f4eaea86e00404349531b6ac97ab32d351a9
-
Filesize
75B
MD5571985b7718113b9540e7f10a8fce5d8
SHA18c8ef9c9b73cdc24e5bbcfe11d70b2cc5276f7f8
SHA2561f687cb04e456dc4c11f9c101e78455912bf8bf1ea8ba0d5eeda1fa399c6b37c
SHA512e6923df6fbfef329360402dc48849c397e21fa7c20cee2049aa18f31b59f8f090466bc099002bef7e7e06914ba09aa27ccd15a322bd51b51fbc1d37b36e72d26
-
Filesize
152B
MD5fdee96b970080ef7f5bfa5964075575e
SHA12c821998dc2674d291bfa83a4df46814f0c29ab4
SHA256a241023f360b300e56b2b0e1205b651e1244b222e1f55245ca2d06d3162a62f0
SHA51220875c3002323f5a9b1b71917d6bd4e4c718c9ca325c90335bd475ddcb25eac94cb3f29795fa6476d6d6e757622b8b0577f008eec2c739c2eec71d2e8b372cff
-
Filesize
152B
MD546e6ad711a84b5dc7b30b75297d64875
SHA18ca343bfab1e2c04e67b9b16b8e06ba463b4f485
SHA25677b51492a40a511e57e7a7ecf76715a2fd46533c0f0d0d5a758f0224e201c77f
SHA5128472710b638b0aeee4678f41ed2dff72b39b929b2802716c0c9f96db24c63096b94c9969575e4698f16e412f82668b5c9b5cb747e8a2219429dbb476a31d297e
-
Filesize
67KB
MD5b275fa8d2d2d768231289d114f48e35f
SHA1bb96003ff86bd9dedbd2976b1916d87ac6402073
SHA2561b36ed5c122ad5b79b8cc8455e434ce481e2c0faab6a82726910e60807f178a1
SHA512d28918346e3fda06cd1e1c5c43d81805b66188a83e8ffcab7c8b19fe695c9ca5e05c7b9808599966df3c4cd81e73728189a131789c94df93c5b2500ce8ec8811
-
Filesize
19KB
MD52e86a72f4e82614cd4842950d2e0a716
SHA1d7b4ee0c9af735d098bff474632fc2c0113e0b9c
SHA256c1334e604dbbffdf38e9e2f359938569afe25f7150d1c39c293469c1ee4f7b6f
SHA5127a5fd3e3e89c5f8afca33b2d02e5440934e5186b9fa6367436e8d20ad42b211579225e73e3a685e5e763fa3f907fc4632b9425e8bd6d6f07c5c986b6556d47b1
-
Filesize
64KB
MD5d6b36c7d4b06f140f860ddc91a4c659c
SHA1ccf16571637b8d3e4c9423688c5bd06167bfb9e9
SHA25634013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92
SHA5122a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487
-
Filesize
65KB
MD556d57bc655526551f217536f19195495
SHA128b430886d1220855a805d78dc5d6414aeee6995
SHA256f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4
SHA5127814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb
-
Filesize
171KB
MD540c1320bc877bf54deb60155e22d608a
SHA1c4735517bdf6903f80e28d80fbae2c58d8e105c7
SHA25671e7d96e0b15924a58f28b82f88627957a5ea25f7a23930c295186f3412cca2c
SHA512d52634fb3d303dceec351f3d9dcf5e8387e9b2c1fd4f7f07ad25a557cc1ca0c7f7ec7005a62ab235904596770152bf63ec2c0bb0e2316b31cd330d79818823a1
-
Filesize
19KB
MD5d3907d0ccd03b1134c24d3bcaf05b698
SHA1d9cfe6b477b49d47b6241b4281f4858d98eaca65
SHA256f2abf7fbabe298e5823d257e48f5dc2138c6d5e0c210066f76b0067e8eda194f
SHA5124c5df954bd79ed77ee12a49f0f3194e7dbf2720212b0989dad1bc12e2e3701c3ef045b10d4cd53dc5534f00e83a6a6891297c681a5cb3b33a42640ae4e01bbfd
-
Filesize
19KB
MD50774a8b7ca338dc1aba5a0ec8f2b9454
SHA16baf2c7cc3a03676c10ce872ef9fa1aa4e185901
SHA256e0fd57c0d9537d9c9884b6a8ad8c1823800d94dcfb6a2cc988780fe65a592fe6
SHA512a0066b2a6b656e54f7789fea5c4c965b8603d0b1c3d0b5560cfbafd469a4cb5a566c143c336bcbd443bae2648e960aa0e635770e7c94d0cb49c19326f6ca7b69
-
Filesize
19KB
MD5bcb7c7e2499a055f0e2f93203bdb282b
SHA1d4a23b132e1ca8a6cb4e678d519f6ae00a8aac58
SHA256f6537e32263e6c49bf59bd6e4952b6bf06c8f09152c5b016365fef70e35856cf
SHA51289e5e40a465e3786d35e2eba60bdc0fe2e5bd032dd4a9aa128f52e5b4b9e0871c4c4859f5b681c497fe3c9362e24827ed7cdc55515e3da0718f5129dcc82fe40
-
Filesize
120KB
MD56c2918af41500d21e282f720f0b2e364
SHA17c664d8e579fddeba428d0374daa7576edb55af7
SHA2562d71a55f5dad7cda17ce63dd9d673c81550681f90d9c059ca23e3be81967c602
SHA51214859485890626032ac253f7d00277675aa460e206ef537d81ba8cec9fa26e90928ec3c6c90ca5a3977698b45f2619a8c58cb8dc9764cd3e2fb27999a46f2b1a
-
Filesize
125KB
MD536e0645bd3392c55e78f2ea848fbb4e8
SHA126c60221905666dfc8002072a0083a1f06cbd8c9
SHA256bbf5ef817d938f8bbb1bada103e55f96170f62fe6cf7b54b4019071e7072ee15
SHA512404f91a851752fa3e2a6a70be6b341b5fde778d3b2e9134c69da971e00c003c7e9d309f4e681464a2a566aa8e9ad18bba158a2bb10cc1b320d448037da74c717
-
Filesize
173KB
MD54a8c93f2cb84336bb11796a549941d40
SHA178cbc69d480b07951b23865e27437a565822afc8
SHA2567dfe96249d73eae447d1edadecd5cc098ab76099647c9e2cf8f3b616d5fe5ee7
SHA512dd9115f956d945e3d34cf85cb4acf326c37a43f7039ceed076e24077b31bf9cddcf5d92aa491ddc4b5bd37134426231b70527037f76420c8bae9e9700df60e8e
-
Filesize
52KB
MD58c9f5d592b2671b4910fbd685ae61401
SHA12c38e925773617e94fb911f4d1573bd0f44d607b
SHA256837bb391f879a1edd4521ce965b614bb760c6a2eeacde80329a57631196bea73
SHA512458c84f09f7473cc56928085cb0325c893ca2f923e921eacfe62b66d4c926b3c99e1c10c8e17c30e00d4d538200d99a6dc1be74818bfa3c219b28714caede9af
-
Filesize
18KB
MD5a90e737d05ebfa82bf96168def807c36
SHA1ddc76a0c64ebefe5b9a12546c59a37c03d5d1f5b
SHA25624ed9db3eb0d97ecf1f0832cbd30bd37744e0d2b520ccdad5af60f7a08a45b90
SHA512bf1944b5daf9747d98f489eb3edbae84e7bc29ff50436d6b068b85091c95d17fe15b721df0bff08df03232b90b1776a82539d7917599b0a3b2f2f299e7525a51
-
Filesize
54KB
MD59880989851fcd47652a37312edb17547
SHA1fcf275884bff18a926de0bcd46c6bc8918356d86
SHA2561fc4302f08484cb4df0a32e6cf6ce58cc057de2eed9c645cfdabebef1d3306d1
SHA51253be2da27a9c74be74a9bdad217c8724affd822a4ae7980439f124d1f8a3e1125b8664e16427308e423a1aa05d83a4b015201ddcd89fed09f9d83902b27e44a9
-
Filesize
72KB
MD5666e1367e0f6ad9fb2d01a4e40f36c8a
SHA114b9e501bd52160c72404afb6ed0586511636a45
SHA2565a8742eb868288fa758c8126713c202228a7ecb850403ef25f1475d0939fbebe
SHA5122abc4143be5d8e2cf96829f9898f603833933c948684b484e49fa1cd06e613fe7e6d02478f95abd891688db3e049fa539854a91425cdaea6d72eb754dd0ceddf
-
Filesize
63KB
MD5066fe6d23476396bdaa85a52191d4f7c
SHA1de658f31971e06689fb153a29c4f7a3b3829a864
SHA256e8504491b69ead816b50f9600d5adfe03f75c91b3742d46eefcbd161ce2c7446
SHA512c1c9e84b1c95efbf38de483295cb71b105ff6337a87c0f4ddc1123fcde062d3f50dc3f1e6832cd4b7a39a57a1b3ea4d64aca533fd19c94449acc1897e4d26d7f
-
Filesize
89KB
MD513dd4d27ff4df87b0747356741070149
SHA1965fcc93dd635b250f45af42c8f2b21047bbc907
SHA2564ed2afc447a95a07b74870f5243f6770c60a7c60752526c679f60c15697cee4a
SHA51265d6b6cb9b811cb9ef473e453f30b7e1979e80cc8bfa957fd79eea5eb4a1d1fb799ec4f0979a1ce270b74e4d071628065725cfc9f71f8d55042c30848e779a8e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD525b66e337594106b64fd2ea865a26736
SHA16b9bf6880d1672844d54fdb7bbfb1d97c6260cbe
SHA2566303b257b434a71d6b281f61eafcec5844af273a40982e4e95d3dab7e39948d8
SHA512db6ef5b8ac80be55b96ba06264de74fac880adef57900f21903dba56cca31d1cb73025451419ceb52fb04ac4b670131d6326d797feb249454b4e4ab7b213f37a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5d4b918376b05401abba58868d6b6f26d
SHA16e59fa715d69a820d72092f39d96956a9e74b296
SHA2564f692b515184ce5f1fdee645f7805f8bc9fff88e60bdac9b324257b585e20cf2
SHA512bec5fff702d98a7b93e1371fd2d4f53191cd998453ab1a3d63ea9cadef30f87be177bcf64c28f0067e7b978fb75848159a2ab29734a8589c7a1ce00446129209
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD59ae2d995127cac5075e8616dfc199755
SHA189d45c7ecab6fe063adb781b11133bdadaf7a153
SHA2563026068a1433223a9d89e669ecb70dd68d6a1c2ccdea9578a76d07228390d74a
SHA512cdf4645f01eb4fb906f1ea91616a3437d87aefded80ddd116eaa5e1f0d1ac3463a934522261e019e4c12de3375dcf5557a38643f531a0774ed232456d83be2a6
-
Filesize
1KB
MD512330981ad03c509245558b30949572f
SHA15339c355f1f5101452102a2bec2090bcb64dcd9c
SHA256f2e966153c163d6b5ec8766cd8ced77c3158db8624c4bf0d31619dc9b4168377
SHA51264d3628a7d234feb96c8aabb785a656d7708e384ff8f698b293d5fa1c30e9230ba5520820a2ff28db87d66e47fa8cc3a29e34614469783a14b95c654bae63fb3
-
Filesize
2KB
MD520d35fa4b96fec07c09d042d1c8e8658
SHA1a558b1251f44704eff59760be5a3c8b499e1b6db
SHA256ae7a3677c13740c12cf5984446516099c9335aabffea58eb1e83ed8a599295dd
SHA512c155890e9afd47a50a7afa56a5f9bfbf38bad50555e137e5e8e01ba0ef394cbd5d2d3a362cd3167f007c386c442310f29d792978cd1b05ae992d64873f7e8882
-
Filesize
3KB
MD57353ec7c530b236046e3a4a56229cbc0
SHA1a4d5fa9bbb61c5bd1f231542be903c22925aa78c
SHA256fc8cad57000340ab4e6a140875c4e1487bec224597865a5b99892fcf103335bd
SHA512d574e7166146886664ede77f37d1a0b0b830192f43c55138c69730d818c9a9657d4e74458640594c6b87388a145e23cf3b87deeb8285240ed2feb912a8787ccc
-
Filesize
6KB
MD55bdff058202ac5fcf688a9b29c326fb3
SHA1fcff2f424a77b3113149048cdc337d4edda0d14c
SHA256e187d1c996913c929c1c1d7827f94bcbe85f13081a1087436e9edccb3099d848
SHA512ce69cd216f6f40bfcb0a66b2c21b8e4adf29cd5ede500c3def62fc39ce43b5d41e2977757604180668959270570639a6fb5b1e948ff43f9bdc19aa1e16bd70b6
-
Filesize
6KB
MD599544e7507e6dae886d0cfd07f2aa77d
SHA1e246d2a7ddd7f77de66cdf2bc3ef787df8ceffbf
SHA256f81b6b2b4812759fa44adc2ea19ef2b2726f771c07774f2fe44b159db58bc972
SHA512ad18f5947b7af04979c8dde5b6587cfe038fa4be924d486ad10bb0b62fb2fce3ff042c76cc668386eddfa00135deff33f32502262b412f650bfe46198dc483dd
-
Filesize
6KB
MD5602a86d842da110b3e989a72d0d02d7d
SHA1b2d6eb14a39295469d502518b15bf51c0d631f42
SHA2569cf1df180c7cab1bfdde41038113ee8b6ea80c6336af535a58bc781c0e147255
SHA512a192ec064a2d9d8da4704efd8448fea715daed816f0bcf80f6e8136110b5bfae6eb20cba716f451767fdc4e1094ea13c0419f3e5d73edb095bee773582ab910f
-
Filesize
5KB
MD5055726a68737564028d5dde5bf9db350
SHA18849597bd961eaecc6a14ba6f07a05d29eb6649e
SHA256052e551d59e236253dadce39a5dfebc647bce93f1467831a4668a240e64a4eb8
SHA51214f3a5d11f4dd3e463fa6c61f5d736844c4807d6c0f66ca1c6c9c78fd01dbd137e67ae0b88e531a33c7dceb003fd56cf255975c3dd6d22f96d93d74dc9d513d8
-
Filesize
6KB
MD5e2d5b4c86b9d7e2296432f1d8a43c12b
SHA11902b15ae82ff91dab322335f2658c994f6c9fcb
SHA256561ca5c66c4671c1ddb9f125410bf50c1576c2213c9b2fe44c978196ddb0f255
SHA512a9bf952f6b2e6726c0af2bd011b8a8bd674d20640208af259a3195f5e87b9089b5ce73eb8ea2cfe989a2669c661bc20d96036d09d8aa0ce3b6d8539de31c819b
-
Filesize
8KB
MD5903c1387168d2e3fcc6bd4276acff172
SHA1c7264278f15e32cbbec37f13b355a1621879e2aa
SHA2566604fb8cd26bd6c0c20cdb2601efe2ce3f8a80cb8ff42de1c1d6bb00b63a0ea5
SHA5129db885b9422aaad11810b7ac627e84d135bc7abb132f44bf17404d761531378eab018a3a04f3b1fc87dc6d377027bbfbcd5cf297f2c5fd8037232d48233ea89a
-
Filesize
6KB
MD54db8fcdc289d92823e8c7878acd78d2b
SHA1928854d3d7def19450202f9382679108a25e128f
SHA256a262c7b60cbc9b8c3c56c77cb9be557c8392b94ac3dd2916797dde03f5721dec
SHA512f5930701e1bb6a8e9d5b7aff10d1160230acca88dd3051713446adb68f8d122da6b77c874a06b6c992dd26742d3b3a62e35533bd8af88885280b47bf20cba5a7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD53d909b86ef9ad5d73f722e2947eaf331
SHA1fe81fee9e57700b70f120c1c49b93195a64fd9f7
SHA25690b67724e1954ee486efb860252506eeaa119e5b8014c887a93e1f4995cd3f33
SHA512586235a47bf31a7c4104a34b397670613157820177d2faaa7e5f471d08c5cf94e4e48728d9ca534abb8689e736d861ed29603d60e09bfe9282287c65556d63cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5aea80.TMP
Filesize48B
MD53822f9a552df66ea055540a5e9e3ae3a
SHA1332821d25b2970953b2cdccf1155f6344e80e73f
SHA256c41f3e9ea2086cee1c646a2240f7c0db8e1dd8d536d369dc3b47c23e84acb158
SHA512f0acf7b1f32bd3c3da49e5ef77d10a6c4f78a0d1fb0470320adee07562abbbecdb759196faa6e8f4243a685aa43fc57bf5ab4fc6822320cf607df003e4c1f4db
-
Filesize
2KB
MD57517d7cd06af31719beb573f6bc75501
SHA15b62d3b20097708b8fe7707c39de311c25a2dba4
SHA2569f505ffd5df6bf218e6a062cac15996e91abbe8d22b9e8d7959fa2e146453143
SHA512ce9c5ea2d3bf6773874c78eb054947b9231cb83f51226484b38062251c1176ce5a3ce5a8d36767a8293d465d179bce1735a7557d93a0224081168892e9e44bad
-
Filesize
2KB
MD5a12dc32b2b9fb787c98b721449ec661c
SHA124344b6fd0cfaae628d7d6d98657494c1f60db89
SHA256d83fc862357c0cf85192b932a3e3cae9cef8298f03292bcba162b2d9db402896
SHA512d15221468786976e40699b0ea8c0dd8414f94106fa4e62f139aaa2f12caf94912271fb35f4fb3cd3d5d3baf034c1df38f1979bd1755c92bc47938120f9ff27ab
-
Filesize
1KB
MD55a6fa96301f17cb55f55c33f6a9cf31b
SHA1b5218fb29ec472fff73eadef48b682d62b5bb1ef
SHA25631a09e90097df94b4ae980908cae18e28ce65785bbb41083ab0bf401a280784e
SHA5120ac489b774c2da55e35c5a9afe35ce86211f414a477b1e8b115f9ffd88a34ecbd15e0a78649ae59eb577defa768c0bec3184f4e14cb16e8b07a3c5ab2ea29150
-
Filesize
2KB
MD52028842be740b02e2c893746f0e5a71d
SHA114ffd1c95a33c675243198340f3a935937c54631
SHA2560dbcc38d9a0952273c1a1ceab82170ccee0c782cf51cf1584abf00b4381eed89
SHA512dd3ac59ee6044fb365b026b0384e91f43daf21407ff63e64eb3f46489abb380190f4f9c5b6dddd5195557ed570abb15bf43182b680462c0e1c7b5d637d79413e
-
Filesize
538B
MD5c6af008c181b48f725d394a25fcdf1a5
SHA1b75f4e038c784826588ee6f9ea7a8d8d622f1e1e
SHA2563754ec992d8e93367a6d2e38f7d7d6edada7efad25fa13a9a225dbf810354fd6
SHA51265d85bcfc6bce78c51100657b412e746a30dcf1c3638f54f7cadde34104778ae0e5a69b44d9e96818c5fdb590af6c4ce358368d4ce9e810a0efc51d3f989470c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a662baa03c73bd89869532be11a3f030
SHA1541fff74fce9e4041b057147375c10a211d6a617
SHA25656a1dea63278b5dc517f247fb843a3fb2341c85ebd67655a8df8b4591010cee7
SHA51273f891c135b96b1046e4560b940c72fd6eee532305300afbaca18ca554307bd26fc29164e0972180dc2c950df75cb0a88be263d8d58bb2d259a7811f8324ac66
-
Filesize
11KB
MD58cfa3923e574fe69a55abc31754b82f9
SHA12abc027cb663403ded21099ad8cf308d3b662cc1
SHA2566f25153356fedde593f22fb0254f3940490107fe616fdda570fa20e527d72aa0
SHA512ff16a23fec47fcfef88c4f35ab84ba0479a33efe9bae3ecbcb44d5471760e565fc04d44f7c94b16e8b1e99f8ef4f9e4f053cd8dbdef48bd5bdb9047a824c99f6
-
Filesize
10KB
MD55a284e605d1f7ce31447d75cd0648ef9
SHA17cd928f951dc38a69f367c974ec1b67e9b947e2c
SHA25696320ff518dcdf6316904703e46fed3615b4e2677b0033fca410c8ce799bd4df
SHA512e2b19a079600abbbcd2d06236b7d76c765566a46967c4500580ecac892b786e4f21c96b20cc5722c19ed8532ead9611e198350171516db467ffb35b3022cfe87
-
Filesize
10KB
MD52ec96543ffd604b5592b5d1114502172
SHA128b4a5cc3d5ca792ccef20f2e41b7602a3b8278e
SHA2568e462a6a1aa46794396b0d77fef8af151f1db89e40a509363de0dd96bf7637f6
SHA512cab45a4d58a555435b4f96b1c314bc5c2fc91150f6b968af8eb73ee85ace9c61ae1df5d18b9d974baa0569c6c246f6617b7db3a02a68e1d47fd9b5b72050bf88
-
Filesize
11KB
MD53fd54925f91ca8edf2c2062d1676ca0f
SHA1676506c2974b2bb332dad3101991a0a373157b19
SHA2560dad70f1a47cb680e1b6f7c364ecce8167315c50d634bfefb8aea715518a74b9
SHA51260fdd04e6df00278f027253a18a232023095f6907a9f787e47bc856ee2aa8d107f7fbba981643abad44b2db1a793076b87faf5c8eb79d3bddaf448f088d9bd63
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\abc92e4c-bbc1-442d-9144-9c4461860f93.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize10KB
MD523f3c77b2cfd48421be2eb924d3b5bc2
SHA156c9bbebd1086d759469f944395262c9482225c7
SHA2565b13d5ccd1e3a71bc642660c7b00f06af63f18893ccf8c5486a38a9828b60156
SHA51211ada92ec49dcc32a6cef9b6555fe8c256579530f2192c639d9a758175a3d29a18e42484f7447e32c92244cd43847704608da1b78a503e7c000a2b08699d25f9
-
C:\Users\Admin\Desktop\viruses\viruse\233577f4da477bceab4c15b1149157b118bbe21e79b1bc474e456960e0831c99.elf
Filesize150KB
MD5d7c2e9385b98f8ba9551bba2d76e8324
SHA192a7d2654df5092f439d531b54e614315920899b
SHA256233577f4da477bceab4c15b1149157b118bbe21e79b1bc474e456960e0831c99
SHA512caa076ed72b53e21ec9bc72458357d6d625d369a738409719a1a744bc97ea118614cf7cd926570a797994226d5908bf5d5039dac4f93309167c19d423c04a89b
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
2.6MB
MD573e964d096abeae2a3ede695422fd301
SHA1c21b85855c2cc928572ba9bbfd07203051b7a074
SHA2566bd5dd485b558ae2a89fe7b0101c77fff6a64e1019f5d75b6fa53298170e1752
SHA512008728cb58d7be5740c33c694690ba29f3a9e19b4721a1eb3f8528552d23583532d5dd3662e96142ff349b4e411ca3017b2895dff9f12354eff4c78e22beb376
-
Filesize
16.6MB
MD5e1606b69ee4e58966bc1d0b0db9c7d3c
SHA1b9b266a20187f4d3649395545b92b86ec4982ca4
SHA256fe29a89f3cafdae3c78ba4b7eac1c98dcbf2b6077871e8149db8a815472fdd8f
SHA5120eeb924f1ab337b6421c09e7bae5c702ecea54e3acb2f8a800354f5362dfb440a7cd510af71b0b4285fb6f8d4c37b2911f9817e172a072421a789fbe025bb31b
-
Filesize
107KB
MD57637273f2a8365504822b1030326a297
SHA17a4eae661388a63844cde285a6f283ff78c52832
SHA256e27cd49b453b909f8a95fe030ae217de04d1bf5840dc695b034fee466fc47980
SHA5127255bdea96e5392586f4a90b633f9e8947c59cc0418064ddf8a4563d85aa6bec1237ab4b7b7e4410faff08eab441e9effa2ab6105ed35ce8c03c77f44eb928c1
-
Filesize
107KB
MD5a3b38922bc58cb2fd468277d03dd7422
SHA12957a0c417dfd20cc1e15823adc3bb56cc25a427
SHA256f9d51ca9c420d645246b94510e8ef32828c449f49634a198251b4d635d9581fb
SHA512e413b54db89450fecec388f4285a7b946a44e6fa6549efd3575100a8117e902f7879188abed70207c1a1c2646cc651594938bcdb526783f8795e7f19b5c9d2a0
-
Filesize
1.6MB
MD53430e2544637cebf8ba1f509ed5a27b1
SHA17e5bd7af223436081601413fb501b8bd20b67a1e
SHA256bb01c6fbb29590d6d144a9038c2a7736d6925a6dbd31889538af033e03e4f5fa
SHA51291c4eb3d341a8b30594ee4c08a638c3fb7f3a05248b459bcf07ca9f4c2a185959313a68741bdcec1d76014009875fa7cbfa47217fb45d57df3b9b1c580bc889d
-
C:\Windows\Temp\MBInstallTemp48ec41b1bbbf11ef8df8661b819d71ab\ctlrpkg\Malwarebytes_Assistant.runtimeconfig.json
Filesize372B
MD5d94cf983fba9ab1bb8a6cb3ad4a48f50
SHA104855d8b7a76b7ec74633043ef9986d4500ca63c
SHA2561eca0f0c70070aa83bb609e4b749b26dcb4409784326032726394722224a098a
SHA51209a9667d4f4622817116c8bc27d3d481d5d160380a2e19b8944bdd1271a83f718415ce5e6d66e82e36819e575ec1b55f19c45213e0013b877b8d61e6feb9d998
-
Filesize
154KB
MD595515708f41a7e283d6725506f56f6f2
SHA19afc20a19db3d2a75b6915d8d9af602c5218735e
SHA256321058a27d7462e55e39d253ad5d8b19a9acf754666400f82fe0542f33e733c6
SHA512d9230901adeecb13b1f92287abe9317cdac458348885b96ef6500960793a7586c76ae374df053be948a35b44abe934aa853975a6ccd3788f93909903cc718c08
-
Filesize
6.4MB
MD579b962f48bed2db54386f4d56a85669e
SHA1e763be51e1589bbab64492db71c8d5469d247d5c
SHA256cb097b862f9913eb973c6f16e1e58a339472e6abae29d8573c8f49170d266e8a
SHA512c45ab55788b2c18e9aa67c9a96b8164c82b05551e8d664b468b549cced20a809257897cdfbbd49f3a4804a4adcc05323f21c61e699173a93dda614e80d226de4
-
C:\Windows\Temp\MBInstallTemp48ec41b1bbbf11ef8df8661b819d71ab\dotnetpkgtmp\shared\Microsoft.NETCore.App\6.0.33\mscordaccore.dll
Filesize1.3MB
MD50377b6eb6be497cdf761b7e658637263
SHA1b8a1e82a3cb7ca0642c6b66869ee92ce90465b2a
SHA2564b7247323c45262bbb77f0ef55c177a2211040fa77d410513a667488bf1bc882
SHA512ff3f6f6d1535e7aab448590fdbdf60d37e64e00d4081853f201c0103d7b7918f388db5469774f32af211e0990bc103bc9ff3708fa44efd868aa312c76ea65600
-
Filesize
9.0MB
MD5a91250ee015e44503b78b787bd444558
SHA1fe2257577e22f4a65115745a6624465258065e8e
SHA256a43179b449c2bab069cfc055de0a3e9e5f3ba378fe4306c19f2b999325a2c7b2
SHA5128e321a20d4bda5ad203e3880c0d4ec741b55ebb3c74250f365086dd338b61eafe79d746b53ac786fc2bb9defd21e36fddc1be50e11b89ae8b337568f2c939e36
-
Filesize
10KB
MD560608328775d6acf03eaab38407e5b7c
SHA19f63644893517286753f63ad6d01bc8bfacf79b1
SHA2563ed5a1668713ef80c2b5599b599f1434ad6648999f335cf69757ea3183c70c59
SHA5129f65212121b8a5d1a0625c3baa14ef04a33b091d26f543324333e38dcdb903e02ccc4d009e22c2e85d2f61d954e0b994c2896e52f685003a6ef34758f8a650c7
-
Filesize
2KB
MD5c481ad4dd1d91860335787aa61177932
SHA181633414c5bf5832a8584fb0740bc09596b9b66d
SHA256793626d240fd8eefc81b78a57c8dfe12ea247889b6f07918e9fd32a7411aa1c3
SHA512d292e028936412f07264837d4a321ecfa2f5754d4048c8bcf774a0e076e535b361c411301558609d64c71c1ce9b19e6041efa44d201237a7010c553751e1e830
-
Filesize
20KB
MD59e77c51e14fa9a323ee1635dc74ecc07
SHA1a78bde0bd73260ce7af9cdc441af9db54d1637c2
SHA256b5619d758ae6a65c1663f065e53e6b68a00511e7d7accb3e07ed94bfd0b1ede0
SHA512a12ccf92bead694f5d3cba7ff7e731a2f862198efc338efc7f33a882fe0eb7499fb3fb533538d0a823e80631a7ca162962fbdfd78e401e3255672910b7140186