Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
05/02/2025, 09:34
250205-lj3hzaskdm 102/02/2025, 14:19
250202-rmz5xavnfw 402/02/2025, 14:17
250202-rl3veavnc1 402/02/2025, 00:22
250202-an9bjaynfr 1002/02/2025, 00:12
250202-ahevqsylfm 1002/02/2025, 00:08
250202-ae1m2awpbt 1002/02/2025, 00:04
250202-acl2vsykbm 10Analysis
-
max time kernel
590s -
max time network
591s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250128-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250128-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
02/02/2025, 00:12
Static task
static1
Behavioral task
behavioral1
Sample
b231263f-0b92-4f02-9e71-3d6a05534490.jpg
Resource
win10ltsc2021-20250128-en
Behavioral task
behavioral2
Sample
b231263f-0b92-4f02-9e71-3d6a05534490.jpg
Resource
win11-20241007-en
Errors
General
-
Target
b231263f-0b92-4f02-9e71-3d6a05534490.jpg
-
Size
26KB
-
MD5
99cfb36285d82796d745c8a199f6acff
-
SHA1
ab990d5b00d7878178a6e77553152149ce4f56c3
-
SHA256
afc3ff71d364c14eecc12918e7c00a435943005fc86dafa53da529f0a9c95285
-
SHA512
3a9558a9e628aac5af58f98a9e7056fe5a2741517067f0f9ebac9a800d6bd564433ab0b3910746f99e82573d2ba176241ce3d3b25961a6c27ae828c0d4defd26
-
SSDEEP
768:Z3Bt4w6U03dxH1/ARsjefQIbwTj5pW0JPfmXkD+lakhXOsX0:Z3BtNZAdxHdARkef7bQ5I8POEqY
Malware Config
Extracted
C:\Users\Admin\README_HOW_TO_UNLOCK.TXT
http://zvnvp2rhe3ljwf2m.onion
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Program Files (x86)\\Windows\\Error file remover\\fatalerror.exe" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Program Files (x86)\\Windows\\Error file remover\\fatalerror.exe" msiexec.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" RedEye.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection RedEye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" RedEye.exe -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2720 828 cmd.exe 228 -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RedEye.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 5568 bcdedit.exe 3768 bcdedit.exe -
Renames multiple (78) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" RedEye.exe Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" RedEye.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Downloads MZ/PE file 14 IoCs
flow pid Process 201 2540 msedge.exe 201 2540 msedge.exe 201 2540 msedge.exe 201 2540 msedge.exe 201 2540 msedge.exe 201 2540 msedge.exe 201 2540 msedge.exe 201 2540 msedge.exe 201 2540 msedge.exe 201 2540 msedge.exe 201 2540 msedge.exe 201 2540 msedge.exe 201 2540 msedge.exe 201 2540 msedge.exe -
Drops file in Drivers directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\spoclsv.exe Gnil.exe File created C:\Windows\SysWOW64\drivers\spoclsv.exe Gnil.exe File opened for modification C:\Windows\SysWOW64\drivers\spoclsv.exe Gnil.exe File opened for modification C:\Windows\SysWOW64\drivers\spoclsv.exe Gnil.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mb3-setup-1878.1878-3.3.1.2183.exe\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HitmanPro.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HitmanPro_x64.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\microsoftedge.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logoff.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Autoruns.exe RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iExplore64.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCuiL.exe RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\yandex.exe\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\attrib.exe RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bcdedit.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RKill.exe\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AdwCleaner.exe RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\microsoftedgecp.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rkill64.com\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HitmanPro.exe\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\microsoftedgecp.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rkill.scr RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rkill.scr\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mb3-setup-1878.1878-3.3.1.2183.exe RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Autoruns64.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gpedit.msc\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\attrib.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCuiL.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\microsoftedge.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logoff.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HitmanPro_x64.exe\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\opera.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UserAccountControlSettings.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iExplore64.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rkill64.com RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZAM.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ComboFix.exe RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AdwCleaner.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\opera.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\a2start.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad++.exe\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rkill.com RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Autoruns64.exe RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\recoverydrive.exe\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rkill-unsigned64.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mspaint.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RKill.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rkill-unsigned.exe RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rkill.com\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZAM.exe\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbam.exe RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chrome.exe\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe RedEye.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2260 NetSh.exe -
Checks computer location settings 2 TTPs 20 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\Control Panel\International\Geo\Nation SporaRansomware.exe Key value queried \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\Control Panel\International\Geo\Nation AdwereCleaner.exe Key value queried \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\Control Panel\International\Geo\Nation Rokku.exe Key value queried \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\Control Panel\International\Geo\Nation RedEye.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\US579-7DXZT-RTXTX-HTXAT-XYYYY.HTML SporaRansomware.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\us579-7dxzt-rtxtx-htxat-xyyyy.html taskmgr.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\readme_how_to_unlock.html taskmgr.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\readme_how_to_unlock.txt taskmgr.exe -
Executes dropped EXE 64 IoCs
pid Process 5796 xpaj.exe 3080 msedge.exe 1640 msedge.exe 2916 xpajB.exe 3088 msedge.exe 2068 msedge.exe 540 msedge.exe 456 Gnil.exe 5296 spoclsv.exe 5476 msedge.exe 5300 msedge.exe 664 msedge.exe 3044 msedge.exe 5536 Floxif.exe 3628 Floxif.exe 216 Gnil.exe 4772 spoclsv.exe 1748 xpaj.exe 4540 msedge.exe 1140 msedge.exe 5200 msedge.exe 5112 AdwereCleaner.exe 5700 6AdwCleaner.exe 3912 msedge.exe 5868 msedge.exe 5732 msedge.exe 5152 SpySheriff.exe 5044 msedge.exe 3488 msedge.exe 5320 msedge.exe 5608 WinlockerVB6Blacksod.exe 5776 WinlockerVB6Blacksod.exe 6084 WinlockerVB6Blacksod.exe 60 Floxif.exe 5744 Gnil.exe 2064 spoclsv.exe 436 msedge.exe 5748 msedge.exe 3580 msedge.exe 4536 satan.exe 3576 satan.exe 5224 opno.exe 1220 opno.exe 420 msedge.exe 4784 msedge.exe 2580 msedge.exe 1328 SporaRansomware.exe 4044 msedge.exe 2384 msedge.exe 3720 msedge.exe 3556 msedge.exe 1140 msedge.exe 2632 msedge.exe 6024 msedge.exe 576 msedge.exe 4056 msedge.exe 1260 Satana.exe 5312 Satana.exe 4680 msedge.exe 5288 msedge.exe 4348 msedge.exe 6012 Rokku.exe 3924 msedge.exe 2680 Rokku.exe -
Loads dropped DLL 64 IoCs
pid Process 3108 msedge.exe 3080 msedge.exe 1640 msedge.exe 3088 msedge.exe 3088 msedge.exe 2068 msedge.exe 2068 msedge.exe 540 msedge.exe 540 msedge.exe 5476 msedge.exe 5476 msedge.exe 5300 msedge.exe 5300 msedge.exe 664 msedge.exe 664 msedge.exe 3044 msedge.exe 3044 msedge.exe 5536 Floxif.exe 3628 Floxif.exe 4540 msedge.exe 4540 msedge.exe 1140 msedge.exe 1140 msedge.exe 5200 msedge.exe 5200 msedge.exe 3912 msedge.exe 3912 msedge.exe 5868 msedge.exe 5868 msedge.exe 5732 msedge.exe 5732 msedge.exe 5044 msedge.exe 5044 msedge.exe 3488 msedge.exe 3488 msedge.exe 5320 msedge.exe 5320 msedge.exe 5608 WinlockerVB6Blacksod.exe 5608 WinlockerVB6Blacksod.exe 1860 MsiExec.exe 1860 MsiExec.exe 1860 MsiExec.exe 1860 MsiExec.exe 1860 MsiExec.exe 1860 MsiExec.exe 1860 MsiExec.exe 1860 MsiExec.exe 1860 MsiExec.exe 1860 MsiExec.exe 4036 MsiExec.exe 1860 MsiExec.exe 5608 WinlockerVB6Blacksod.exe 1860 MsiExec.exe 5776 WinlockerVB6Blacksod.exe 5776 WinlockerVB6Blacksod.exe 1940 MsiExec.exe 1940 MsiExec.exe 1940 MsiExec.exe 1940 MsiExec.exe 1940 MsiExec.exe 1940 MsiExec.exe 1940 MsiExec.exe 1940 MsiExec.exe 1940 MsiExec.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\Downloads\\RedEye.exe" RedEye.exe Set value (str) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\Downloads\\RedEye.exe" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\Downloads\\RedEye.exe" RedEye.exe Set value (str) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdwCleaner = "\"C:\\Users\\Admin\\AppData\\Local\\6AdwCleaner.exe\" -auto" 6AdwCleaner.exe Set value (str) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{AE3DD8E9-23D3-741B-5056-89916FF8340B} = "C:\\Users\\Admin\\AppData\\Roaming\\Eqcel\\opno.exe" Explorer.EXE -
Blocklisted process makes network request 3 IoCs
flow pid Process 262 1860 MsiExec.exe 265 1940 MsiExec.exe 266 5416 MsiExec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RedEye.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: WinlockerVB6Blacksod.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: WinlockerVB6Blacksod.exe File opened (read-only) \??\X: WinlockerVB6Blacksod.exe File opened (read-only) \??\W: WinlockerVB6Blacksod.exe File opened (read-only) \??\X: WinlockerVB6Blacksod.exe File opened (read-only) \??\T: WinlockerVB6Blacksod.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\K: WinlockerVB6Blacksod.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\I: WinlockerVB6Blacksod.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\D: WinlockerVB6Blacksod.exe File opened (read-only) \??\D: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\W: WinlockerVB6Blacksod.exe File opened (read-only) \??\Z: WinlockerVB6Blacksod.exe File opened (read-only) \??\S: WinlockerVB6Blacksod.exe File opened (read-only) \??\D: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\S: WinlockerVB6Blacksod.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\D: WinlockerVB6Blacksod.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\R: WinlockerVB6Blacksod.exe File opened (read-only) \??\X: WinlockerVB6Blacksod.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Q: WinlockerVB6Blacksod.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\V: WinlockerVB6Blacksod.exe File opened (read-only) \??\P: WinlockerVB6Blacksod.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\N: WinlockerVB6Blacksod.exe File opened (read-only) \??\I: WinlockerVB6Blacksod.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\K: WinlockerVB6Blacksod.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\M: WinlockerVB6Blacksod.exe File opened (read-only) \??\G: WinlockerVB6Blacksod.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: WinlockerVB6Blacksod.exe File opened (read-only) \??\Y: WinlockerVB6Blacksod.exe File opened (read-only) \??\Z: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 200 raw.githubusercontent.com 201 raw.githubusercontent.com -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 xpaj.exe File opened for modification \??\PHYSICALDRIVE0 xpaj.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf RedEye.exe File opened for modification C:\autorun.inf RedEye.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\Control Panel\Desktop\WallPaper = "C:\\redeyebmp.bmp" RedEye.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 3636 Explorer.EXE 3636 Explorer.EXE 3636 Explorer.EXE 3636 Explorer.EXE 1220 opno.exe 1220 opno.exe 1220 opno.exe 1220 opno.exe 1220 opno.exe 4420 RuntimeBroker.exe 4420 RuntimeBroker.exe 4420 RuntimeBroker.exe 4420 RuntimeBroker.exe 5572 backgroundTaskHost.exe 5572 backgroundTaskHost.exe 5572 backgroundTaskHost.exe 5572 backgroundTaskHost.exe 4828 DllHost.exe 4828 DllHost.exe 4828 DllHost.exe 4828 DllHost.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 5160 Conhost.exe 5160 Conhost.exe 5160 Conhost.exe 5160 Conhost.exe 2720 cmd.exe 2720 cmd.exe 2720 cmd.exe 2720 cmd.exe 5504 vssadmin.exe 5504 vssadmin.exe 5504 vssadmin.exe 5504 vssadmin.exe 5836 DllHost.exe 5836 DllHost.exe 5836 DllHost.exe 5836 DllHost.exe 5428 Conhost.exe 5428 Conhost.exe 5428 Conhost.exe 5428 Conhost.exe 5576 Rensenware.exe 5576 Rensenware.exe 5576 Rensenware.exe 5576 Rensenware.exe 5504 dw20.exe 5504 dw20.exe 5504 dw20.exe 5504 dw20.exe 2580 DllHost.exe 2580 DllHost.exe 2580 DllHost.exe 2580 DllHost.exe 1968 DllHost.exe 1968 DllHost.exe 1968 DllHost.exe 1968 DllHost.exe 5868 RedEye.exe 5868 RedEye.exe 5868 RedEye.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4536 set thread context of 3576 4536 satan.exe 202 PID 5224 set thread context of 1220 5224 opno.exe 206 PID 1260 set thread context of 5312 1260 Satana.exe 238 -
resource yara_rule behavioral1/memory/5536-1964-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/5536-1968-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/3628-1987-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/3628-1990-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/60-3131-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/60-3134-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/files/0x000b000000027f7b-3804.dat upx behavioral1/memory/6012-3871-0x0000000000400000-0x000000000058D000-memory.dmp upx behavioral1/memory/2680-4176-0x0000000000400000-0x000000000058D000-memory.dmp upx behavioral1/memory/2680-4214-0x0000000000400000-0x000000000058D000-memory.dmp upx behavioral1/memory/6012-4215-0x0000000000400000-0x000000000058D000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\psmachine.dll xpaj.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_filter\libhds_plugin.dll xpaj.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libscaletempo_pitch_plugin.dll xpaj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.OleDbProvider.dll xpaj.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ucrtbase.dll xpaj.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\sqlite.dll xpaj.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libmp4_plugin.dll xpaj.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libtransform_plugin.dll xpaj.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\MicrosoftEdgeUpdateOnDemand.exe xpaj.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe xpaj.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\fr\ReachFramework.resources.dll xpaj.exe File opened for modification C:\Program Files (x86)\Windows Media Player\mpvis.DLL xpaj.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\rt3d.dll xpaj.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\libmux_ps_plugin.dll xpaj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Client.Excel.dll xpaj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\EntityDataHandler.dll xpaj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\mip_upe_sdk.dll xpaj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\AUDIOSEARCHSAPIFE.DLL xpaj.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\msedgeupdateres_id.dll xpaj.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\goopdateres_ms.dll xpaj.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ViewerPS.dll xpaj.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\libwingdi_plugin.dll xpaj.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\libflaschen_plugin.dll xpaj.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-processenvironment-l1-1-0.dll xpaj.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-handle-l1-1-0.dll xpaj.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\System.WorkflowServices.dll xpaj.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_duplicate_plugin.dll xpaj.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libvpx_plugin.dll xpaj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.SqlServer.Configuration.SString.dll xpaj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Data.OData.NetFX35.dll xpaj.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\vk_swiftshader.dll xpaj.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\es\System.Net.Resources.dll xpaj.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libkate_plugin.dll xpaj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\excelcnv.exe xpaj.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\pipanel.exe xpaj.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libi422_yuy2_sse2_plugin.dll xpaj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\concrt140.dll xpaj.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\WindowsAccessBridge-64.dll xpaj.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\System.Workflow.Activities.dll xpaj.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe xpaj.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\goopdateres_iw.dll xpaj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\zlibwapi.dll xpaj.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\libstats_plugin.dll xpaj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power View Excel Add-in\Microsoft.ReportingServices.ProgressiveProcessing.dll xpaj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.Excel.DataWarehouse.dll xpaj.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\de\System.Data.Services.Client.resources.dll xpaj.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\msedgeupdateres_eu.dll xpaj.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\pwahelper.dll xpaj.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libmpgv_plugin.dll xpaj.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe xpaj.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\api-ms-win-crt-runtime-l1-1-0.dll xpaj.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\System.Net.Resources.dll xpaj.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libjpeg_plugin.dll xpaj.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libdolby_surround_decoder_plugin.dll xpaj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\upe.dll xpaj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoasb.exe xpaj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power View Excel Add-in\Microsoft.ReportingServices.AdHoc.Excel.Client.Entry.Interfaces.dll xpaj.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\PresentationCore.resources.dll xpaj.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\de\System.Data.Entity.Resources.dll xpaj.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\goopdateres_sw.dll xpaj.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\mshwjpn.dll xpaj.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\MSEnv\PublicAssemblies\extensibility.dll xpaj.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\BIB.dll xpaj.exe File opened for modification C:\Program Files (x86)\Common Files\System\wab32.dll xpaj.exe -
Drops file in Windows directory 57 IoCs
description ioc Process File created C:\Windows\Installer\e5cbf50.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIC05C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI587A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI97BE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC218.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC2C7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC316.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5939.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5859.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI975E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI990B.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIC268.tmp msiexec.exe File created C:\Windows\Installer\e5cbf54.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI5610.tmp msiexec.exe File created C:\Windows\Nope.txt RedEye.exe File opened for modification C:\Windows\Installer\e5cbf50.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI56FE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9700.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI988C.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIC169.tmp msiexec.exe File opened for modification C:\Windows\Installer\e5cbf59.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI982D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI997B.tmp msiexec.exe File opened for modification C:\Windows\Installer\e5cbf54.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI97DE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC08C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC1E7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC208.tmp msiexec.exe File opened for modification C:\Windows\Tasks\sys.job MsiExec.exe File opened for modification C:\Windows\Installer\MSI9A67.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI57FB.tmp msiexec.exe File created C:\Windows\Installer\e5cbf59.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI98EB.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI99F9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI56CE.tmp msiexec.exe File opened for modification C:\Windows\Tasks\sys.job MsiExec.exe File opened for modification C:\Windows\Installer\MSI9AC6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI58EA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC238.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI577D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5998.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBFAE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI567F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI572D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI58AA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI978E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC0BB.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC0FB.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{C452D4E2-DE24-48B6-B5C3-ACB240A01606} msiexec.exe File created C:\Windows\Tasks\sys.job MsiExec.exe File opened for modification C:\Windows\Installer\MSIBFFD.tmp msiexec.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI589A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI993B.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh NetSh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh NetSh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh NetSh.exe -
Program crash 5 IoCs
pid pid_target Process procid_target 5916 5536 WerFault.exe 154 3524 3628 WerFault.exe 159 5952 60 WerFault.exe 192 5624 5312 WerFault.exe 238 4456 2680 WerFault.exe 265 -
System Location Discovery: System Language Discovery 1 TTPs 41 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpajB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gnil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rokku.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gnil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdwereCleaner.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language satan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gnil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinlockerVB6Blacksod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Floxif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language satan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Floxif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpySheriff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Floxif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinlockerVB6Blacksod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Satana.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinlockerVB6Blacksod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SporaRansomware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Satana.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rokku.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x000d000000027f2c-2074.dat nsis_installer_1 behavioral1/files/0x000d000000027f2c-2074.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Interacts with shadow copies 3 TTPs 5 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 5684 vssadmin.exe 4224 vssadmin.exe 5820 vssadmin.exe 5008 vssadmin.exe 5504 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\Software\Microsoft\Internet Explorer\Toolbar Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Explorer.EXE -
Modifies data under HKEY_USERS 22 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\28 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\29 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "163" LogonUI.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\SniffedFolderType = "Generic" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\SniffedFolderType = "Downloads" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1\0 = 5a00310000000000425a9501100053797374656d33320000420009000400efbe874f7748425a95012e000000f00800000000010000000000000000000000000000004fa91201530079007300740065006d0033003200000018000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\ShowCmd = "1" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\KnownFolderDerivedFolderType = "{885A186E-A440-4ADA-812B-DB871B942259}" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 14000000070000000100010008000000140000007b0031004e005000310034005200370037002d0030003200520037002d0034005200350051002d004f003700340034002d00320052004f0031004e00520035003100390038004f0037007d005c0047006e00660078007a00740065002e0072006b007200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e907020050004300480020003200390025000d000a005a0072007a00620065006c0020003700320025000d000a0051007600660078002000310025000d000a004100720067006a00620065007800200030002500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002500000000000000000000000000000000000000000000000000000000000000d15bac3c0875db01c17d60ce0875db010000000047006e006600780020005a006e0061006e0074007200650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b0072000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c100000000000002000000e90702004100720067006a00620065007800200033000a005600610067007200650061007200670020006e0070007000720066006600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000002600000074ae2078e323294282c1e41cb67d5b9c00000000000000000000000055e27b0a7271db0100000000000000000000000000000d20feb05a007600700065006200660062007300670020004a0076006100710062006a006600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000640000000000000002000000e90702004600630072006e0078007200650066003a002000360037002500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000002700000073ae2078e323294282c1e41cb67d5b9c000000000000000000000000aa5486117171db0100000000000000000000000000000d20feb05a007600700065006200660062007300670020004a0076006100710062006a006600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000007b0031004e005000310034005200370037002d0030003200520037002d0034005200350051002d004f003700340034002d00320052004f0031004e00520035003100390038004f0037007d005c0046007200700068006500760067006c00550072006e0079006700750046006c006600670065006e006c002e0072006b0072000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000640000000000000000000000e90701004a0076006100710062006a006600200046007200700068006500760067006c0020002d0020004e0070006700760062006100660020006100720072007100720071002e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000004000000dce282ba05f4ad47b032cf0faa0e3933000000000000000000000000c0f024e86971db0100000000000000000000000000000d20218f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e90701000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000075ae2078e323294282c1e41cb67d5b9c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e90701000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000081ae2078e323294282c1e41cb67d5b9c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e90701000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000082ae2078e323294282c1e41cb67d5b9c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e90701000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000083ae2078e323294282c1e41cb67d5b9c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\WasEverActivated = "1" sihost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{885A186E-A440-4ADA-812B-DB871B942259} Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\UserStartTime = "133825311530040188" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\Rev = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\MRUListEx = ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\NodeSlot = "4" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 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 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1\0\NodeSlot = "3" Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A8CDFF1C-4878-43be-B5FD-F8091C1C60D0}\Instance\ Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616209" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616209" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\Version = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{885A186E-A440-4ADA-812B-DB871B942259} Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616193" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1 = 56003100000000003c5a9051120057696e646f777300400009000400efbe874f7748425a8b022e000000360200000000010000000000000000000000000000005a211b01570069006e0064006f0077007300000016000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\HotKey = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Downloads" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\Mode = "4" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2566122449-2538968884-464987429-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE -
Modifies system certificate store 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868 6AdwCleaner.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868\Blob = 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 6AdwCleaner.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868\Blob = 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 6AdwCleaner.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 227465.crdownload:SmartScreen msedge.exe -
Runs net.exe
-
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3636 Explorer.EXE 3636 Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2528 mspaint.exe 2528 mspaint.exe 2540 msedge.exe 2540 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 2968 identity_helper.exe 2968 identity_helper.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 5920 msedge.exe 5920 msedge.exe 3080 msedge.exe 3080 msedge.exe 2068 msedge.exe 2068 msedge.exe 456 Gnil.exe 456 Gnil.exe 456 Gnil.exe 456 Gnil.exe 456 Gnil.exe 456 Gnil.exe 5296 spoclsv.exe 5296 spoclsv.exe 664 msedge.exe 664 msedge.exe 216 Gnil.exe 216 Gnil.exe 216 Gnil.exe 216 Gnil.exe 216 Gnil.exe 216 Gnil.exe 4772 spoclsv.exe 4772 spoclsv.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 5200 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
pid Process 2916 xpajB.exe 2332 taskmgr.exe 3636 Explorer.EXE 380 msedge.exe 2816 taskhostw.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 45 IoCs
pid Process 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 4128 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4128 AUDIODG.EXE Token: SeDebugPrivilege 5536 Floxif.exe Token: SeDebugPrivilege 3628 Floxif.exe Token: SeDebugPrivilege 1508 taskmgr.exe Token: SeSystemProfilePrivilege 1508 taskmgr.exe Token: SeCreateGlobalPrivilege 1508 taskmgr.exe Token: 33 1508 taskmgr.exe Token: SeIncBasePriorityPrivilege 1508 taskmgr.exe Token: SeDebugPrivilege 5700 6AdwCleaner.exe Token: SeSecurityPrivilege 872 msiexec.exe Token: SeCreateTokenPrivilege 5608 WinlockerVB6Blacksod.exe Token: SeAssignPrimaryTokenPrivilege 5608 WinlockerVB6Blacksod.exe Token: SeLockMemoryPrivilege 5608 WinlockerVB6Blacksod.exe Token: SeIncreaseQuotaPrivilege 5608 WinlockerVB6Blacksod.exe Token: SeMachineAccountPrivilege 5608 WinlockerVB6Blacksod.exe Token: SeTcbPrivilege 5608 WinlockerVB6Blacksod.exe Token: SeSecurityPrivilege 5608 WinlockerVB6Blacksod.exe Token: SeTakeOwnershipPrivilege 5608 WinlockerVB6Blacksod.exe Token: SeLoadDriverPrivilege 5608 WinlockerVB6Blacksod.exe Token: SeSystemProfilePrivilege 5608 WinlockerVB6Blacksod.exe Token: SeSystemtimePrivilege 5608 WinlockerVB6Blacksod.exe Token: SeProfSingleProcessPrivilege 5608 WinlockerVB6Blacksod.exe Token: SeIncBasePriorityPrivilege 5608 WinlockerVB6Blacksod.exe Token: SeCreatePagefilePrivilege 5608 WinlockerVB6Blacksod.exe Token: SeCreatePermanentPrivilege 5608 WinlockerVB6Blacksod.exe Token: SeBackupPrivilege 5608 WinlockerVB6Blacksod.exe Token: SeRestorePrivilege 5608 WinlockerVB6Blacksod.exe Token: SeShutdownPrivilege 5608 WinlockerVB6Blacksod.exe Token: SeDebugPrivilege 5608 WinlockerVB6Blacksod.exe Token: SeAuditPrivilege 5608 WinlockerVB6Blacksod.exe Token: SeSystemEnvironmentPrivilege 5608 WinlockerVB6Blacksod.exe Token: SeChangeNotifyPrivilege 5608 WinlockerVB6Blacksod.exe Token: SeRemoteShutdownPrivilege 5608 WinlockerVB6Blacksod.exe Token: SeUndockPrivilege 5608 WinlockerVB6Blacksod.exe Token: SeSyncAgentPrivilege 5608 WinlockerVB6Blacksod.exe Token: SeEnableDelegationPrivilege 5608 WinlockerVB6Blacksod.exe Token: SeManageVolumePrivilege 5608 WinlockerVB6Blacksod.exe Token: SeImpersonatePrivilege 5608 WinlockerVB6Blacksod.exe Token: SeCreateGlobalPrivilege 5608 WinlockerVB6Blacksod.exe Token: SeShutdownPrivilege 5304 msiexec.exe Token: SeIncreaseQuotaPrivilege 5304 msiexec.exe Token: SeCreateTokenPrivilege 5304 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 5304 msiexec.exe Token: SeLockMemoryPrivilege 5304 msiexec.exe Token: SeIncreaseQuotaPrivilege 5304 msiexec.exe Token: SeMachineAccountPrivilege 5304 msiexec.exe Token: SeTcbPrivilege 5304 msiexec.exe Token: SeSecurityPrivilege 5304 msiexec.exe Token: SeTakeOwnershipPrivilege 5304 msiexec.exe Token: SeLoadDriverPrivilege 5304 msiexec.exe Token: SeSystemProfilePrivilege 5304 msiexec.exe Token: SeSystemtimePrivilege 5304 msiexec.exe Token: SeProfSingleProcessPrivilege 5304 msiexec.exe Token: SeIncBasePriorityPrivilege 5304 msiexec.exe Token: SeCreatePagefilePrivilege 5304 msiexec.exe Token: SeCreatePermanentPrivilege 5304 msiexec.exe Token: SeBackupPrivilege 5304 msiexec.exe Token: SeRestorePrivilege 5304 msiexec.exe Token: SeShutdownPrivilege 5304 msiexec.exe Token: SeDebugPrivilege 5304 msiexec.exe Token: SeAuditPrivilege 5304 msiexec.exe Token: SeSystemEnvironmentPrivilege 5304 msiexec.exe Token: SeChangeNotifyPrivilege 5304 msiexec.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe -
Suspicious use of SetWindowsHookEx 23 IoCs
pid Process 2528 mspaint.exe 2528 mspaint.exe 2528 mspaint.exe 2528 mspaint.exe 5796 xpaj.exe 1748 xpaj.exe 5700 6AdwCleaner.exe 5700 6AdwCleaner.exe 3636 Explorer.EXE 3636 Explorer.EXE 3636 Explorer.EXE 3636 Explorer.EXE 3636 Explorer.EXE 3636 Explorer.EXE 3636 Explorer.EXE 3636 Explorer.EXE 3636 Explorer.EXE 3636 Explorer.EXE 3636 Explorer.EXE 3636 Explorer.EXE 3636 Explorer.EXE 3636 Explorer.EXE 2280 LogonUI.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4144 RuntimeBroker.exe 2000 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 380 wrote to memory of 648 380 msedge.exe 91 PID 380 wrote to memory of 648 380 msedge.exe 91 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 444 380 msedge.exe 92 PID 380 wrote to memory of 2540 380 msedge.exe 93 PID 380 wrote to memory of 2540 380 msedge.exe 93 PID 380 wrote to memory of 2444 380 msedge.exe 94 PID 380 wrote to memory of 2444 380 msedge.exe 94 PID 380 wrote to memory of 2444 380 msedge.exe 94 PID 380 wrote to memory of 2444 380 msedge.exe 94 PID 380 wrote to memory of 2444 380 msedge.exe 94 PID 380 wrote to memory of 2444 380 msedge.exe 94 PID 380 wrote to memory of 2444 380 msedge.exe 94 PID 380 wrote to memory of 2444 380 msedge.exe 94 PID 380 wrote to memory of 2444 380 msedge.exe 94 PID 380 wrote to memory of 2444 380 msedge.exe 94 PID 380 wrote to memory of 2444 380 msedge.exe 94 PID 380 wrote to memory of 2444 380 msedge.exe 94 PID 380 wrote to memory of 2444 380 msedge.exe 94 PID 380 wrote to memory of 2444 380 msedge.exe 94 PID 380 wrote to memory of 2444 380 msedge.exe 94 PID 380 wrote to memory of 2444 380 msedge.exe 94 PID 380 wrote to memory of 2444 380 msedge.exe 94 PID 380 wrote to memory of 2444 380 msedge.exe 94 PID 380 wrote to memory of 2444 380 msedge.exe 94 PID 380 wrote to memory of 2444 380 msedge.exe 94 -
System policy modification 1 TTPs 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer RedEye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" RedEye.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System RedEye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" RedEye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RedEye.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer RedEye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoControlPanel = "1" RedEye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun = "1" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System RedEye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\WindowsDefenderMAJ = "1" RedEye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDrives = "4" RedEye.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Modifies registry class
PID:2664
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2672
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:2816
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3636 -
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\b231263f-0b92-4f02-9e71-3d6a05534490.jpg"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7fff506046f8,0x7fff50604708,0x7fff506047183⤵PID:648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:23⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2520 /prefetch:33⤵
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:83⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:13⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:13⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:13⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:13⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3616 /prefetch:83⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3616 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:13⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:13⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:13⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:13⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:13⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:13⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3604 /prefetch:13⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3612 /prefetch:13⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:13⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6400 /prefetch:13⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6544 /prefetch:13⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:13⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6636 /prefetch:13⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6344 /prefetch:83⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2068 /prefetch:83⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4768 /prefetch:83⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:13⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:13⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6356 /prefetch:13⤵PID:5252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:13⤵PID:5336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:13⤵PID:5344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:13⤵PID:5508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:13⤵PID:5516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6940 /prefetch:13⤵PID:5672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6820 /prefetch:13⤵PID:6004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:13⤵PID:6080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5724 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1436 /prefetch:13⤵PID:5648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6108 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6708 /prefetch:83⤵PID:5932
-
-
C:\Users\Admin\Downloads\xpaj.exe"C:\Users\Admin\Downloads\xpaj.exe"3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:13⤵
- Loads dropped DLL
PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5460 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1640
-
-
C:\Users\Admin\Downloads\xpajB.exe"C:\Users\Admin\Downloads\xpajB.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6284 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3960 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5696 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:540
-
-
C:\Users\Admin\Downloads\Gnil.exe"C:\Users\Admin\Downloads\Gnil.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:456 -
C:\Windows\SysWOW64\drivers\spoclsv.exeC:\Windows\system32\drivers\spoclsv.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5296
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2808 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:5476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:5300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7208 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7224 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3044
-
-
C:\Users\Admin\Downloads\Floxif.exe"C:\Users\Admin\Downloads\Floxif.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5536 -s 4764⤵
- Program crash
PID:5916
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5804 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1072 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5200
-
-
C:\Users\Admin\Downloads\AdwereCleaner.exe"C:\Users\Admin\Downloads\AdwereCleaner.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5112 -
C:\Users\Admin\AppData\Local\6AdwCleaner.exe"C:\Users\Admin\AppData\Local\6AdwCleaner.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5700
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=59 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3728 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5764 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6016 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5732
-
-
C:\Users\Admin\Downloads\SpySheriff.exe"C:\Users\Admin\Downloads\SpySheriff.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=63 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4316 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7312 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5320
-
-
C:\Users\Admin\Downloads\WinlockerVB6Blacksod.exe"C:\Users\Admin\Downloads\WinlockerVB6Blacksod.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5608 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\0A01606\Error file remover.msi" AI_SETUPEXEPATH=C:\Users\Admin\Downloads\WinlockerVB6Blacksod.exe SETUPEXEDIR=C:\Users\Admin\Downloads\ EXE_CMD_LINE="/exenoupdates /exelang 0 /noprereqs "4⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5304
-
-
-
C:\Users\Admin\Downloads\WinlockerVB6Blacksod.exe"C:\Users\Admin\Downloads\WinlockerVB6Blacksod.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:5776 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\0A01606\Error file remover.msi" AI_SETUPEXEPATH=C:\Users\Admin\Downloads\WinlockerVB6Blacksod.exe SETUPEXEDIR=C:\Users\Admin\Downloads\ EXE_CMD_LINE="/exenoupdates /exelang 0 /noprereqs "4⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:1240
-
-
-
C:\Users\Admin\Downloads\WinlockerVB6Blacksod.exe"C:\Users\Admin\Downloads\WinlockerVB6Blacksod.exe"3⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:6084 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\0A01606\Error file remover.msi" AI_SETUPEXEPATH=C:\Users\Admin\Downloads\WinlockerVB6Blacksod.exe SETUPEXEDIR=C:\Users\Admin\Downloads\ EXE_CMD_LINE="/exenoupdates /exelang 0 /noprereqs "4⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:5816
-
-
-
C:\Users\Admin\Downloads\Floxif.exe"C:\Users\Admin\Downloads\Floxif.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:60 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 60 -s 4764⤵
- Program crash
PID:5952
-
-
-
C:\Users\Admin\Downloads\Gnil.exe"C:\Users\Admin\Downloads\Gnil.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5744 -
C:\Windows\SysWOW64\drivers\spoclsv.exeC:\Windows\system32\drivers\spoclsv.exe4⤵
- Executes dropped EXE
PID:2064
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=67 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7692 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7636 /prefetch:83⤵
- Executes dropped EXE
PID:5748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5976 /prefetch:83⤵
- Executes dropped EXE
PID:3580
-
-
C:\Users\Admin\Downloads\satan.exe"C:\Users\Admin\Downloads\satan.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4536 -
C:\Users\Admin\Downloads\satan.exe"C:\Users\Admin\Downloads\satan.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3576 -
C:\Users\Admin\AppData\Roaming\Eqcel\opno.exe"C:\Users\Admin\AppData\Roaming\Eqcel\opno.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5224 -
C:\Users\Admin\AppData\Roaming\Eqcel\opno.exe"C:\Users\Admin\AppData\Roaming\Eqcel\opno.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1220
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp_42bf30ec.bat"5⤵
- System Location Discovery: System Language Discovery
PID:2740 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:4472
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=71 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
PID:420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6216 /prefetch:83⤵
- Executes dropped EXE
PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6444 /prefetch:83⤵
- Executes dropped EXE
PID:2580
-
-
C:\Users\Admin\Downloads\SporaRansomware.exe"C:\Users\Admin\Downloads\SporaRansomware.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1328 -
C:\Windows\SysWOW64\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" process call create "cmd.exe /c vssadmin.exe delete shadows /all /quiet & bcdedit.exe /set {default} recoveryenabled no & bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures"4⤵
- System Location Discovery: System Language Discovery
PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\US579-7DXZT-RTXTX-HTXAT-XYYYY.HTML4⤵
- Executes dropped EXE
PID:3556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7fff506046f8,0x7fff50604708,0x7fff506047185⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1140
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=75 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7356 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:83⤵
- Executes dropped EXE
PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7672 /prefetch:83⤵
- Executes dropped EXE
PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=78 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=80 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7732 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
PID:6024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3592 /prefetch:83⤵
- Executes dropped EXE
PID:576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7184 /prefetch:83⤵
- Executes dropped EXE
PID:4056
-
-
C:\Users\Admin\Downloads\Satana.exe"C:\Users\Admin\Downloads\Satana.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1260 -
C:\Users\Admin\Downloads\Satana.exe"C:\Users\Admin\Downloads\Satana.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5312 -s 4125⤵
- Program crash
PID:5624
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=84 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3080 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7336 /prefetch:83⤵
- Executes dropped EXE
PID:5288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3592 /prefetch:83⤵
- Executes dropped EXE
PID:4348
-
-
C:\Users\Admin\Downloads\Rokku.exe"C:\Users\Admin\Downloads\Rokku.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6012 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5428
-
-
C:\Windows\SysWOW64\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive4⤵
- System Location Discovery: System Language Discovery
PID:5608
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\services\VSS" /v Start /t REG_DWORD /d 4 /f4⤵
- System Location Discovery: System Language Discovery
PID:272
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v DisableSR /t REG_DWORD /d 1 /f4⤵
- System Location Discovery: System Language Discovery
PID:5836
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop vss4⤵
- System Location Discovery: System Language Discovery
PID:1240 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop vss5⤵
- System Location Discovery: System Language Discovery
PID:5548
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop swprv4⤵
- System Location Discovery: System Language Discovery
PID:3332 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop swprv5⤵
- System Location Discovery: System Language Discovery
PID:988
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop srservice4⤵
- System Location Discovery: System Language Discovery
PID:5860 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice5⤵
- System Location Discovery: System Language Discovery
PID:5172
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=88 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
PID:3924
-
-
C:\Users\Admin\Downloads\Rokku.exe"C:\Users\Admin\Downloads\Rokku.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 6004⤵
- Program crash
PID:4456
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5636 /prefetch:83⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5504 /prefetch:83⤵PID:3396
-
-
C:\Users\Admin\Downloads\Rensenware.exe"C:\Users\Admin\Downloads\Rensenware.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5576 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 8404⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Enumerates system info in registry
PID:5504
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=92 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:13⤵
- Checks computer location settings
PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=94 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6252 /prefetch:13⤵
- Checks computer location settings
PID:5908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=96 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6352 /prefetch:13⤵
- Checks computer location settings
PID:304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7348 /prefetch:83⤵PID:5212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2088,18307307074734400489,1074012207238413863,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7416 /prefetch:83⤵PID:2700
-
-
C:\Users\Admin\Downloads\RedEye.exe"C:\Users\Admin\Downloads\RedEye.exe"3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- UAC bypass
- Disables RegEdit via registry modification
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops autorun.inf file
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System policy modification
PID:5868 -
C:\Windows\SYSTEM32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:5684
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:5820
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:4224
-
-
C:\Windows\SYSTEM32\NetSh.exeNetSh Advfirewall set allprofiles state off4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2260
-
-
C:\Windows\System32\shutdown.exe"C:\Windows\System32\shutdown.exe" -r -t 00 -f4⤵PID:4980
-
-
-
C:\Users\Admin\Downloads\RedEye.exe"C:\Users\Admin\Downloads\RedEye.exe"3⤵PID:440
-
-
C:\Users\Admin\Downloads\RedEye.exe"C:\Users\Admin\Downloads\RedEye.exe"3⤵PID:1736
-
-
C:\Users\Admin\Downloads\RedEye.exe"C:\Users\Admin\Downloads\RedEye.exe"3⤵PID:4996
-
-
C:\Users\Admin\Downloads\RedEye.exe"C:\Users\Admin\Downloads\RedEye.exe"3⤵PID:2240
-
-
-
C:\Users\Admin\Downloads\Floxif.exe"C:\Users\Admin\Downloads\Floxif.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3628 -s 4763⤵
- Program crash
PID:3524
-
-
-
C:\Users\Admin\Downloads\Gnil.exe"C:\Users\Admin\Downloads\Gnil.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:216 -
C:\Windows\SysWOW64\drivers\spoclsv.exeC:\Windows\system32\drivers\spoclsv.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4772
-
-
-
C:\Users\Admin\Downloads\xpaj.exe"C:\Users\Admin\Downloads\xpaj.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1748
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /02⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:1508
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /02⤵
- Drops startup file
- Checks SCSI registry key(s)
- Suspicious behavior: GetForegroundWindowSpam
PID:2332
-
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:5008 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1508
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3804
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4012
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4072
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:796
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of UnmapMainImage
PID:4144
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4360
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca1⤵PID:4632
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of UnmapMainImage
PID:2000
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:1548
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵PID:3820
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1600
-
C:\Windows\System32\smartscreen.exeC:\Windows\System32\smartscreen.exe -Embedding1⤵PID:1936
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3400
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3492
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2ec 0x3f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:4128
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5536 -ip 55361⤵PID:5912
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 236 -p 3628 -ip 36281⤵PID:1740
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Modifies WinLogon for persistence
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:872 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding AF7FF05589F6E7F10F28358D13302B662⤵
- Loads dropped DLL
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:1860
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B6E9F2FE9819B6EA92C222A6178A48D1 E Global\MSI00002⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4036
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding E71C6C819ADFDC2A5FFCD3334421A34B2⤵
- Loads dropped DLL
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:1940
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 76283517A2C9374D813D7E84C8D106C4 E Global\MSI00002⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5424
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B0B18160D7BD24B34EF2C4CF8C461CD82⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:5416
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 53A8BACE0042552B9D4D1343C6D1FE3A E Global\MSI00002⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 252 -p 60 -ip 601⤵PID:5944
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2696
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:Global.IrisService.AppXwt29n3t7x7q6fgyrrbbqxwzkqjfjaw4y.mca1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5572
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4420
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4828
-
C:\Windows\system32\cmd.execmd.exe /c vssadmin.exe delete shadows /all /quiet & bcdedit.exe /set {default} recoveryenabled no & bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures1⤵
- Process spawned unexpected child process
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2720 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5160
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Interacts with shadow copies
PID:5504
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:5568
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:3768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 236 -p 5312 -ip 53121⤵PID:2284
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:6040
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 252 -p 2680 -ip 26801⤵PID:3864
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2580
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1968
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:3620
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3958055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2280
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Indicator Removal
2File Deletion
2Modify Registry
9Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD5449ee52fa780d9954cb41693dcc0bc55
SHA1321bcfafe1f83d7dcfcf32b42120245881734c5a
SHA25681cbed0e2162a0bcc5663727d0cb1c62a1b4d908af85a4fdd959f4648a69104b
SHA512d63337692ebe9b740fe48710de1050f226ed5195ed272e234c876d0b66fb41676800ff2a1a5f8f8784e3c3eef7657d9f4fed60e18d7a2b7842ebc7dd8c730bb2
-
Filesize
101KB
MD59dfc0345ca99f8ee39a590762ca5c2f8
SHA14f1ea34c30a4797923def82bd789e3a82c877ed0
SHA2569785671503957d8a40fcb79e286650c11698cceeb546f37cedb47847dc76570b
SHA51216ea0f26cb828db626fd69d7bc5baf257d8851456e0c51805ef31d48c5a5b3f66e0b0db1510c73e680131369eacc4074b724c17c51788d5266f3dd17c88104e1
-
Filesize
101KB
MD59caf886f4b8a77525d0d7c7f7aa0e13c
SHA14603cb157d6104c4c761219eaeb6eac0699d353f
SHA2565fa090407bd96cc683f562a5f04db88b7d2c853e01d43cdc1b1131079c2afdff
SHA5128507a22d784b2cc78061f739bce060fcd0ef8f5d3d947a60d9092ce6195a60acfd93251fc165567d105be34e461af9909c31880514f23282a82faef2dbb5ba8d
-
Filesize
1.2MB
MD5d2bddb1b48b3c5d0d35479662eab0f59
SHA162cfed69a68edbb156ce45e7425859ecf7d594a5
SHA2569a7486d838a4ea36a4287593042cb16265fe1c6cb3baf8c1b5aa5e319df5f081
SHA51244fde54e4b00dc2636c152d66928e3d2872e71e14ae733e18489950c1401cbfbd1fa8c69752b920167a7839e670b28137daaa4d9231fd789b6c3c78f20ee8f29
-
Filesize
3.2MB
MD5ad8536c7440638d40156e883ac25086e
SHA1fa9e8b7fb10473a01b8925c4c5b0888924a1147c
SHA25673d84d249f16b943d1d3f9dd9e516fadd323e70939c29b4a640693eb8818ee9a
SHA512b5f368be8853aa142dba614dcca7e021aba92b337fe36cfc186714092a4dab1c7a2181954cd737923edd351149980182a090dbde91081c81d83f471ff18888fe
-
Filesize
724KB
MD5bab1293f4cf987216af8051acddaf97f
SHA100abe5cfb050b4276c3dd2426e883cd9e1cde683
SHA256bc26b1b97eeb45995bbd5f854db19f994cce1bb9ac9fb625eb207302dccdf344
SHA5123b44371756f069be4f70113a09761a855d80e96c23c8cd76d0c19a43e93d1a159af079ba5189b88b5ee2c093099a02b00ea4dc20a498c9c0c2df7dc95e5ddd49
-
Filesize
24KB
MD5e579c5b3c386262e3dd4150eb2b13898
SHA15ab7b37956511ea618bf8552abc88f8e652827d3
SHA256e9573a3041e5a45ed8133576d199eb8d12f8922bbe47d194fef9ac166a96b9e2
SHA5129cf947bad87a701f0e0ad970681767e64b7588089cd9064c72bf24ba6ca0a922988f95b141b29a68ae0e0097f03a66d9b25b9d52197ff71f6e369cde0438e0bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5457A8CE4B2A7499F8299A013B6E1C7C_D734EC3DD00546F46D368325396086B0
Filesize5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
Filesize
168KB
MD587e4959fefec297ebbf42de79b5c88f6
SHA1eba50d6b266b527025cd624003799bdda9a6bc86
SHA2564f0033e811fe2497b38f0d45df958829d01933ebe7d331079eefc8e38fbeaa61
SHA512232fedec0180e85560a226870a244a22f54ca130ed6d6dc95dc02a1ff85f17da396925c9ff27d522067a30ee3e74a38adff375d8752161ee629df14f39cf6ba9
-
Filesize
152B
MD58fe50664fd38239e8c01b75122cc6b3d
SHA136d011ccd6e5ce47ad0e69559c782d6482e6cf4c
SHA256c7be861be90fd1a2b4df96b30c8b39739d99f945f79d21bef4eb7481358bfb0a
SHA512f96af6111881853330c9c8816a354faf8946c97cc56e04b0de9a764a40f4541dd4b59c82a8db8c243f059c386e680f8c1f010c34f6da0cdb6fb1fa4de81afd85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\78ddeb11-2e98-4f3e-9e9c-26c195a0e10a.tmp
Filesize2KB
MD58c7178f48763ea2c6b8cba7771aa99a9
SHA16cb55475564677b944dcc0e67b66a780082312e2
SHA25674eda6c4b71434b68ba0e9938de4706191fb2ca923c27e3610fafa7547febdf5
SHA512b9e2f89260fb654ba679f4b73c354bfbbef6f768f1716a56bd29b2aafe3162162e25465f921908cefcc40452df70e49cf5aeac101eaee7bd4c4a8a39f90306ff
-
Filesize
18KB
MD58eff0b8045fd1959e117f85654ae7770
SHA1227fee13ceb7c410b5c0bb8000258b6643cb6255
SHA25689978e658e840b927dddb5cb3a835c7d8526ece79933bd9f3096b301fe1a8571
SHA5122e4fb65caab06f02e341e9ba4fb217d682338881daba3518a0df8df724e0496e1af613db8e2f65b42b9e82703ba58916b5f5abb68c807c78a88577030a6c2058
-
Filesize
20KB
MD50734be73c3054df521a805d3d4292fb5
SHA1b4737be5c8785e3a6938bce9b4c5cdef1f6e8e6b
SHA2561d3c28fe9a1adaf59ee71e8d842f8e03d5bf7dbd8a5b1569c55a91d60eafe3ae
SHA5124df8729394bbd0023de03a73f09a599b4ad3a0ca67248ccb587d4b5bfb5934cf5eb1910fccc969b94aa98f382f169af736a69600f2933ea3ee6dc9418ba30fae
-
Filesize
18KB
MD5c83e4437a53d7f849f9d32df3d6b68f3
SHA1fabea5ad92ed3e2431659b02e7624df30d0c6bbc
SHA256d9bada3a44bb2ffa66dec5cc781cafc9ef17ed876cd9b0c5f7ef18228b63cebb
SHA512c2ca1630f7229dd2dec37e0722f769dd94fd115eefa8eeba40f9bb09e4fdab7cc7d15f3deea23f50911feae22bae96341a5baca20b59c7982caf7a91a51e152f
-
Filesize
31KB
MD52d0cbcd956062756b83ea9217d94f686
SHA1aedc241a33897a78f90830ee9293a7c0fd274e0e
SHA2564670bfac0aeaec7193ce6e3f3de25773077a438da5f7098844bf91f8184c65b2
SHA51292edce017aaf90e51811d8d3522cc278110e35fed457ea982a3d3e560a42970d6692a1a8963d11f3ba90253a1a0e222d8818b984e3ff31f46d0cdd6e0d013124
-
Filesize
55KB
MD5c5b356b5be51c7e28ec8f8a6724ecaff
SHA10a58b33315ed92f1c9e8f12120fc2a9fc41783d4
SHA256ad75f89e447f67a45934b79a98c1f66ff77df7495b69b9b745e0c666a788a9f2
SHA51280834a86c397d4b10f6d17d9dbe1f51db875873c84ad3d1c2a6bc31eb323c27732f07703c8da25aec10a437d6b99cafc50ade245916d281db8f3fde62a303429
-
Filesize
18KB
MD5115c2d84727b41da5e9b4394887a8c40
SHA144f495a7f32620e51acca2e78f7e0615cb305781
SHA256ae0e442895406e9922237108496c2cd60f4947649a826463e2da9860b5c25dd6
SHA51200402945111722b041f317b082b7103bcc470c2112d86847eac44674053fc0642c5df72015dcb57c65c4ffabb7b03ece7e5f889190f09a45cef1f3e35f830f45
-
Filesize
415KB
MD51ebde66cadd4d52bebc55e82ed1a9fa6
SHA1624e294b0912406a7a7335a7fae24d737d6100f1
SHA256c40698250864fa17a6544d1485c21576ea2f532f03d96d295aa1e821a7befcb3
SHA512374311dd91bee59ba49212c1e14e410055826a31deb663b6de4378c3e6476c82d4ed3cc459db536a89195d34d243b05ddee00d8857117093fc534310f79c81aa
-
Filesize
41KB
MD5350fef14b9432c8888714f9d69ba79fb
SHA1f02876195e3b3628384124d63cbcb3606a06996d
SHA256dbb362d29b9b4111e7722bae880e8a79ef8efe96db4cdf7869195f5cd0066fc5
SHA5128fab4f3151a81a2cf0465aaf245d507da97c230eeb86dd6e9cee798e4d8d953aedb2e7e4cc004fdc8a5f7e8af0ded27aeefb4c626ad61c95f38572e13d49d419
-
Filesize
45KB
MD5c2cbb38ef5d99970f0f57a980c56c52d
SHA196cff3fd944c87a9abfd54fa36c43a6d48dac9cc
SHA25685369a1cf6e7ff57fe2587323c440ed24488b5ed26d82ba0cd52c86c42eec4a7
SHA51250371320c29f0a682b9ae3703ef16c08f5c036e84d5056e658f5d9be7607e852adf72c13bf2d0b63fc492f5c26d330bdeb2ba38bfd8b0d4567f0cc6b0c0f7bd9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD54bc3e9eff47f131859dfe6823dc76c5b
SHA1e43b22b27ecf7080602709886b828c4531716928
SHA2566a9bc5df9d4f08035bbb5cdaa387055bc25a1c5354feec24f653342c8f54f385
SHA512279af60558e2018a2b186198dd75ddb95ae1f4670acd88f86f3dc35da40a721609fab9046721d61390df680ab48e206a4190679f02e08c7d9555afd542934aec
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5f4e51a4ec887283a6cbb2c40ed117208
SHA1035a7d1fb70075bc8fc3cf762a6fb40de88a9866
SHA25613fbc5f59747eb04669077e086e6b0a2e40d23451bbaf5625c9f993f46366d22
SHA512bc4a7de96363a749937525303fe5624a0de11a1f1d383252b08110dac14a220d97e9067be0f5a5ec7aecdf68af64ee617b2871bb709d20357641b2c0c609896a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5e73455d85280efdf0e09a43cb52c9666
SHA12cbe005f9bfe88994d04ffb33978fe294d430f3d
SHA256d8813476cd034d18bb437939c1799199190686fb5cc329b5d160649c01a2e29f
SHA5129befd2b0eaccea273d70c0125e181ed80a00c10c3b680d5a04654d759d896b4d48acc00e8c964ffed2b09c3ad0b99376049836b4c5034da6b230c747afca34ac
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5bd67a0b78bde04cb1e5d4367ef98a31b
SHA145db1deb1496cd330bbe83bfd3522a82585b811b
SHA256fbc019c6ae8e35a235a5817ae909b5ba7c081b37a76f7001c35011bf17301da3
SHA51248fbaf9b5cc10bfc1e8a2925df631ca8428d1f4059f35610adf083307f8ed40e60790230aa2120a8e1ad9dcf2eb4b12b4badaf948f6927cd42996bea6868a175
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
3KB
MD5fe7c1e6090b1c7ce788b8a4c882c4e13
SHA10451fe42c3145e9f092559525cfc6e70bbef5cf4
SHA256467e7a248de823db1384869833ac9d8876fcf2500e7eb5b64cfaacccb5c1b4de
SHA5128ade7624800be7d0e4899ab552923ea8ec0dae2b4f7a5851b1684c9e0e7330313e055db65eedc8c74cc9caa1d21767a55afb03fa7b6f2bb85874e85c97f23592
-
Filesize
4KB
MD5321a6f2990a022cd151e679c06fa2c5d
SHA1bf0064488dc5ecc96eee42723dc52faa13424e1c
SHA256c595727c92986e1541ff914ff2e65d69c9e80dd091c9850c52dd4c878a822232
SHA5121bfae023b17db009ab4755b6ca841b11fb8c9518f8fc911b290c14318c1fc14db2e1eff93ed3b77633ad214e6b00dd4560bb767e3767d8c6f4567ce6dbb8e01c
-
Filesize
4KB
MD50e2a43e378bccc208aa4445a0b796348
SHA1174540d8d60748922c10fc28050212decc852a19
SHA256b31f3a9cfca5e4b44523ba120322dd53798a80f3a414bcea2860d0f37938ecd7
SHA5123adaaf74cfe026b447d2f99d548dd65b24379467653b4669ac0b9328f959c471d5ed7dacb9204cdfd019f012698c8a5378d03a6aa66af69d20b247d088d95073
-
Filesize
5KB
MD5f02f95b0537332ecd87ce4d10ce7c2e0
SHA14d36efc1e07101c2a5ddfbd5f84d965a042ebe00
SHA2561e45f6cb358564474ef5eae9604950b580a840dc18c7311804ff4cab3f76782b
SHA512f9b21f7299a19685ea5366552e39ff5882a644bf88da8b393aa3c34804eeb48d6afd7d58c5263923dd0ddcf4ac030c0b2a7cfc35de99fca5515617c5d875ffde
-
Filesize
5KB
MD5e145e3fe6f8d92c27c9a274e973b1f9e
SHA1719a4965bd3cd062a81b2d97c6ba106d09bfa1ea
SHA256cef5e7ee1f8e6aff14dc7530a3be0bc46e0b5ea03ce975ad87a07a090b5ba9ee
SHA5126febf05aab090b1d90ce6c28179b8d529bdb3a81e5a28ba2abf1543e0b0db971856694dd2abe8055b49055cfccb20fcd1b162ca5cdd03f227add23daa37fa3a5
-
Filesize
5KB
MD55c66f719aac4c22a21d50e42c9eba051
SHA1849a87d5828d6a0bceb2e85b9d86de3c818a08c3
SHA25681ea04b8760e999555d00b5d32787246aa2acd4d4a6cf2e6c118f2c5de4538ac
SHA51227e64552adcb0eeec361470f9e6db1722801a803ae50e759580d926c419917cef667e6dfae775320f59a8bad32fb902c406a31b7903c41623a3d22b55d8697c7
-
Filesize
6KB
MD54c54094dd05c5fd35c15bee4508ccda3
SHA1f536c852e3d9396c3f54075747252bdcaa3639a0
SHA2566f693e0d0a55d23a381cea2363782828327882f96f9fc581d71cb3641ae90a06
SHA5124caed717c5b557d2d2172117a6431c0882e0f876fe749d048e4e10ea2ed1309f9f4fc035b11c13f00665ba9310e7ca44705e8c961a7b7b96ade965fa4af64107
-
Filesize
8KB
MD55382e45016b69b02f8520c04f0e75b01
SHA147432018f167aeba3307eb848334930857822139
SHA256e7d6c5bd4091d1a5d8fd91f925ffc019015eade8833537eaed49dcd8cb712f31
SHA5128bf690a42fbdf0070bc4be73a30abafee47369e338edaf8c4958e422b20928ebe5097b06dc9f8d2eead76bb29c88f11d3504eab3dabdb43fa644057490c89546
-
Filesize
8KB
MD578c616b7802975cd08950c9bb45d52c4
SHA14dcd2f7816a120682cb627013f4c15e640a96d55
SHA256db239865689d194bf891269ebf21f6df1b0641a76e3db4e6848f1ee2f33f929d
SHA512a91d44bb762ba60d21da6b34ead1169e3cbd589eb0de9a44c0220dcf798de18b658484715265599384f9e847cbdcf85a164961b9e729a4115f321a4ef79294c6
-
Filesize
9KB
MD53183431fd50e9b182b47b7c28ff45b8f
SHA1ad4ff9ee833b90ec8ea417c28bfd2b19e289fd13
SHA25695f08a79e766c937113e1e992c79e230dfc54e42e6b252214e1b565fa8247db9
SHA5127bf4d491341c2ba8c0768ea3ca99bd95a501442c6df53fa4280589b258ad5e7e279de82b749dd2c0e01897349bb08adbd602565f7124145dfc3b1f4226bc661b
-
Filesize
8KB
MD5eefe5c916b6c7631169ced9c3f7f13d6
SHA1ec470b179c448f42479a3365d7d5b86d9cd60a88
SHA256682f332992bc5ea5fb8b95f587c4d5893c5abba572b6de2bbbe51d464b54b0bc
SHA512e9eb9b5138f4b1130979a45037eb69eabb83e5c2aa232f30ec48f43bbbf1da5362bc1bbf8fc41ff2b1a8e511ca83d28a56200eda06b7d8e3bc3276008c238351
-
Filesize
9KB
MD543ed44e5005a622dc7e41f895367ac58
SHA152af38956b9b8fe2356099ee3e69d0060a8d254a
SHA256818a067a5b99b68f1d807d9e13117c81fc3175f59684f858c29f6377a0f956f1
SHA512a6603d51236dd9c32fd1b4430c1ac33bb6edb1f4d24d60bb7bdc97a2a934227f248b15d5f98a24c308fe070f1aadc61a600e18a002989354b7cd0fcfbe54af43
-
Filesize
8KB
MD580b8b0d2cb8cea857463a206272cd7e7
SHA11e87cc01c8d888191fdfe0d9a6018a11d8a764be
SHA2566a34145073de204d576a5ea45d399ce0222e454abcbfb103b1de179eb6d3ade3
SHA5124d3f219ad57449dd570f3a7580ae037746426d4c168a1b4273c61c0cd4220b55d8160251a562200bb2f5a6457d8bd532d099d54e0f662d7b7d35b076de045044
-
Filesize
6KB
MD5d9bc76e3bae0e72dbe2b42498d7c8cca
SHA15f50aa6ae007e1037a29fb1759650c617b7d7030
SHA256183be2786a766fde9bd8a8855230a9bb338107b53386f5fb4d3f6f5d5355699a
SHA5126d37c2a38493d02357384f950e2d1e47b351c4227b9ce208a91fbc6b7183ef276d52008927bf2131c9f8d29b51544c2ebf2057fa61534030617a03a09791ca14
-
Filesize
8KB
MD5c42c56040f13abfe6c522f9905c1b084
SHA116d721bc1e1679f68710b43f98a8bc4cf1bf61ba
SHA256225f2fa511733717a26654e1ac4e2b697fb7900c282f06071946d1bf84a12d7a
SHA512eb55acbb319330415ac55e9b8a41a819f5c09522306024774c347aaf5982ecf6c579a10d3329807d62c9cad15dac5ca6d33c6fcfb80d12dcb4fce9343195f4f1
-
Filesize
5KB
MD59ba97c2d71f5268ada8865bf85e0732b
SHA1264bc30195bce575ae9b1132afd1ad944775c77b
SHA2560a2c1fa08cccd42a36d6b88d3122dbeca46e43533e67ef4974024bf3e19a423b
SHA51288d0efe800dc6807d206f8e5689e33945d2a2e7ad9e681ece26a106b078acfb4a6cddd11f1ac8bd724f9703cd8c62dec283afd0ea2571ec814827303940af878
-
Filesize
9KB
MD5a844def81b2cf8d199bd40d77abc1f61
SHA1f06246181f56afbe7c3c8212e063ea9ec5232d6c
SHA256f85f3d3e42d6711576b40dfd2c172a37d452f773b0d19b27b8e305430f52bff5
SHA512e8b5d2c6b1fedebafe1e928c760c2b25dcf6df10ded05ee05de423d8f7e9ec14d67c72fe20b1e57bc107b58201e69e45704def84d17b67e6b7903ed2a1002ba1
-
Filesize
8KB
MD59682d8ea4102dae20b41c92f31f92e4f
SHA1ca328bd8792bc0594010925625239689f2af8641
SHA256fdc98986e7df146d95b2deed9a714ad7583ceb63957b08e54eb275959d4f76f7
SHA512d5fc87635f6ab4f35463bf4facb4f86d248d071762388926a2c95d23c2d506d11c7a27f2adc89a66218315a769ec83790ed52519e5d8ceaf0bfeaa3cce98cd72
-
Filesize
24KB
MD58be763a684e953a8d49e23b8228398cb
SHA1379baf2ada2758bcce144505ea50295b13b5f49a
SHA2569dde268a1d5287643ce47a0485ba467ca8c6eb66a29a01cbbf88a2b6d6736a1c
SHA5125035b1f603ba503af51ead4dc28bdc60b4d62dc6dae09084ebbf1ee6ccb1956d3592a2a76e57b97b0d22455d2af576cd01060e07111f66cbcaeffc5b9956b619
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\5701cb1c-5b09-4aa5-9fc5-6d2c31f58185\index
Filesize24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\5701cb1c-5b09-4aa5-9fc5-6d2c31f58185\index-dir\temp-index
Filesize3KB
MD5a160af455942e9e16ed313e379a832a5
SHA1f63148c104d3a34196c38f17c9c2b41ea964ddb1
SHA2568465246d9e6fbd451b47a71d0e9f4bb984f4b5e6100735152ed662060559593a
SHA512bc5d43fbe5dfc2a0f0297dc3ddbacc2cf88ac60c1b68a5e1f6d135486f2e7a71c99856b427b1a0a2a51dce5b179e11035dd68fc17c35a705ef48ab4d8a9ae9c8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\5701cb1c-5b09-4aa5-9fc5-6d2c31f58185\index-dir\the-real-index
Filesize2KB
MD599dc6f7f1879088efe44d8d559e28f27
SHA10e93e754c241340e1f7c4c73df84bd460dd8cf9d
SHA256fe188ca44de8c03fba4ed66259cb6877c7e657b1fcdfa3af7a29b279c7057987
SHA512881e21fc0e89cdef6e9127d75246a7d952407961e6cb62a5d303ed17cadadb69ddfcd6fb09da84618face5859e9d207f9c293ddb91a6bc5cb584b7ce16524b4b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\5701cb1c-5b09-4aa5-9fc5-6d2c31f58185\index-dir\the-real-index~RFe59644e.TMP
Filesize48B
MD508e2445d1a49c4e7c0238bf0b8f76a68
SHA107d690455a8da858cf8feb40aec979361222bf62
SHA256f8d25c081d7e9086dcb4da0d48d2989b9435d1f882057dea0697fc81d563cc19
SHA5120f0deea1235a7fd09273704892db3f69eb8910f89a61fde83c49e35e9019cdac09dab756eeb7f0c6797560579c064a43500900e330c10197ea748eeb370f814f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\e6611097-db0a-4db5-bfd8-dcd3d0ba841c\index-dir\the-real-index
Filesize3KB
MD570f0acd196ef1dabdca51b2091d83d1e
SHA1cf1a6616e8525f1cad50be2dd88967764b92a1b5
SHA2566380361607ea3af7ede6aba3e99bb3020fd2998790a2ce1eb686f64377d40b90
SHA5124b83e54effcd51ea90555b1540fe37f2650bc3b17260e154ef182dcd2db98e7d62704ee80938ab79a995fd8d2918739191ebdfca5f40bae2a971238109b294ad
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\e6611097-db0a-4db5-bfd8-dcd3d0ba841c\index-dir\the-real-index
Filesize2KB
MD5a4ad34e68e2999c2cb6817fc42a04139
SHA15db8841c7b6f270e74c8ea482b7ce2b3482160f3
SHA2567cfe31686243507cc093e5ade01ef5725b6d07abf6c5805f90e1537b7991b777
SHA5123cb1e17feef30da8eeff9b795082f5249a6707bb109747ed3d7ba9c56b942c4004985d522ceb5e70190075a30272ce3a51b50466eb67fc6ef1de988821d42809
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\e6611097-db0a-4db5-bfd8-dcd3d0ba841c\index-dir\the-real-index~RFe58e3a4.TMP
Filesize48B
MD53baa73870959875d04b80ed86baee008
SHA1f719cb6932f82b1a5091698517dec2b44dd6d0e4
SHA2560a6eaf8bda89449c668e59cd17343533ed2f94851919eb9d1e4daf2d7a88405e
SHA512b8b0bf5fa9fd2d5e179ea9cd127d4ae24f59e10478146a0fdba8703a7a42b6350001f2430a6e6699ea50b4920632b4d1b4dd88958b5d30f91b87f8d85e8be125
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\ffd7cfb5-78ce-495f-949b-7f5b7376de0b\f8b73f829edb7f1b_0
Filesize2KB
MD51a89bb836ed95b3f9bf537ffaedd423d
SHA1623f6083625396b1a987bf6ea86348ad86899f8c
SHA2566035934a1036c41ff31cdd8062ded7c60d83a319bbe977a69ea17fb851551f7d
SHA512ea766ea895f2fbcedab32d518aa990efa1949b1fd5587bb6e63519bfd1acc947740bec43f25e0cd6a30c0785e5aa1d5584170411d77d41e4e668e50314026117
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\ffd7cfb5-78ce-495f-949b-7f5b7376de0b\index-dir\the-real-index
Filesize624B
MD599867ef9259ee92ff904cc08a9b29a5a
SHA1db0dc5df1dd9a9195ac154ea9f1570fbf3c38e15
SHA256cc2195751b440726d0e9eef724a706bc6096074f2718c2a58e38bcc7e7db7a30
SHA5126d88a16e360103ed63d382fdb1e7dfcd3115c7bde94f85950113648519d19e9ff9ed349f61677400272620369b00d6b379e9f6895eb68512cd6755ded08d4cf9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\ffd7cfb5-78ce-495f-949b-7f5b7376de0b\index-dir\the-real-index~RFe58b476.TMP
Filesize48B
MD5e8bcdd58fe5df034ac989ec9001f2359
SHA1abb64ce7fd382903994334379dbd02539dbd4e85
SHA25672082688efccbe213f0edc951b7eade47b70fc7a9155ad02e36394f507b89268
SHA5121ab5c6a695384cced408d6e2a2086d3ea97be29a043bfa984d7b60fb85336089a6e7ea0021a4c2b76813825486199340926c5a0dee2934383f034aff671b3238
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize89B
MD559998ec8bc39a07eb0b46f0cef171d68
SHA1d930447973b72fc8e71231648f2efa294de3d823
SHA2566f080fa56e582cadad4490d3ab0cd3ed425b5ef011b2e202b72a97119cf2ce54
SHA512cb3f8ce9754349953ff65cd93c7c24bf84cbc8c1098c5fa426bd17b9ee40e398749010241473f6bef039828d1c991ca345c708e2591e24f8abbe04adc3ce0923
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize146B
MD53066e49ce735c4715187b12ec846093d
SHA1008dd0201afc0af29322f1bf21cc5cefdbd2e0cb
SHA256780e3819fce52fb940b7587fd46a412fe860617a2582ffaffc0fb652b496530f
SHA5127caba3d93cc807f2a8463cbd0006fec33d36c7d0a0cf5ba16bb4619db693bc8ca50bcdcec3a5bd3373d8929d233205ddab63c5de435e22655919cbdba307878a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize153B
MD5670c179703702aa7894b084d69efccef
SHA1d15d8cc742fb4656fae5d06c7d27fb20a259a0f1
SHA256e31dc5945513525d27e651920093d4425e5e927e6f4578aabac1aec2ccd319bf
SHA512fe989ded771d933b34e5d33664448a4afaaadd9fcada639acd1b759b7557995a065b00fd4ff4675fe564c0b6015ec587da1467ffc2d4ab72461e7d39ad375fae
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize158B
MD5a5fdc5ed4cdcfa3cec92e54a8e894336
SHA170ae418e6b81d48e5d59414bc501ac861ce4b23a
SHA25648bd9cbd96271bf557d3a014a7adf24349f94711a03727b810bfff5a23797357
SHA512850b278d49d38f519ed0eae3bde4e3b355460c5284a374b5f15edd6a94363b57ff92edaa7736600011fa14ed8535ad2d40d9baa0ce802d03422b1a6e877bd658
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize215B
MD5c28f14067cb53e2c4507f9586119ddfe
SHA15df2d9c3e3d9133478142998ddb805d0316df0ba
SHA2567756d93c0d3de82ebde78ae38bf5e21bb438ad8881ae32f2aea3a28a5d973e03
SHA5129ec94ff46e4dd7d59225b9c0e1d7bd95f291740f45f490d01ee3b29d8587a48b1dd431f7f60c1252f2992e9ba5dcad86a14522db802a7be01e599378dc9c53c2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize82B
MD550b61fa35d530fe54ed79773e2a85779
SHA1725f08209825cd3cf49c7b5fcd9a4224a7560f43
SHA25690d51e85b2c33e3430ba296c45a76b8f097f85f3d979c2e1b2518e96f514cc17
SHA512dc9b450e50c1345356f61431b48a9015e41f0923ebf6ae702cb5a2b8d969eec739407602c5ed91a6373d7f45050f41c4e327ad252e326f70bce96ebbdff0b78e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize153B
MD5a59725c480950dfd9ab6bb9fd04d6ba8
SHA1dee0c31a1ae2430117a55fe50e730d48268d8381
SHA256f73be0fe68c7e14e3dc280acde73c98429d7c010c28cf0e3b3629b6c946cf058
SHA51206fdd6375f497d3c51db169090484ea264d3e96c3789f26c1127113902db2be3bcef3a714e264932b666d1b8a995bae2915ee9c1ba00397458b26fed09001727
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize155B
MD558fc7dd7bf98e2c03ecb6ac164a2aef7
SHA178bd3e8525a8c7fca3d68776f1cebce834293d71
SHA2569cd3e52711cdba9d5253b087a9af83e27950faa9aef9908c5cdbd87eaaf7621a
SHA512bc5db1985bf3d2ba1089411001231cb79157ed0e1c5382d14df0d971d204755fcffe4d1841635a0a65926bf829834260c86d14a6364e97dc999a676a8f5895b8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize95B
MD505b860ee61b044131298353b7e79a345
SHA122df0279a286f179a1ac30b6111289a699b9906c
SHA256b197e0ad133fd0ed622bbb5e03cabcb20d6628439190b68ea4a8366436e5cb6e
SHA5128ff387f61a34221d5f4b831facc895339aa797d956a48b003f893e9124e9e1c5dcfeea3e6b9c6d1d1d043539b3f49121a806a1b62aa4a7b34bd42601f96ada29
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize151B
MD56dbf4df5fc2441a50347faf4cdad6ade
SHA17c1501e288480d3946b07da9112c7c6e17f57f88
SHA256635e9df0f2cb84040abeab405b9ddb70e0462b339ac567c2fc1ea9a9a79c39bc
SHA5127372fd3fc391a99adfc309d36b1f3b1de50e959a482f686ba885948ae9f2282a5332b7c819fbd59b25c0d7b89bba267aaf7f94a82a8ace0148ee5d4accc0b9d3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize153B
MD5aa8eaf83b335c8c8f029d4451b85015d
SHA1127d24d74992f8ad6fc997ad14ba5b60df1e59eb
SHA25621a4f22097a7f7051e28af9261436cbebdbd15e6dd9b6f75e2232357fd4a692a
SHA51273e502c3f39e4118f5690d2c0898e1a2108518e6f45344ba67a41e847fc791c33bf9795173fb587c6bb31d421c1f840a829ed6d8d3263ec0c5967b855e80caf9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize217B
MD5417430fcaa08a6133867a615d5dcce05
SHA1571b53076262f307090d18c8ca723ce7cacec01f
SHA25645d498df4d5896ea6dfef29e94a0a91b97942b22f9fa74e7b9070f11d28ff39f
SHA512c886dd93620fb0449066fc3172741acc5fe62153bb8916ea8d15e333321d128a57caf1e9a58dbaad4e3ec04ab2c3248f4d8d8423abf45d740f9e60a3be1a459b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\2cc80dabc69f58b6_0
Filesize17KB
MD5f26242914b93da27e0910695738fceed
SHA157af7c7f6ea7727ee5d9fc898a8261e7310b1915
SHA256ddd3a5a086977f00d6de4f7c00b5f5d176cea21bd91471683ada57eab9ec614f
SHA512d36a072a02a3b117d81cebf88abcd69b66a8163c0018bdaa461b9430f26113119414d4a5468ef2fe5569d65d271d5515071d76378d69aa8a7c3b080c33409949
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\4cb013792b196a35_0
Filesize162KB
MD565b7aebc7529b2fe5d5277bb2ae94b23
SHA1bac1ffe61d992515e9f8abf854a2648c764dc874
SHA256ecb135d9b25be3298d697631485bdff729938980a9946dc8a9127a5d30a2394c
SHA512c86fe8e1477197d4305461622c42485c98cdf9182e7339769d73f1ef3670ec23402a38ee1e541709fd2850ac6f4a0519164d53950e6e9ca1d65a8da98d6be9b9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5259bd3c9cd1e9df6cde9286db687b4e8
SHA1efcbe030dfe313c5146e555f19207170ab806500
SHA256e252780fd1dfc9c4da96806ecac45796810d3d64f738f89f183ae5c55542a9e6
SHA512f460e3286bc2f1eb9d9ad1c9686e9dd8f61163f66525f188a6db9d239c453e6048227c44739c37adcbf2aad4bb02f2c97508a8287bfc8de48bec04f1d8b62b2a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58ab5e.TMP
Filesize48B
MD50bb70f345b8cee942217591e8991ca27
SHA1bdd4e2d45c61377f05e9b84f8d464e458a39e20e
SHA256842173d35e8f6ccb8d06f707869a1b0e93a020d7be3436d1ebd0bcf14e63be3d
SHA51227490530906d0d7d07351b492efe31250dda0f75cfccece1ebf23918318f7ec29d23c19e867351420f7d9dec103e0594a3bb0092040f88e6ffcdc2b589a24432
-
Filesize
1KB
MD5518302dc293df80d9284cbaf4d5c3bd0
SHA16002a791d2283d942277196dc4e9ec23b538f828
SHA256a9d0df59067a5d7d18bde8d69800033e4cd0e9bc844dde41ec01ca0947c16476
SHA512d1790b557e0a0b04ef8269d7b88c9e3b37832c56836dc15fe3e342e312f305df34341e41249985cecaac384223bae0df83e3d6aba2be7f94c004c685217426c2
-
Filesize
2KB
MD5bb3e67c244030d4f19cb0258a0d76806
SHA190d9be15b8fadcb0eb84961b03dc28b4b717376a
SHA256565c6eb82c301bbe04234e037a3d431e26d8f6e6adbec84f0eb799b490e02fd4
SHA5120c252cd8d373b56c7751067d24daa7f5a52a01f9b0940677b904317b3453811160d0a8aca1d164fccda52c0e96439b82bc82a0be4ed48d28776d3d674c17d5a5
-
Filesize
2KB
MD54ddb446c5e1356368dc48558c177c554
SHA175151958b5ae696f081915d7412525b39c24ed24
SHA25625d8006a70529021c3b682b53c02400c4bbad51f9e532be80fa5fea40dfabe81
SHA512434595c8bb00a82712b40c51c1869ec2a75d3cd42b0c40d72e524f5fd2896bbb086723f6e22ab7395c0d4721c7a3049611477da05fefc6fab71147c86d2a3015
-
Filesize
2KB
MD58876e24c60266e767f4521ccd4d9c5bd
SHA1519c8d1d08f9992c49969f188298ed1bad7e9ebe
SHA256fcf564be4343b19dba0b2aff651da32165221f71f768ca71993d9099219171b3
SHA51238d5f7504bc4c9e687f76215cc7ea79d5d137dcbc6e4aa9418b88914f785de43e255e7eab82b2cf05934948bb6ae566bb9c987c7a024b47ec1331cdb52d8f976
-
Filesize
2KB
MD57e4dd37ae80b622e81016b5f4a47c48f
SHA1981bd145373eb2b26254aa96afcccd86940f7faa
SHA256a53b4f3a9ac1f46e55e976973c8499cb345d7d331eb6b6a9f3303e3584c346a0
SHA5125b8e106d796f030f9cf60fc1798d8a3bf8f34e8b895d2bf2d89836ad5e2cac57c44f5b52e4c6d399669af4642b20b6a59f9e0e11fbdcc1edb150a8d02987e1a0
-
Filesize
2KB
MD5e504edd052d84ad12c97679fbe5d387a
SHA13dbe8ad63355225f64e30919de4f4cd62106b815
SHA256035be58858a57166be63a3f6232d97bc80e9d9afafb9fa944ea09b7d2d0b58ea
SHA5125022768aeee8e148bb5a05a55f37dd752d0184ef0b6c568e8158ed1afb734c3d28c4e94163f0c9ceb4d36de9922c965755b5c1cbbf30596a8030d833833353d8
-
Filesize
2KB
MD5be07dbcb5519751ccb82a43c47e83bb7
SHA1601563ce023ecad40e22ff3a79af5b885ba7ca11
SHA2568031c9946a8f6ac03b95736e48c99173772953ae971dc9099635dcd85ef1d2ae
SHA5125b538b6950181358ea01165eda9406f267ad64814720107c942531834fb868a1dfc8caafdaef3327bea24970217bd84262af690363891fb9c087539fcd772625
-
Filesize
1KB
MD5ac36eb59ddb429f708b6f9c9e1ac7984
SHA1c4ea6965a0e63f487ecb8d1e2ff82aa941980796
SHA256d5462a5f988946d308abd107585ae94858ae24eafbe702acd1380d7e4bac20dc
SHA512938e6bfd094cb98973626b58bcda8acb75f457a6baa87e624ed2254602119c53617a5b8337020d83b57ba51918a4b3f5ad94dc1fc1ea9effb7b3639f14cea87a
-
Filesize
2KB
MD504b25ea2f3290596fef36d2fe58dea17
SHA14c807f049de59d8b21405279b7734eb7c3bfa209
SHA256b040a4ee5d60bcae30fb4bc0e4814e9d692b14f9d87646d22fe27e24d819966a
SHA512374b451d8c0bcb036aff7b59b9e3d8eb43afe22e27b9603ea069da1d7a4d88ffb698c2463132ac96b7079ead07accd795be0fd46f53db141bbd0ebb09b1dd4e9
-
Filesize
2KB
MD50c970e32d4ccff4a1e97f55d774eee2b
SHA163936e88aa4a9fc100c262feec2d5ea1148c075c
SHA2568a7df2dba89598cae0595c065109a7b6cf473733505f8093e13ba2198ae50cf4
SHA51264f96825ebd50c911ddc776ab2c38049c52422b92fe3712e74947b599eeb6f3ca5005d4cde538e70c2774bb3061362ac9d5174209141b13c92240a12c90099ec
-
Filesize
2KB
MD57da50872794ef952a81c3a9dbb1097f6
SHA1d859f474ae4d83d72c65e0654f458a933c35ff2e
SHA2561162712933f533930d6ed989254e64e9b2005ec9413fd9b3f98a327a46cd1367
SHA512d73b9ea08c4bf2e22708c4ec9f1d118c0716c230109dc793d5c1034155d16c3f84612dcc9680c04e9dc685ae5746998af0a483f545a86b45c1b5f932442865d0
-
Filesize
2KB
MD52baaaabb8c895d8228c5cb0b1eca7365
SHA13467f6aedb186ffc82bc2cf1f4a561f2e61e3357
SHA256afff47127bb01d43f9292daddf43f737b5eb76212d4bcfbed15180302c5be157
SHA512ff876b7f20e0a384c13e8a26235fe499a4a1e51f313fd33faf2171a19d12c1a9450ca73af7ddea581b6ca4afcd9e9131809e907c19e7c4b14ffd07abade0a378
-
Filesize
2KB
MD576cd0c2b3bf20083ce124ee496f1b39d
SHA1132855e48d19c21db249fadc4caf4d4432f027ad
SHA25669e6687b2f9396859407d4b8ae3b9c547f9b78a3ab6b3fe26b7728e79b7271ff
SHA5124a8687391513649d5bed8037878ade91475ef67471c065118ba31b07302f03ca7ebc64017c7cc16f853d814a4b76e026323a9d8e4241afdf2781fde77e4ef2bf
-
Filesize
1KB
MD507ad6985d8a39087582139555743dc49
SHA13dd1ee2f4e25fe51a0ed7827d80e6e363675265a
SHA256009c50a2a3e7e26d4033047f991f44e005df2e00ae643090d5ac3e61d39e994e
SHA51209e6ccb7a07972f3637d214c1e3230b79da85a9fbcfecfaece0cc41d3107f0dba43e79060c6ebc24d2fc1d9bcbdae7ffbf96b2ddbbec4c7b0ca09dc857dcfb3b
-
Filesize
2KB
MD5fc75c2f5409a1509da07c541597f6082
SHA1b769e298111edd0a224709f358416d7edc37db6f
SHA256eabd7f219fe8ebce770bfb9dd9fd6095d7f3f2e34829da6666e49ac6e1a38163
SHA5120ceaf4a38bfc55f05332f526f6cb8ea0083639264d5dd3b73ec7368a52e1e2794bf1921c89fb88b1b1b2770669df6c81151e3b9b2410466cbed93be4eba6f2bd
-
Filesize
2KB
MD5f8d2baf7bac2c3323e85daddea32d07d
SHA136c2beadc9e7330abb4aa13a4a2cce8b7fa3b7ea
SHA256c95296ea89021edb316b9241dee5d818556c9d2e9f0a02fbd698c47898b5eab8
SHA5124474bb22d66fd9268a4b15729d927296ac9cb6604db3bd386112f47f083233ff4b48a3895913ee9c6ee5882f05ea0672015024f3d4b1a7c4a63b96b4a1570ee8
-
Filesize
2KB
MD542f57e673888bcf2e1e32956650f3f22
SHA19608926f0d6bbb5ec913e35cfce1f75be15aae07
SHA256ee7b588a4e019c04c3a2cc420df4297db077cd64e030865bd29e1d11761f4aa8
SHA5120f6dfefb967f94a6db938e12cd771e9cb5c08c4e2b1b30e12b3d411e979c9b6df518455e6acbbb5ce5daa65b8a9130d8662feadb30e80c2cbafd62d6e7d37b22
-
Filesize
2KB
MD567545ac314a5a0e1774bccf58be8183c
SHA187c4fa8533e07265b503ff051022543e23b1f9e6
SHA2560d82929fd4c61e29e0865768f88bdeeba29a21075bfe33888a71ff41ed7f7d43
SHA5122e4ee12ea34567f43f2ac1a2cce9f14489ae7982fdbf359780c54292074878a7b9404312d5d2b53eb8d9ae7f8662e3b9a9a07cea73894a5cebc51f8c2d233f1b
-
Filesize
2KB
MD5f8b0529c107cd0486db59fb1490e8bbd
SHA1d9cdf38befaa8ae8a188c607a825f9a5b5390f92
SHA25667e4b83d2facf5f4b3a6185092b40f9a57e6dec3b2328df621f0c3bb0b76bd93
SHA51225823b0541ef8f96af5705ec23ad2d83c806a3fdba50c37159a2aa34e4288b7df3f7f9d52477f53f9ba27bcb0fc995cbedc438e388cba42745879851dd1a2070
-
Filesize
2KB
MD5c1965b6f935ea0cb1e76d4d9655295d1
SHA139b01e8de5b61bdfeeb2723a08af2a3752306599
SHA25655bc858c908393010e0d1da0c01b558b33437991718c2f279e9a97b182cfa31d
SHA512ffef108539c9ab4070db99e9213bc882c440473d49f36a7609c5a731b5a5ea1e1cb227ac5a157cee2046b1954b25585ff008960d3487e241caa87e6ccb156dce
-
Filesize
2KB
MD5505793f562b1a91f29b7fa0d0fc77619
SHA13fc8d1794188206449fe89f23943c65ce251a19d
SHA25685f42a38c6dac0a8d6961a0b4a3f60b5211c26045f3c8c5ecfba448ab232dd85
SHA512d3a9998ab73c140cefb57800df96bfd254d100da4d4f324ce063313ff11f804acf8d019605ae995f01eaa46609bf81f2f30b6a05b9991cf329bc7d6f8b952161
-
Filesize
536B
MD58b5aa994896d6cef962b8bbcd3bd89a9
SHA18f92fa13508fd4e7e7e1ca61d25ba7e59a98858e
SHA2568a633220c5b180d00fca89a4a4bce1eaa45666def83e1072e5b3d1f62a93e8cc
SHA5125597571b023d47d7696fa44b6c36bd007a266a61c087353734dd37321710bb9f2d7b06c0be7d45e4d05e33539ef5be23d7a54675233050dd7bbe0f79d1c56ece
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\blob_storage\6082c044-88eb-4745-b0cf-b34ee74718d3\7
Filesize5.2MB
MD58f99cead419f703eb2cb72131971aabc
SHA19e60715ea032a7a79ec47a822c2e8a6988b69f41
SHA256d6c2aa96d862b8729eac397a425f9dc3ab0d14af49d50a283e8bfc32ce62df64
SHA51284294901a6e448841809efdcfa71924767792d8f7cc0fecd0874fc301121244754f5ac186fff8b0a968801df54dbe13535ab46f8234c58b4cc65bb209408f57f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d36764e8ce5160fff55b6bcee3246bb4
SHA16820d3e7f7aeddd796716a3956908ea93bf6ab6e
SHA256034bcb489622a1f236486291e6d2b637d936a01ad376cefbec8eb6971ca87640
SHA5120b5185faac395348bb3a3af1e13d691d6330d1eee1fc3d2e23f50478750b8376918e4c9812333a58d4c01731f68e6e6d7d6173902c7c2b4eb04df805d71c6535
-
Filesize
11KB
MD562f9ef5e1cdb23ecf7ea6ff935abe688
SHA1eeb855e32f6c61f482f9aeed4293100736317de1
SHA2562fb1ba33349d22fe7c97310a361f3fe7fc3039b6c48b0bc207a36d5273a2d300
SHA5121c4248b8dfc3fcb9e93ac569c0347974675d5df58bc5ae89ee6bf0f926c712bedb0eba3fe390208951e5e0b02f30f8d02651df0e220632b446abc23a2d5969f4
-
Filesize
11KB
MD5a36d9b659d18900b172746efb3b2e14a
SHA10984f2c3685985a0e22e693f09255e12b3fc2295
SHA256e8cf27917e63333d83b10ab5ec1867d60975517d5e6b64bc42064b8fbee10030
SHA512dab750f5633ba39543471c261843a07ed7f29b6ea3c2898be2d9570d2bab13345af9468216bdcd63b9a4236a4a9d5ac9613b20147c859814f6e5be19838533f5
-
Filesize
10KB
MD508a5d8584d237adac1684560bc5cefa0
SHA1e7693ae190862b717b07bfa3a1794ce706708853
SHA25665596c7dc729d6065e8c07e4f5ad87b4d5e65d8fe819a860c19e70eaacb1c499
SHA512b42e848b2163db5651aea1409a9850c3447c9ca740e78dce9f8ec94c9ab9e7946f42a2899f90f251c9658e5db1abd417c8ead8c1b35314b0dabd81129c2a29de
-
Filesize
11KB
MD513e954ba2f998614c1b3137b2fb10960
SHA1a781b9cf5fe93023a161d4bf08a393ba52b67741
SHA256c7d1befced6f439a5211f8640ff1a3e51e7f5c89d7cbd600d87d7865ccce48df
SHA512e3ad5a6d8e257788cdc1eafcd20ab44feba5fa3212c9841889875ea195f740990445df7ecaf59a018aa2801037a15940207bc396824d3b57a69a2223f07c56de
-
Filesize
11KB
MD5bd299a4a33f01fcf93709e2d43c7a203
SHA1099e9e9195d342f394ca7f1626b069a5f3d1cc82
SHA256122eb1ac9ed13c12ee0bce6240225967dda0e129f5ed69b002998eaa660c335a
SHA5120180dee34d9a6fcd37394cd617db73226cdc0c4ce01c0c7e4b420a855ca9bb24e115318e954ce8288762c1a828b2bfbe7457c0d18934d418a4c71a90c774d24d
-
Filesize
11KB
MD526948641935dced8612c1d5ae5aaa8aa
SHA198b5f5adfafaa389392863e40d8254b569368982
SHA256ac8c1c16f6f2950ccf4724f3225b836592c4f236927ab34fa0a7bcf5dc8a0f7b
SHA512557b1d1cf6108aec2f1f0ecff8fdf87e8d9363549d95032c91b54b628fc9c0397a5e10792ff51d560c8873b90474d33eb1b2cbaad264c01d49f44e43e534e556
-
Filesize
11KB
MD50742e7fc2108aa2c846f4eb684caff32
SHA1bdee6393c9a74ed593d40e5e58c1af19e850a13b
SHA2560f48e86f5ebfb4c7ec01305c3784cccea04fb2ae0193d05dda3cce7f5a48fc53
SHA512bf64753440dafe2b7e83ed6fde724e5f88cd77903775ca28b1706b2618671f8a1f3a3fa9d6eaaa5354ad389edf5dcfc7121ad13c6e960fdb3041ebf20bab1881
-
Filesize
11KB
MD59a0dc1d44e9821b79f12418127fc3c43
SHA1b1763a66bf20a563539bc0d5fae34387558088c1
SHA256f050db7d0448fd8e5fdac7ed9e939e07cb991ceb121405bfed4d67dcc3044af1
SHA5121fbb49ce532c1a33be7d3c5a97a20d48415929db3315eb51eb634633a31f1ffe29052864b91db426e660f94d83fffcba17afa91e26079ea2ac6afa912747ca39
-
Filesize
11KB
MD50f253bb39eafc2383ff87ee8afd26f34
SHA1a78dde1cbcdbaf66ccf8be206a3c2fc1cf18c154
SHA2562a9b3101f954443e115c1ebbdf464c5bfdaf5906d46112c95bdf9ae33b1b0b9f
SHA51284af7572f81d643ba39931f0e4b967bdbd0aea8bdf879b951afe0ffb9c6440b7416fc949357687f81263e1e8174c4ece491935dadd84a0182fe6d9a5b892e254
-
Filesize
11KB
MD58a34471e8e8493e970644560671eda7e
SHA14926141dc6d22da6e579e26627c36495f88d880c
SHA25662587c33112c4234a3868aed1e13a3b6fc744fee24628910c03bb2b2d8452d88
SHA5123e0a33e43c02b9db681bb6c3c574c0dc1fa534c3063226e15f2da0b1c41b458f7a19dd5bdc07fa13cb65f5dfa6f8b26f86fd9e8156129b688133f686cbf488b2
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133829292521654970.txt
Filesize84KB
MD54787c50ca5946f6115db98571ea7f9c2
SHA16591303d12324e01fed980a3f85e2b65b1835482
SHA256ab7796323d8b13c5a24725f9f9fc44901ecb0b8170c34b3d37f7cbb3f8b3e83f
SHA5120987095ef782f417b70042530dbf7fc1db933e9ff64d22fccf25fcb21070771746545634083fb6cf50457922690e8fb978f9a2752fd4e5f838fc763de860dddd
-
Filesize
84B
MD5f1fafea6feee7fe3d85e13ead768513b
SHA14888f02bc4994c8bb3d128630446cc452e3f7ded
SHA2560f8cf938d740ba54679c0380f33d418d93ca4fdc4b48634983ed4bc869596655
SHA512e497e6f902cd796d67ab65730365acc821bedd398881dce0ea6ee11dbced9f72441ddebd525629af160a4d992b98a8d7d49f8687a14e521a82a5b7e95da751ec
-
Filesize
84B
MD529550643d501fe93512333efb4a81ec0
SHA18c6c0436daa4b42c17a9c72d14ec3dd02a8baa84
SHA2563c1d33707cdaa65dc3fa66a4f94e583a03d8f427209fc9aa8feda00a422b6111
SHA51207c7a28d838e7b51db567359aac43f882b631c510649f9ce20c58399fafbe48b9169e5c28a72b7fd6372c1bf5957101cfd6a98cce89a0d5b480da6f55d5a5a2d
-
Filesize
84B
MD56ae01ae4bd8426eb7b0dae31f14263d9
SHA13712d69c458923a8903141d21ae77086cf3a36ef
SHA25617bffc4f81c5f9a50fe2f6f2e0c3d2fdfe3418779ef6fb61bab6870d65ab1878
SHA512fc648e6bbba7a65d8a5f557226591a6136e2b9afdbe7bc9984217cbb4cb9b5bcfd3a6435ab3b18957c7ca14171e58ad250a587fc81b832105d5fa16ad0c9dd5a
-
Filesize
84B
MD506dbf8335c94ba7ee28e1441fb8eb287
SHA13d560e80c29cd7b7e91b9207ca78333f3ba5cf6c
SHA2566d7697ca6685b91e8f06d9a438b61bde1187754cb45d5c2c8fb2121b7763913b
SHA512d9085c8e4ad7be3fb58c8a1cd753c7edb246573345597e8efff5f0b394baf0652264f31acb8e241a2bccd0080ff6876f2d07671ab19b4e079159405f94d3145a
-
Filesize
84B
MD5956cf28dd6830c1d06ba2c4db01c0340
SHA17952aff79b9e9e6904f353c71bc62ed207ea29c6
SHA256b73775b283e3ff2a1e4263a0424751147036a68c72ee49ce9ff9109ef001bfc6
SHA512afeb8924b3e083a13694dd9de14396647a880bc190c49f5b7298596d877e0c669803e2810a1f2ab7c3ebe00ddf49e15653c82831e0edc995e542302fa54f03b2
-
Filesize
26B
MD56bc190dd42a169dfa14515484427fc8e
SHA1b53bd614a834416e4a20292aa291a6d2fc221a5e
SHA256b3395b660eb1edb00ff91ece4596e3abe99fa558b149200f50aabf2cb77f5087
SHA5125b7011ed628b673217695809a38a800e9c8a42ceb0c54ab6f8bc39dba0745297a4fbd66d6b09188fcc952c08217152844dfc3ada7cf468c3aafcec379c0b16b6
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\{586DC830-892F-482D-8B8D-9BEEB3283E2B}.session
Filesize1KB
MD5bc8f8ed617096a5206c0e19b7e01800f
SHA1ab83cf2df98e49749348139d0072bf2cd1339da5
SHA256d44d639cf44eb459d74f18509032b6f8e9d566e0a72c7e4412df11734762811e
SHA512a02cc8f1d23704c6c6e3121a85256bcf5761e64972e31865432b4aa5a78dd4ef5c2e19a98e6ef30abea7fcf3edbdbd5e2ab64dd16b3e55826a74da3ce0501dc7
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\{586DC830-892F-482D-8B8D-9BEEB3283E2B}.session
Filesize2KB
MD554e7f65b4fe768cf3ad85381971329a1
SHA11e61d2d1c381df0e9b28c8f29ce9f2c4970747e5
SHA2560b85422f349c30005f086a83b696991d3a3f9787a75af8e3b399aac23479838c
SHA5126617a9744cd30b8962ed478b3187c8b4c6e0b4a222e2165ef9a3d2d2eae6226357ff599b4a68b314d67e29fbe58036c44580bbe5b5fc4b24c31df7c342179572
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\{586DC830-892F-482D-8B8D-9BEEB3283E2B}.session
Filesize3KB
MD5659b8f8e4573da4c5105267760962c7a
SHA1a47e30ca38a91b2f7b0d7beb18a81699372a3587
SHA25654f12abb484ba1e1259d75e457437a14dc1265ea08de9e88558a8d5df2c0d976
SHA5123ec5956b607c50111697568d87869c219b55b71413dce443f4b4b02339bd6403ca6f0fd5dd2ace8b7c27301c33036ede59de840236b1f2b02f80f962ee9c9903
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\{586DC830-892F-482D-8B8D-9BEEB3283E2B}.session
Filesize4KB
MD5b32e7e09e1e76c4efbe9ea9f4b00a6ba
SHA1fd2d863472a0dba2646f0209dfb6d58af71649c0
SHA2565ac8455992713fc7359143411d656de928583b62b21735a13d6e12abe6352588
SHA5120c50f3eb42b6533a94f48ecd4e12bbb5547868418f9f572bd51313602d70f58d016dd3080d22ab36faedcffeb5d84b8bbf1a87010a8ea6dd947a35bd860327ef
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\{586DC830-892F-482D-8B8D-9BEEB3283E2B}.session
Filesize4KB
MD5db1dd6d47b6e431c3c16c61c435fa6b8
SHA15ab195b7e7bc5982fc28ea8c0b0752d604f1f1b0
SHA256d99186f65bd9597bbeab4c82a9e432b4e8fa18db86150776b58787abc543f86f
SHA51284d168531ec1146bb1607b7e147b54eb10794a07e3411e9c4f22fee6d58d3621556a3b62998a6f958ebc2bd8cbd5f171ca3d36dc0ec9ba6bdf5521d529b8d3cc
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\{59EB68FF-1141-48A3-AB3D-F23D400E9EA3}.session
Filesize1KB
MD5972e5f940b4a0b1089a5624468edef77
SHA1430764f112e328254287c9b83b2aec61ea7dbfb0
SHA2563cef5a117e1b7f7d94e6e5827c729be7d202c0e3b75e815dd107dbc8b0fdd801
SHA51207263201b82d5fab93c92738d900f2e7120a15161a3f43f6b72f34ff88b54323a64bb86ebbe45a4a68395ca116c01fc257e50ac82e8201f7efd37b5e14ed99da
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\{59EB68FF-1141-48A3-AB3D-F23D400E9EA3}.session
Filesize1KB
MD5726dd927dcec51ae41b73312c0ae911a
SHA15c653955425f820ff10508b6f67f42e7c2098a75
SHA2567fb27c3c1fda9063be88f7f5488a73f6956d4f09b6c2bb421257f50dee3fa07d
SHA5124f806c50783bec0204ce7cac2905a676cb26d175caa6fb452f584fc5e9f0d5e0a6c5c05a638be0b9b1c71e349aed4fbefd0170d99c6a0bbf73904ad07f0e9873
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\{59EB68FF-1141-48A3-AB3D-F23D400E9EA3}.session
Filesize2KB
MD58ae60a533da9847bd6ebfb8378f1b2e8
SHA16af2987bbffd936e637a4441b3fbc05a1b663b05
SHA256dafeb8716d27e2a6c008761bbd5b8937439dc6c2985cd1e33bc57f6abe68cb7b
SHA512ecc5b16bf748254b7c1750c141682d7c6a88344371a06faf5577b5768ee12dff8967583f898dd396bf114e624131e2c8c3f4f6d0ad3d003caada6ad146dd0661
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\{59EB68FF-1141-48A3-AB3D-F23D400E9EA3}.session
Filesize4KB
MD558f6f7d10d6f163f8dcde268edfbdbb0
SHA1741a91d6f78e6caef3dcf6df27ba8fdafdc68426
SHA256bc2ee271beb2c0a8599f18a8d106539e24c798d4c37def3be8ff7388534b81f2
SHA5125390afb756255912ee3c1001bd1c6bf2b24dce491b0edf6ba47a44c585e805669961ddc7dc9ea37883efbd53f17e32b426639f95ce4d95153088ec4d96dff85b
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\{6859AA51-1909-476D-8404-8C2BAD42EC88}.session
Filesize3KB
MD5545812c67c2d966adad952e03ebad179
SHA15d0137da8327c2ff0e05a3089970e16d3f86c2b8
SHA256843cfb6bcac2240ef8e9b0608042e85eebf56c199db564e5aa9a85313e100ff4
SHA5123a99d8c7a1d6d448364d11784f1e65ad3d8ef7c5130b276f2193299688c3bcec46b11553c252b8cde349bc13da9193ab8694e4be9ed915a11c980ab4894b677a
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\{6859AA51-1909-476D-8404-8C2BAD42EC88}.session
Filesize4KB
MD5a8681094115ac8facca5b39a5f7ee2ac
SHA194fd923438485f735f19f86cad6686c214815dca
SHA256b506ed32c460dc6998f73281e93de9e982f05d7bc78b4e960f5bf15f6c640a5b
SHA512db60b06745d799a5672c21f45e5607976cb3870075ec0660ce1289c50a69561b8928d888344a3f7944aeea91674009116e10f60834bb47a9d30456803533e4ca
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize10KB
MD5b6941febb8ef0c5393db37937e39b7a2
SHA1cbafff1ee66624364081f181118c7ddb8e4b5bad
SHA256c76cf9d9bda699b1c93a56c6138dec9ce26880311e8cc0603931246218ddc7a4
SHA5127a901cd9fddeeef7c2a09cfb4a6de4814528e3b93e5897525e2e27bdf696cc637057cb54663c3033c09a935e075a4364227d6ca721b36319a7df4cf4393b4af4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize10KB
MD58d52e3ef4be5e2b95f4516f7e4d4c8d1
SHA1921944350bb0b2d284f36be1ba143f7feb8bb367
SHA256abc42e4f45876b8729433b6b0227311aa0fff6107e4f6a30dde8ff3c8d574903
SHA5128868f3f92f0a9e032dc3be096808b3222e027fa4438a744334f0c34d1ea6836811ae7110a6e59019820e212c01d78ef6d47b22da11e0c6aed2084837f2c1ad49
-
Filesize
8KB
MD5e4dfbaeb01e41a23bd3043cab31f9c26
SHA1291ae331e5d48db862fc38ba966fe2c85e22c449
SHA25614facc88a9acb14227ebac4d348a14e0768475f2507eec5655d73a3ff38f0c7d
SHA5120e78e377ac4a856e80d688f54f10df32fea8bec9cd69cf80303b82306b24c1e0048dca90ff10f8b3921633a60107739d427ed2f30766091113c3badc6a66e54f
-
Filesize
1KB
MD529b6ceff917c4a4756d6124c4facebf1
SHA1dd2e6e95d8bf5d85d3a25632500110651957ff21
SHA2568580392cc7f59df0bab203d484b4d6365ca9757ec01ad52f089901bd031bf580
SHA512b12cea4f760064298b0fd4bc7c8c32757f220e3201e1ff29bd0b1d246f16841de7c36e09678cb6176ea2d3f29e5747eac4f32e591da38b84e986942acdff3315
-
Filesize
3KB
MD535c07d99f0dc8c9a3550963fe356614f
SHA1ed360012d554e7ca8782442211b1c6c4bbf68d33
SHA256b32917caa3ac8888a9bbc0df773b055f6943f90c7487f7e0f4b8cb73efc1fd6f
SHA5120aa78832cd33ff9b31b92ac05787dcf83e8f1be1fb5b80e6a18b5f9a0f8fac78aebadda420bded8b18d43148b1092c81c35db94d28175043088713c27a93128c
-
C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\0A01606\Error file remover.msi
Filesize1010KB
MD527bc9540828c59e1ca1997cf04f6c467
SHA1bfa6d1ce9d4df8beba2bedf59f86a698de0215f3
SHA25605c18698c3dc3b2709afd3355ad5b91a60b2121a52e5fcc474e4e47fb8e95e2a
SHA512a3ae822116cddb52d859de7ffc958541bb47c355a835c5129aade9cc0e5fba3ff25387061deb5b55b5694a535f09fe8669485282eb6e7c818cc7092eb3392848
-
Filesize
126KB
MD53531cf7755b16d38d5e9e3c43280e7d2
SHA119981b17ae35b6e9a0007551e69d3e50aa1afffe
SHA25676133e832c15aa5cbc49fb3ba09e0b8dd467c307688be2c9e85e79d3bf62c089
SHA5127b053ba2cf92ef2431b98b2a06bd56340dad94de36d11e326a80cd61b9acb378ac644ac407cf970f4ef8333b8d3fb4ff40b18bb41ec5aee49d79a6a2adcf28fd
-
Filesize
532KB
MD500add4a97311b2b8b6264674335caab6
SHA13688de985909cc9f9fa6e0a4f2e43d986fe6d0ec
SHA256812af0ec9e1dfd8f48b47fd148bafe6eecb42d0a304bc0e4539750dd23820a7f
SHA512aaf5dae929e6b5809b77b6a79ab833e548b66fb628afeb20b554d678947494a6804cb3d59bf6bbcb2b14cede1a0609aa41f8e7fe8a7999d578e8b7af7144cb70
-
Filesize
190KB
MD5248aadd395ffa7ffb1670392a9398454
SHA1c53c140bbdeb556fca33bc7f9b2e44e9061ea3e5
SHA25651290129cccca38c6e3b4444d0dfb8d848c8f3fc2e5291fc0d219fd642530adc
SHA512582b917864903252731c3d0dff536d7b1e44541ee866dc20e0341cbee5450f2f0ff4d82e1eee75f770e4dad9d8b9270ab5664ffedfe21d1ad2bd7fe6bc42cf0e
-
Filesize
24KB
MD54a4a6d26e6c8a7df0779b00a42240e7b
SHA18072bada086040e07fa46ce8c12bf7c453c0e286
SHA2567ad9ed23a91643b517e82ad5740d24eca16bcae21cfe1c0da78ee80e0d1d3f02
SHA512c7a7b15d8dbf8e8f8346a4dab083bb03565050281683820319906da4d23b97b39e88f841b30fc8bd690c179a8a54870238506ca60c0f533d34ac11850cdc1a95
-
Filesize
2.4MB
MD5dbfbf254cfb84d991ac3860105d66fc6
SHA1893110d8c8451565caa591ddfccf92869f96c242
SHA25668b0e1932f3b4439865be848c2d592d5174dbdbaab8f66104a0e5b28c928ee0c
SHA5125e9ccdf52ebdb548c3fa22f22dd584e9a603ca1163a622db5707dbcc5d01e4835879dcfd28cb1589cbb25aed00f352f7a0a0962b1f38b68fc7d6693375e7666d
-
Filesize
666KB
MD597512f4617019c907cd0f88193039e7c
SHA124cfa261ee30f697e7d1e2215eee1c21eebf4579
SHA256438888ef36bad1079af79daf152db443b4472c5715a7b3da0ba24cc757c53499
SHA512cfbb8dd91434f917d507cb919aa7e6b16b7b2056d56185f6ad5b6149e05629325cdb3df907f58bb3f634b17a9989bf5b6d6b81f5396a3a556431742ed742ac4a
-
Filesize
73KB
MD537e887b7a048ddb9013c8d2a26d5b740
SHA1713b4678c05a76dbd22e6f8d738c9ef655e70226
SHA25624c0638ff7571c7f4df5bcddd50bc478195823e934481fa3ee96eb1d1c4b4a1b
SHA51299f74eb00c6f6d1cbecb4d88e1056222e236cb85cf2a421243b63cd481939d3c4693e08edde743722d3320c27573fbcc99bf749ff72b857831e4b6667374b8af
-
Filesize
219KB
MD5d5c12fcfeebbe63f74026601cd7f39b2
SHA150281de9abb1bec1b6a1f13ccd3ce3493dee8850
SHA2569db7ef2d1495dba921f3084b05d95e418a16f4c5e8de93738abef2479ad5b0da
SHA512132d8c08f40a578c1dc6ac029bf2a61535087ce949ff84dbec8577505c4462358a1d9ef6cd3f58078fdcae5261d7a87348a701c28ce2357f17ecc2bc9da15b4e
-
Filesize
10.6MB
MD5e9e5596b42f209cc058b55edc2737a80
SHA1f30232697b3f54e58af08421da697262c99ec48b
SHA2569ac9f207060c28972ede6284137698ce0769e3695c7ad98ab320605d23362305
SHA512e542319beb6f81b493ad80985b5f9c759752887dc3940b77520a3569cd5827de2fcae4c2357b7f9794b382192d4c0b125746df5cf08f206d07b2b473b238d0c7
-
Filesize
184KB
MD5c9c341eaf04c89933ed28cbc2739d325
SHA1c5b7d47aef3bd33a24293138fcba3a5ff286c2a8
SHA2561a0a2fd546e3c05e15b2db3b531cb8e8755641f5f1c17910ce2fb7bbce2a05b7
SHA5127cfa6ec0be0f5ae80404c6c709a6fd00ca10a18b6def5ca746611d0d32a9552f7961ab0ebf8a336b27f7058d700205be7fcc859a30d7d185aa9457267090f99b
-
Filesize
520KB
MD5bd76fc01deed43cd6e368a1f860d44ed
SHA1a2e241e9af346714e93c0600f160d05c95839768
SHA256e04c85cd4bffa1f5465ff62c9baf0b29b7b2faddf7362789013fbac8c90268bf
SHA512d0ebe108f5baf156ecd9e1bf41e23a76b043fcaac78ff5761fdca2740b71241bd827e861ada957891fbc426b3d7baa87d10724765c45e25f25aa7bd6d31ab4ec
-
Filesize
49KB
MD546bfd4f1d581d7c0121d2b19a005d3df
SHA15b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5
-
Filesize
48KB
MD586a3a3ce16360e01933d71d0bf1f2c37
SHA1af54089e3601c742d523b507b3a0793c2b6e60be
SHA2562ebe23ba9897d9c127b9c0a737ba63af8d0bcd76ec866610cc0b5de2f62b87bd
SHA51265a3571cf5b057d2c3ce101346947679f162018fa5eadf79c5a6af6c0a3bc9b12731ff13f27629b14983ef8bc73fa9782cc0a9e6c44b0ffc2627da754c324d6e
-
Filesize
48KB
MD5ab3e43a60f47a98962d50f2da0507df7
SHA14177228a54c15ac42855e87854d4cd9a1722fe39
SHA2564f5f0d9a2b6ef077402a17136ff066dda4c8175ceb6086877aaa3570cabb638f
SHA5129e3365c7860c4766091183d633462f1cc8c30d28871ae2cd8a9a086ce61c0bccf457f919db6826b708f0cf4f88e90f71185420edc4756b7d70137e2096f8797f
-
Filesize
96KB
MD560335edf459643a87168da8ed74c2b60
SHA161f3e01174a6557f9c0bfc89ae682d37a7e91e2e
SHA2567bf5623f0a10dfa148a35bebd899b7758612f1693d2a9910f716cf15a921a76a
SHA512b4e5e4d4f0b4a52243d6756c66b4fe6f4b39e64df7790072046e8a3dadad3a1be30b8689a1bab8257cc35cb4df652888ddf62b4e1fccb33e1bbf1f5416d73efb
-
Filesize
1KB
MD5c784d96ca311302c6f2f8f0bee8c725b
SHA1dc68b518ce0eef4f519f9127769e3e3fa8edce46
SHA256a7836550412b0e0963d16d8442b894a1148326b86d119e4d30f1b11956380ef0
SHA512f97891dc3c3f15b9bc3446bc9d5913431f374aa54cced33d2082cf14d173a8178e29a8d9487c2a1ab87d2f6abf37e915f69f45c0d8b747ad3f17970645c35d98
-
Filesize
330B
MD504b892b779d04f3a906fde1a904d98bb
SHA11a0d6cb6f921bc06ba9547a84b872ef61eb7e8a5
SHA256eb22c6ecfd4d7d0fcea5063201ccf5e7313780e007ef47cca01f1369ee0e6be0
SHA512e946aa4ac3ec9e5a178eac6f4c63a98f46bc85bed3efd6a53282d87aa56e53b4c11bb0d1c58c6c670f9f4ad9952b5e7fd1bb310a8bd7b5b04e7c607d1b74238a
-
Filesize
96KB
MD53cab78d0dc84883be2335788d387601e
SHA114745df9595f190008c7e5c190660361f998d824
SHA256604e79fe970c5ed044517a9a35e4690ea6f7d959d21173ebef45cdd3d3a22bdd
SHA512df6b49f2b5cddebd7e23e81b0f89e4883fc12d95735a9b3f84d2f402f4996c54b5fdea8adb9eaa98e8c973b089656d18d6b322bd71cb42d7807f7fa8a7348820
-
Filesize
312KB
MD5aa82345a8f360804ea1d8d935f0377aa
SHA1c09cf3b1666d9192fa524c801bb2e3542c0840e2
SHA2569c155d4214cebda186647c035ada552963dcac8f88a6b38a23ea34f9ecd1d437
SHA512c051a381d87ba933ea7929c899fb01af2207cb2462dcb2b55c28cff65596b27bdb05a48207624eeea40fddb85003133ad7af09ca93cfb2426c155daea5a9a6db
-
Filesize
128KB
MD57e6b88f7bb59ec4573711255f60656b5
SHA15e7a159825a2d2cb263a161e247e9db93454d4f6
SHA25659ff5bc12b155cc2e666bd8bc34195c3750eb742542374fc5e53fb22d11e862f
SHA512294a379c99403f928d476e04668717cdabc7dc3e33bcf6bcad5c3d93d4268971811ff7303aa5b4b2ed2b59d59c8eba350a9a30888d4b5b3064708521ac21439c
-
Filesize
180KB
MD5d552dd4108b5665d306b4a8bd6083dde
SHA1dae55ccba7adb6690b27fa9623eeeed7a57f8da1
SHA256a0367875b68b1699d2647a748278ebce64d5be633598580977aa126a81cf57c5
SHA512e5545a97014b5952e15bb321135f65c0e24414f8dd606fe454fd2d048d3f769b9318df7cfb2a6bf932eb2bf6d79811b93cb2008115deb0f0fa9db07f32a70969
-
Filesize
88KB
MD54083cb0f45a747d8e8ab0d3e060616f2
SHA1dcec8efa7a15fa432af2ea0445c4b346fef2a4d6
SHA256252b7423b01ff81aea6fe7b40de91abf49f515e9c0c7b95aa982756889f8ac1a
SHA51226f8949cad02334f9942fda8509579303b81b11bc052a962c5c31a7c6c54a1c96957f30ee241c2206d496d2c519d750d7f6a12b52afdb282fa706f9fee385133