Analysis
-
max time kernel
266s -
max time network
267s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2025, 13:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo
Resource
win10v2004-20250217-en
Errors
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo
Malware Config
Signatures
-
Detects MyDoom family 1 IoCs
resource yara_rule behavioral1/memory/3572-571-0x00000000004A0000-0x00000000004AD000-memory.dmp family_mydoom -
InfinityLock Ransomware
Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.
-
Infinitylock family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" RedEye.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection RedEye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" RedEye.exe -
Mydoom family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3840 created 3404 3840 MBSetup.exe 56 -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RedEye.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" RedEye.exe Set value (int) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" RedEye.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Downloads MZ/PE file 6 IoCs
flow pid Process 199 2748 msedge.exe 214 3840 MBSetup.exe 73 2748 msedge.exe 73 2748 msedge.exe 73 2748 msedge.exe 73 2748 msedge.exe -
Drops file in Drivers directory 7 IoCs
description ioc Process File created C:\Windows\system32\DRIVERS\mbamswissarmy.sys MBAMService.exe File created C:\Windows\system32\DRIVERS\MbamChameleon.sys MBAMService.exe File opened for modification C:\Windows\SysWOW64\drivers\mbamtestfile.dat MBSetup.exe File created C:\Windows\SysWOW64\drivers\mbamtestfile.dat MBSetup.exe File created C:\Windows\system32\drivers\mbae64.sys MBAMInstallerService.exe File created C:\Windows\system32\DRIVERS\MbamElam.sys MBAMService.exe File opened for modification C:\Windows\system32\DRIVERS\MbamElam.sys MBAMService.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad++.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rkill-unsigned64.exe RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rkill64.scr\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logoff.exe RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rkill.com\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rkill64.com RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rkill64.com\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\a2start.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HitmanPro_x64.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chrome.exe RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UserAccountControlSettings.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AdwCleaner.exe\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Autoruns.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mspaint.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rkill.com RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ComboFix.exe RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ComboFix.exe\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UserAccountControlSettings.exe RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\attrib.exe\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\recoverydrive.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\control.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RKill64.exe RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\opera.exe\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\microsoftedge.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RKill64.exe\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mb3-setup-1878.1878-3.3.1.2183.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\opera.exe RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\microsoftedge.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\yandex.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logoff.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rkill-unsigned.exe\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rkill.scr RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\a2start.exe\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Autoruns64.exe RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\control.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iExplore64.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mb3-setup-1878.1878-3.3.1.2183.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCuiL.exe RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bcdedit.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mspaint.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chrome.exe\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gpedit.msc RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gpedit.msc\Debugger = "RIP" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RKill.exe RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZAM.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HitmanPro_x64.exe\Debugger = "RIP" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe\Debugger = "RIP" RedEye.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 5268 NetSh.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MBAMSwissArmy\ImagePath = "\\SystemRoot\\System32\\Drivers\\mbamswissarmy.sys" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mbamchameleon\ImagePath = "\\SystemRoot\\System32\\Drivers\\MbamChameleon.sys" MBAMService.exe -
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/memory/3572-567-0x000000007E1A0000-0x000000007E1A7000-memory.dmp acprotect behavioral1/files/0x0007000000023d01-565.dat acprotect behavioral1/memory/3572-572-0x000000007E1A0000-0x000000007E1A7000-memory.dmp acprotect -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MBSetup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate MBSetup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MBAMService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate MBAMService.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation RedEye.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 12 IoCs
pid Process 3844 Amus.exe 4020 InfinityCrypt.exe 3572 MyDoom.A.exe 2836 Amus.exe 3840 MBSetup.exe 772 MBAMInstallerService.exe 3960 MBVpnTunnelService.exe 3252 MBAMService.exe 4436 MBAMService.exe 5420 RedEye.exe 6872 Malwarebytes.exe 6972 Malwarebytes.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\MBAMService\ = "Service" MBAMInstallerService.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\MBAMService MBAMInstallerService.exe -
Loads dropped DLL 64 IoCs
pid Process 3572 MyDoom.A.exe 772 MBAMInstallerService.exe 772 MBAMInstallerService.exe 772 MBAMInstallerService.exe 3960 MBVpnTunnelService.exe 4436 MBAMService.exe 4436 MBAMService.exe 4436 MBAMService.exe 4436 MBAMService.exe 4436 MBAMService.exe 4436 MBAMService.exe 4436 MBAMService.exe 4436 MBAMService.exe 4436 MBAMService.exe 4436 MBAMService.exe 4436 MBAMService.exe 4436 MBAMService.exe 4436 MBAMService.exe 4436 MBAMService.exe 4436 MBAMService.exe 4436 MBAMService.exe 4436 MBAMService.exe 4436 MBAMService.exe 4436 MBAMService.exe 4436 MBAMService.exe 4436 MBAMService.exe 4436 MBAMService.exe 4436 MBAMService.exe 4436 MBAMService.exe 4436 MBAMService.exe 4436 MBAMService.exe 772 MBAMInstallerService.exe 772 MBAMInstallerService.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe 6872 Malwarebytes.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microzoft_Ofiz = "C:\\Windows\\KdzEregli.exe" Amus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\Downloads\\RedEye.exe" RedEye.exe Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\Downloads\\RedEye.exe" RedEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\Downloads\\RedEye.exe" RedEye.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RedEye.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: MBAMService.exe File opened (read-only) \??\N: MBAMService.exe File opened (read-only) \??\P: MBAMService.exe File opened (read-only) \??\S: MBAMService.exe File opened (read-only) \??\Y: MBAMService.exe File opened (read-only) \??\O: MBAMInstallerService.exe File opened (read-only) \??\Q: MBAMInstallerService.exe File opened (read-only) \??\H: MBAMService.exe File opened (read-only) \??\L: MBAMService.exe File opened (read-only) \??\I: MBAMInstallerService.exe File opened (read-only) \??\N: MBAMInstallerService.exe File opened (read-only) \??\P: MBAMInstallerService.exe File opened (read-only) \??\W: MBAMInstallerService.exe File opened (read-only) \??\Y: MBAMInstallerService.exe File opened (read-only) \??\T: MBAMService.exe File opened (read-only) \??\A: MBAMInstallerService.exe File opened (read-only) \??\E: MBAMInstallerService.exe File opened (read-only) \??\L: MBAMInstallerService.exe File opened (read-only) \??\T: MBAMInstallerService.exe File opened (read-only) \??\A: MBAMService.exe File opened (read-only) \??\E: MBAMService.exe File opened (read-only) \??\M: MBAMInstallerService.exe File opened (read-only) \??\Z: MBAMInstallerService.exe File opened (read-only) \??\K: MBAMService.exe File opened (read-only) \??\O: MBAMService.exe File opened (read-only) \??\V: MBAMService.exe File opened (read-only) \??\B: MBAMInstallerService.exe File opened (read-only) \??\J: MBAMInstallerService.exe File opened (read-only) \??\U: MBAMInstallerService.exe File opened (read-only) \??\V: MBAMInstallerService.exe File opened (read-only) \??\U: MBAMService.exe File opened (read-only) \??\W: MBAMService.exe File opened (read-only) \??\X: MBAMService.exe File opened (read-only) \??\K: MBAMInstallerService.exe File opened (read-only) \??\Q: MBAMService.exe File opened (read-only) \??\R: MBAMService.exe File opened (read-only) \??\Z: MBAMService.exe File opened (read-only) \??\R: MBAMInstallerService.exe File opened (read-only) \??\S: MBAMInstallerService.exe File opened (read-only) \??\X: MBAMInstallerService.exe File opened (read-only) \??\B: MBAMService.exe File opened (read-only) \??\G: MBAMService.exe File opened (read-only) \??\M: MBAMService.exe File opened (read-only) \??\G: MBAMInstallerService.exe File opened (read-only) \??\H: MBAMInstallerService.exe File opened (read-only) \??\I: MBAMService.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 72 raw.githubusercontent.com 73 raw.githubusercontent.com -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf RedEye.exe File opened for modification C:\autorun.inf RedEye.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\rt640x64.inf_amd64_8984d8483eef476c\rt640x64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netimm.inf_amd64_8b2087393aaef952\netimm.PNF MBVpnTunnelService.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d91d2087-340a-4e48-b2ac-0f1a2a6d313f}\mbtun.cat DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\e2xw10x64.inf_amd64_04c2ae40613a06ff\e2xw10x64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\mwlu97w8x64.inf_amd64_23bc3dc6d91eebdc\mwlu97w8x64.PNF MBVpnTunnelService.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d91d2087-340a-4e48-b2ac-0f1a2a6d313f}\mbtun.inf DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\netl260a.inf_amd64_783312763f8749c7\netl260a.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\rtux64w10.inf_amd64_d6132e4c7fe2fac6\rtux64w10.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\net8187bv64.inf_amd64_bc859d32f3e2f0d5\net8187bv64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netathr10x.inf_amd64_2691c4f95b80eb3b\netathr10x.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\c_net.inf_amd64_32a9ad23c1ecc42d\c_net.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\net8185.inf_amd64_7a30f5a9441cd55b\net8185.PNF MBVpnTunnelService.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\mbtun.inf_amd64_add82795013a7c3b\mbtun.cat DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\usbnet.inf_amd64_9e6bb7a4b7338267\usbnet.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\nett4x64.inf_amd64_54eacac1858c78ab\nett4x64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\net819xp.inf_amd64_ff7a5dd4f9b1ceba\net819xp.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netnvma.inf_amd64_7080f6b8ea1744fb\netnvma.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netrtl64.inf_amd64_8e9c2368fe308df2\netrtl64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netwtw04.inf_amd64_c8f5ae6576289a2d\netwtw04.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\kdnic.inf_amd64_6649425cdcae9b5f\kdnic.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netbc64.inf_amd64_b96cdf411c43c00c\netbc64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\ykinx64.inf_amd64_0bbd8466b526ef26\ykinx64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netwmbclass.inf_amd64_dba6eeaf0544a4e0\netwmbclass.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netrtwlane01.inf_amd64_b02695ef070d7a42\netrtwlane01.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\ndisimplatformmp.inf_amd64_8de1181bfd1f1628\ndisimplatformmp.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\wnetvsc.inf_amd64_9a5b429abc465278\wnetvsc.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netrtwlane.inf_amd64_20caba88bd7f0bb3\netrtwlane.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\athw8x.inf_amd64_55014eff4ceefbdf\athw8x.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\usbncm.inf_amd64_9957a38c3d2283ed\usbncm.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\bcmdhd64.inf_amd64_e0bae6831f60ea5f\bcmdhd64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netnvm64.inf_amd64_35bbbe80dec15683\netnvm64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netsstpa.inf_amd64_e76c5387d67e3fd6\netsstpa.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\bthpan.inf_amd64_b06c3bc32f7db374\bthpan.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netk57a.inf_amd64_d823e3edc27ae17c\netk57a.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netjme.inf_amd64_752bf22f1598bb7e\netjme.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netr7364.inf_amd64_310ee0bc0af86ba3\netr7364.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\Temp\{d91d2087-340a-4e48-b2ac-0f1a2a6d313f}\SET1395.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\netr28x.inf_amd64_5d63c7bcbf29107f\netr28x.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\net9500-x64-n650f.inf_amd64_e92c5a65e41993f9\net9500-x64-n650f.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netv1x64.inf_amd64_30040c3eb9d7ade4\netv1x64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\nete1e3e.inf_amd64_895623810c19146a\nete1e3e.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netwsw00.inf_amd64_24d55504ae3587aa\netwsw00.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netwlv64.inf_amd64_0b9818131664d91e\netwlv64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netwtw06.inf_amd64_2edd50e7a54d503b\netwtw06.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\rtwlanu_oldic.inf_amd64_1a82423cc076e882\rtwlanu_oldic.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\net1yx64.inf_amd64_8604d8a50804b9c1\net1yx64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\msux64w10.inf_amd64_5aa81644af5957b3\msux64w10.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\net8192se64.inf_amd64_167684f9283b4eca\net8192se64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\net8192su64.inf_amd64_66c8bfc7a4b1feed\net8192su64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netvwifimp.inf_amd64_ec11d0ad3c5b262a\netvwifimp.PNF MBVpnTunnelService.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt MBAMService.exe File created C:\Windows\System32\DriverStore\FileRepository\netl1e64.inf_amd64_8d5ca5ab1472fc44\netl1e64.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netl160a.inf_amd64_e4cbe375963a69e9\netl160a.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\net7800-x64-n650f.inf_amd64_178f1bdb49a6e2fd\net7800-x64-n650f.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\nete1g3e.inf_amd64_af58b4e19562a3f9\nete1g3e.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netefe3e.inf_amd64_7830581a689ef40d\netefe3e.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\net7400-x64-n650.inf_amd64_557ce3b37c3e0e3b\net7400-x64-n650.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netvchannel.inf_amd64_ba3e73aa330c95d6\netvchannel.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\bcmwdidhdpcie.inf_amd64_977dcc915465b0e9\bcmwdidhdpcie.PNF MBVpnTunnelService.exe File created C:\Windows\System32\DriverStore\FileRepository\netrndis.inf_amd64_be4ba6237d385e2e\netrndis.PNF MBVpnTunnelService.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d91d2087-340a-4e48-b2ac-0f1a2a6d313f}\SET1395.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\mbtun.inf_amd64_add82795013a7c3b\mbtun.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d91d2087-340a-4e48-b2ac-0f1a2a6d313f} DrvInst.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\Desktop\WallPaper = "C:\\redeyebmp.bmp" RedEye.exe -
resource yara_rule behavioral1/files/0x0008000000023ce2-365.dat upx behavioral1/memory/3572-562-0x00000000004A0000-0x00000000004AD000-memory.dmp upx behavioral1/memory/3572-567-0x000000007E1A0000-0x000000007E1A7000-memory.dmp upx behavioral1/files/0x0007000000023d01-565.dat upx behavioral1/memory/3572-572-0x000000007E1A0000-0x000000007E1A7000-memory.dmp upx behavioral1/memory/3572-571-0x00000000004A0000-0x00000000004AD000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\Locales\vi.pak.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.36\tr\UIAutomationClient.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\MBAMCore.dll MBAMInstallerService.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\adobe_spinner.gif.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\eu-es\ui-strings.js.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\cs-cz\ui-strings.js.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\msedgeupdateres_lt.dll.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\it-IT\MSFT_PackageManagementSource.strings.psd1.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_download_audit_report_18.svg.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.36\zh-Hans\System.Windows.Controls.Ribbon.resources.dll MBAMInstallerService.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\HostSideAdapters\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.dll.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\createpdf.svg.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\sv-se\ui-strings.js.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\Locales\pl.pak.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\faf_icons.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\adobe_logo.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\S_IlluEmptyFolder_160.svg.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\next-arrow-default.svg.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Appstore\Download_on_the_App_Store_Badge_da_135x40.svg.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\zh-cn\ui-strings.js.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File created C:\Program Files\Malwarebytes\Anti-Malware\Malwarebytes.UI.Controls.dll MBAMInstallerService.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\Contracts\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.dll.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Onix32.dll.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\selection-actions.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\eu-es\ui-strings.js.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ru-ru\ui-strings.js.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\ko-kr\PlayStore_icon.svg.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ar-ae\ui-strings.js.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themes\dark\help.svg.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\themes\dark\s_close_h2x.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\cookie_exporter.exe.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\EdgeWebView.dat.DATA.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\plugin.js.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.36\zh-Hant\System.Windows.Forms.Design.resources.dll MBAMInstallerService.exe File created C:\Program Files\Malwarebytes\Anti-Malware\MbamUI.Tray.dll MBAMInstallerService.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\DataMatrix.pmp.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\export.svg.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Locales\gd.pak.DATA.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\132.0.2957.140.manifest.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\Locales\km.pak.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.NETCore.App\6.0.36\System.Net.WebProxy.dll MBAMInstallerService.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\icons_retina.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\new_icons.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ro-ro\ui-strings.js.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\nb-no\ui-strings.js.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\inline-error-1x.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\WidevineCdm\manifest.json.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_share_18.svg.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\pl-pl\ui-strings.js.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\themes\dark\illustrations_retina.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\hi_contrast\core_icons__retina_hiContrast_bow.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ui-strings.js.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\fi-fi\ui-strings.js.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\identity_proxy\win11\identity_helper.Sparse.Beta.msix.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Locales\de.pak.DATA.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\msedgeupdateres_hr.dll.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Extensions\external_extensions.json.DATA.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_export_18.svg.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\de-de\ui-strings.js.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ro-ro\ui-strings.js.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\index_poster.jpg.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\ko_get.svg.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180 InfinityCrypt.exe File created C:\Program Files\Malwarebytes\Anti-Malware\shared\Microsoft.WindowsDesktop.App\6.0.36\ko\Microsoft.VisualBasic.Forms.resources.dll MBAMInstallerService.exe -
Drops file in Windows directory 26 IoCs
description ioc Process File created C:\Windows\inf\oem3.inf DrvInst.exe File created C:\Windows\Messenger.exe Amus.exe File created C:\Windows\Pide.exe Amus.exe File opened for modification C:\Windows\Pide.exe Amus.exe File created C:\Windows\Nope.txt RedEye.exe File opened for modification C:\Windows\Messenger.exe Amus.exe File created C:\Windows\Meydanbasi.exe Amus.exe File created C:\Windows\Pire.exe Amus.exe File created C:\Windows\Anti_Virus.exe Amus.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\My_Pictures.exe Amus.exe File created C:\Windows\Cekirge.exe Amus.exe File opened for modification C:\Windows\Cekirge.exe Amus.exe File created C:\Windows\Ankara.exe Amus.exe File created C:\Windows\Adapazari.exe Amus.exe File opened for modification C:\Windows\Adapazari.exe Amus.exe File opened for modification C:\Windows\Anti_Virus.exe Amus.exe File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File created C:\Windows\KdzEregli.exe Amus.exe File opened for modification C:\Windows\KdzEregli.exe Amus.exe File created C:\Windows\My_Pictures.exe Amus.exe File opened for modification C:\Windows\Meydanbasi.exe Amus.exe File opened for modification C:\Windows\Pire.exe Amus.exe File opened for modification C:\Windows\Ankara.exe Amus.exe File opened for modification C:\Windows\INF\setupapi.dev.log MBVpnTunnelService.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh NetSh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh NetSh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh NetSh.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InfinityCrypt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MyDoom.A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MBSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks SCSI registry key(s) 3 TTPs 26 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 InfinityCrypt.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString InfinityCrypt.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MBAMService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MBAMService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5296 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Interacts with shadow copies 3 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 5336 vssadmin.exe 4964 vssadmin.exe 5640 vssadmin.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION MBAMInstallerService.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\Malwarebytes.exe = "11000" MBAMInstallerService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION MBAMService.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\mbam.exe = "11000" MBAMService.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\mbamtray.exe = "11000" MBAMService.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\Office\15.0\Common\Security\Trusted Protocols\All Applications\malwarebytes:\ MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" MBAMService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "212" LogonUI.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\Office\15.0\Common\Security MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\Office\16.0\Common MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\S-1-5-19\Software\Policies\Microsoft\Office\16.0\Common\Security\Trusted Protocols\All Applications\malwarebytes: MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\Office\16.0\Common\Security\Trusted Protocols\All Applications\malwarebytes: MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\S-1-5-19\Software MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\Office\15.0\Common MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\Office\15.0\Common\Security\Trusted Protocols\All Applications MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Malwarebytes MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\Office\16.0\Common\Security MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-20\Software MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\Office\16.0 MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT MBAMService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies\Microsoft\Office\15.0\Common\Security\Trusted Protocols\All Applications\malwarebytes: MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\Office\16.0 MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\Office\16.0\Common\Security MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MBAMInstallerService.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\Office\15.0\Common\Security\Trusted Protocols\All Applications\malwarebytes:\ MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies\Microsoft\Office\16.0\Common MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MBAMInstallerService.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Malwarebytes\FirstRun = "false" MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies\Microsoft\Office\15.0\Common\Security\Trusted Protocols MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\Office MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\Office\15.0\Common\Security\Trusted Protocols\All Applications\malwarebytes: MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies\Microsoft\Office\16.0 MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\Office\15.0\Common\Security\Trusted Protocols\All Applications MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-19\Software\Policies\Microsoft\Office\15.0\Common\Security\Trusted Protocols\All Applications\malwarebytes: MBAMInstallerService.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies\Microsoft\Office\15.0 MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Malwarebytes MBAMInstallerService.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Malwarebytes\FirstRun = "false" MBAMInstallerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\Office\15.0\Common\Security MBAMInstallerService.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{560EB17C-4365-4DFC-A855-F99B223F02AF}\ProxyStubClsid32 MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4A9108FB-A377-47EC-96E3-3CB8B1FB7272}\TypeLib MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C5201562-332D-4385-87E7-2BB41B1694AA}\TypeLib\Version = "1.0" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F1E58D1A-2918-4508-908A-601219B2CCC6}\TypeLib\ = "{A23C190D-C714-42C7-BDBB-F4E1DE65AF27}" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8CB653AC-F9CF-4277-BFB1-C0ED1C650F56}\TypeLib\ = "{FFB94DF8-FC15-411C-B443-E937085E2AC1}" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6CE18DD5-2BD7-4844-B9AD-DF6A995750A1} MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D10B0F61-43AA-40F4-9C6C-57D29CA8544E}\TypeLib\ = "{0E2822AB-0447-4F28-AF4C-FFDB1E8595AE}" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2F14F58B-B908-4644-830F-5ACF8542D27F}\TypeLib MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{503084FD-0743-46C7-833F-D0057E8AC505}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8F1C46F8-E697-4175-B240-CDE682A4BA2D}\ = "MWACController Class" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{50538523-AA2F-40D3-9B58-DB51D5BD3D4A}\TypeLib\Version = "1.0" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6A66A096-E54B-4F72-8654-ED7715B07B43}\TypeLib\Version = "1.0" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AA226B90-F6FF-4618-8AE6-1114E82CB162}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F49090F8-7DC6-4CBC-893A-C1B3DCF88D87}\TypeLib\ = "{A82129F1-32E1-4D79-A39F-EBFEE53A70BF}" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0B14402F-4F35-443E-A34E-0F511098C644}\ProxyStubClsid32 MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2DEBAD4E-3BAF-44F0-9150-BCCCC3801CF9} MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79D77750-02E0-4451-A7BB-524ACD93DD93}\TypeLib MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4E0987E3-3699-4C92-8E76-CAEDA00FA44C}\TypeLib\Version = "1.0" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F1E58D1A-2918-4508-908A-601219B2CCC6}\TypeLib MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2650A9C4-A53C-4BEF-B766-7405B4D5562B}\TypeLib\Version = "1.0" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8CB653AC-F9CF-4277-BFB1-C0ED1C650F56} MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{616E9BE3-358B-4C06-8AAB-0ACF8D089931}\TypeLib\ = "{59DBD1B8-A7BD-4322-998F-41B0D2516FA0}" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F128CCB-D86F-4998-803A-7CD58474FE2C}\TypeLib\ = "{5709DEEB-F05E-4D5C-8DC4-3B0D924EE08F}" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{503084FD-0743-46C7-833F-D0057E8AC505}\TypeLib MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4BDE5F8-F8D4-4E50-937F-85E8382A9FEE} MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{49207D05-5DFE-4F52-9286-1856A92A5BFE}\TypeLib\ = "{0E2822AB-0447-4F28-AF4C-FFDB1E8595AE}" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0CEAFA7-4F65-418C-8A61-92B2048115EE}\TypeLib\Version = "1.0" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{44AC1571-055F-4CC8-B7D8-EA022C4CC112}\TypeLib MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3C0ECFDC-317D-406B-ADF5-C0E8217E244F}\ProxyStubClsid32 MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{616E9BE3-358B-4C06-8AAB-0ACF8D089931}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DE35F2CA-6335-49BA-8E86-F6E246CFCEA6}\ProxyStubClsid32 MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{ADA09B8D-A536-4429-8331-49808442D24B}\ = "_IScanControllerEventsV4" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{ECDAC35E-72BB-4856-97E1-226BA47C62C5}\TypeLib\Version = "1.0" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D7A05281-DB9E-4E02-9680-E4D83CDAA6AB}\ = "_ICleanControllerEventsV8" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D8891F9E-90C4-4B3D-B87B-92DEA9221EBB}\ProxyStubClsid32 MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0AB5C774-8EB7-4C1B-9BBB-5AC3E2C291DD}\TypeLib\ = "{49F6AC60-2104-42C6-8F71-B3916D5AA732}" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DC97FF29-5CE2-4897-8175-94672057E02D}\ = "IArwControllerEvents" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{09F245DA-55E7-451E-BDF3-4EE44637DFF1}\ProxyStubClsid32 MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{115D004C-CC20-4945-BCC8-FE5043DD42D0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8307A4A5-A025-438B-B23B-8EE38A453D54}\ProxyStubClsid32 MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3B74800-4C27-4692-BC00-5AE37FA118E4}\TypeLib\Version = "1.0" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EDF63EDA-B622-44E2-8053-8877E33BB49A}\ = "IMWACControllerV19" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A993F934-6341-4D52-AB17-F93184A624E4}\ProxyStubClsid32 MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FD010FD4-ED27-4B3A-836C-D09269FF3811}\TypeLib\Version = "1.0" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{11D1E5E8-14E1-4B5B-AE1A-2678CB91E8E5}\Version\ = "1.0" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{580243BF-3CEE-4131-A599-C6FED66BEB1B}\Programmable MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BD221458-5E85-4235-B1EF-4658F6751519}\ProxyStubClsid32 MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8C842243-BDAD-4A93-B282-93E3FCBC1CA4}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4D6484EE-AA00-472F-A4F0-18D905C71EA3}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E3D4AC2-A9AE-478A-91EE-79C35D3CA8C7}\TypeLib\ = "{5709DEEB-F05E-4D5C-8DC4-3B0D924EE08F}" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FB586AB4-56F2-4EFA-9756-EE9A399B44DE}\TypeLib\ = "{49F6AC60-2104-42C6-8F71-B3916D5AA732}" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2650A9C4-A53C-4BEF-B766-7405B4D5562B}\ = "_IArwControllerEvents" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6655E528-3168-47A4-BF82-A71E9E6AB5F7} MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFB94DF8-FC15-411C-B443-E937085E2AC1}\1.0\FLAGS MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2F14F58B-B908-4644-830F-5ACF8542D27F}\ProxyStubClsid32 MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C3249828-A4B2-4146-A323-EA5FD2F2FC75}\ProxyStubClsid32 MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{61DF8ACF-EC61-4D69-A543-20EA450E1A84}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MBAMService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{78FA6928-BE8F-4D5D-89EB-761D364A909E}\ = "ISPControllerEventsV4" MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{964AD404-A1EF-4EDA-B8FA-1D8003B29B10} MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3C871BA6-4662-4E17-ABF4-3B2276FC0FF4}\ProxyStubClsid32 MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D372F21-E6DA-4B82-881A-79F6CA6B6AE1} MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BAFDF38F-72A8-4791-AACC-72EB8E09E460} MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3498D9E4-6476-4AC0-B53A-75BC9955EF37} MBAMService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2058A31F-5F59-4452-9204-03F588252FFC} MBAMService.exe -
Modifies system certificate store 2 TTPs 18 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\B51C067CEE2B0C3DF855AB2D92F4FE39D4E70F0E\Blob = 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 MBAMInstallerService.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 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 MBAMInstallerService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\8DA7F965EC5EFC37910F1C6E59FDC1CC6A6EDE16 MBAMInstallerService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5A8CEF45D7A69859767A8C8B4496B578CF474B1A MBAMInstallerService.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5A8CEF45D7A69859767A8C8B4496B578CF474B1A\Blob = 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 MBAMInstallerService.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\1C58A3A8518E8759BF075B76B750D4F2DF264FCD\Blob = 0300000001000000140000001c58a3a8518e8759bf075b76b750d4f2df264fcd2000000001000000c2040000308204be308203a6a003020102021006d8d904d5584346f68a2fa754227ec4300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204341301e170d3231303431343030303030305a170d3331303431333233353935395a304f310b300906035504061302555331153013060355040a130c446967694365727420496e633129302706035504031320446967694365727420544c53205253412053484132353620323032302043413130820122300d06092a864886f70d01010105000382010f003082010a0282010100c14bb3654770bcdd4f58dbec9cedc366e51f311354ad4a66461f2c0aec6407e52edcdcb90a20eddfe3c4d09e9aa97a1d8288e51156db1e9f58c251e72c340d2ed292e156cbf1795fb3bb87ca25037b9a52416610604f571349f0e8376783dfe7d34b674c2251a6df0e9910ed57517426e27dc7ca622e131b7f238825536fc13458008b84fff8bea75849227b96ada2889b15bca07cdfe951a8d5b0ed37e236b4824b62b5499aecc767d6e33ef5e3d6125e44f1bf71427d58840380b18101faf9ca32bbb48e278727c52b74d4a8d697dec364f9cace53a256bc78178e490329aefb494fa415b9cef25c19576d6b79a72ba2272013b5d03d40d321300793ea99f50203010001a38201823082017e30120603551d130101ff040830060101ff020100301d0603551d0e04160414b76ba2eaa8aa848c79eab4da0f98b2c59576b9f4301f0603551d2304183016801403de503556d14cbb66f0a3e21b1bc397b23dd155300e0603551d0f0101ff040403020186301d0603551d250416301406082b0601050507030106082b06010505070302307606082b06010505070101046a3068302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304006082b060105050730028634687474703a2f2f636163657274732e64696769636572742e636f6d2f4469676943657274476c6f62616c526f6f7443412e63727430420603551d1f043b30393037a035a0338631687474703a2f2f63726c332e64696769636572742e636f6d2f4469676943657274476c6f62616c526f6f7443412e63726c303d0603551d2004363034300b06096086480186fd6c02013007060567810c01013008060667810c0102013008060667810c0102023008060667810c010203300d06092a864886f70d01010b050003820101008032ce5e0bdd6e5a0d0aafe1d684cbc08efa8570edda5db30cf72b7540fe850afaf33178b7704b1a8958ba80bdf36b1de97ecf0bba589c59d490d3fd6cfdd0986db771825bcf6d0b5a09d07bdec443d82aa4de9e41265fbb8f99cbddaee1a86f9f87fe74b71f1b20abb14fc6f5675d5d9b3ce9ff69f7616cd6d9f3fd36c6ab038876d24b2e7586e3fcd8557d26c21177df3e02b67cf3ab7b7a86366fb8f7d89371cf86df7330fa7babed2a59c842843b11171a52f3c90e147da25b7267ba71ed574766c5b8024a65345e8bd02a3c209c51994ce7529ef76b112b0d927e1de88aeb36164387ea2a63bf753febdec403bb0a3cf730efebaf4cfc8b3610733ef3a4 MBAMInstallerService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 MBAMInstallerService.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F6108407D6F8BB67980CC2E244C2EBAE1CEF63BE\Blob = 030000000100000014000000f6108407d6f8bb67980cc2e244c2ebae1cef63be2000000001000000f6010000308201f230820178a0030201020213066c9fd7c1bb104c2943e5717b7b2cc81ac10e300a06082a8648ce3d0403033039310b3009060355040613025553310f300d060355040a1306416d617a6f6e3119301706035504031310416d617a6f6e20526f6f742043412034301e170d3135303532363030303030305a170d3430303532363030303030305a3039310b3009060355040613025553310f300d060355040a1306416d617a6f6e3119301706035504031310416d617a6f6e20526f6f7420434120343076301006072a8648ce3d020106052b8104002203620004d2ab8a374fa3530dfec18a7b4ba87b464b63b062f62d1bdb087121d200e863bd9a27fbf0396e5dea3da5c981aaa35b2098455d16dbfde8106de39ce0e3bd5f8462f3706433a0cb242f70ba88a12aa075f881ae6206c481db396e29b01efa2e5ca3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414d3ecc73a656ecce1da769a56fb9cf3866d57e581300a06082a8648ce3d040303036800306502303a8b21f1bd7e11add0ef58962fd6eb9d7e908d2bcf6655c32ce328a9700a470ef0375912ff2d9994284e2a4f354d335a023100ea75004e3bc43a941291c958469d211372a7889c8ae44c4adb96d4ac8b6b6b49125333add7e4be24fcb50a76d4a5bc10 MBAMInstallerService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\2AD974A775F73CBDBBD8F5AC3A49255FA8FB1F8C MBAMInstallerService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2 MBAMInstallerService.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\8DA7F965EC5EFC37910F1C6E59FDC1CC6A6EDE16\Blob = 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 MBAMInstallerService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F6108407D6F8BB67980CC2E244C2EBAE1CEF63BE MBAMInstallerService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\1C58A3A8518E8759BF075B76B750D4F2DF264FCD MBAMInstallerService.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 MBAMInstallerService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\B51C067CEE2B0C3DF855AB2D92F4FE39D4E70F0E MBAMInstallerService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\0D44DD8C3C8C1A1A58756481E90F2E2AFFB3D26E MBAMInstallerService.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\0D44DD8C3C8C1A1A58756481E90F2E2AFFB3D26E\Blob = 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 MBAMInstallerService.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\2AD974A775F73CBDBBD8F5AC3A49255FA8FB1F8C\Blob = 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 MBAMInstallerService.exe -
NTFS ADS 7 IoCs
description ioc Process File created C:\windows.exe\:SmartScreen:$DATA RedEye.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 819201.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 822805.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 682709.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 383722.crdownload:SmartScreen msedge.exe File created C:\Program Files\Malwarebytes\Anti-Malware\mbuns.exe\:SmartScreen:$DATA MBAMInstallerService.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 852172.crdownload:SmartScreen msedge.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc stream HTTP User-Agent header 245 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) 1 -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2748 msedge.exe 2748 msedge.exe 4696 msedge.exe 4696 msedge.exe 5048 identity_helper.exe 5048 identity_helper.exe 5020 msedge.exe 5020 msedge.exe 3276 msedge.exe 3276 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 3680 msedge.exe 3680 msedge.exe 4200 msedge.exe 4200 msedge.exe 3840 MBSetup.exe 3840 MBSetup.exe 772 MBAMInstallerService.exe 772 MBAMInstallerService.exe 772 MBAMInstallerService.exe 772 MBAMInstallerService.exe 772 MBAMInstallerService.exe 772 MBAMInstallerService.exe 772 MBAMInstallerService.exe 772 MBAMInstallerService.exe 772 MBAMInstallerService.exe 772 MBAMInstallerService.exe 772 MBAMInstallerService.exe 772 MBAMInstallerService.exe 772 MBAMInstallerService.exe 772 MBAMInstallerService.exe 772 MBAMInstallerService.exe 772 MBAMInstallerService.exe 772 MBAMInstallerService.exe 772 MBAMInstallerService.exe 4436 MBAMService.exe 4436 MBAMService.exe 5428 msedge.exe 5428 msedge.exe 5420 RedEye.exe 5420 RedEye.exe 5420 RedEye.exe 5420 RedEye.exe 6972 Malwarebytes.exe 6972 Malwarebytes.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 20 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 3352 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3352 AUDIODG.EXE Token: SeDebugPrivilege 4020 InfinityCrypt.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe Token: SeDebugPrivilege 772 MBAMInstallerService.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of SendNotifyMessage 52 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 6016 firefox.exe 6016 firefox.exe 6016 firefox.exe 6016 firefox.exe 6016 firefox.exe 6016 firefox.exe 6016 firefox.exe 6016 firefox.exe 6016 firefox.exe 6016 firefox.exe 6016 firefox.exe 6016 firefox.exe 6016 firefox.exe 6016 firefox.exe 6016 firefox.exe 6016 firefox.exe 6016 firefox.exe 6016 firefox.exe 6016 firefox.exe 6016 firefox.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3844 Amus.exe 2836 Amus.exe 3840 MBSetup.exe 6016 firefox.exe 6152 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4696 wrote to memory of 264 4696 msedge.exe 86 PID 4696 wrote to memory of 264 4696 msedge.exe 86 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 1184 4696 msedge.exe 88 PID 4696 wrote to memory of 2748 4696 msedge.exe 89 PID 4696 wrote to memory of 2748 4696 msedge.exe 89 PID 4696 wrote to memory of 1484 4696 msedge.exe 90 PID 4696 wrote to memory of 1484 4696 msedge.exe 90 PID 4696 wrote to memory of 1484 4696 msedge.exe 90 PID 4696 wrote to memory of 1484 4696 msedge.exe 90 PID 4696 wrote to memory of 1484 4696 msedge.exe 90 PID 4696 wrote to memory of 1484 4696 msedge.exe 90 PID 4696 wrote to memory of 1484 4696 msedge.exe 90 PID 4696 wrote to memory of 1484 4696 msedge.exe 90 PID 4696 wrote to memory of 1484 4696 msedge.exe 90 PID 4696 wrote to memory of 1484 4696 msedge.exe 90 PID 4696 wrote to memory of 1484 4696 msedge.exe 90 PID 4696 wrote to memory of 1484 4696 msedge.exe 90 PID 4696 wrote to memory of 1484 4696 msedge.exe 90 PID 4696 wrote to memory of 1484 4696 msedge.exe 90 PID 4696 wrote to memory of 1484 4696 msedge.exe 90 PID 4696 wrote to memory of 1484 4696 msedge.exe 90 PID 4696 wrote to memory of 1484 4696 msedge.exe 90 PID 4696 wrote to memory of 1484 4696 msedge.exe 90 PID 4696 wrote to memory of 1484 4696 msedge.exe 90 PID 4696 wrote to memory of 1484 4696 msedge.exe 90 -
System policy modification 1 TTPs 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System RedEye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" RedEye.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer RedEye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RedEye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoControlPanel = "1" RedEye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun = "1" RedEye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" RedEye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDrives = "4" RedEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System RedEye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\WindowsDefenderMAJ = "1" RedEye.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3404
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo2⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb3e7646f8,0x7ffb3e764708,0x7ffb3e7647183⤵PID:264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:23⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2544 /prefetch:33⤵
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:83⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:13⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:13⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:83⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:13⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:13⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:13⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3920 /prefetch:13⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=2768 /prefetch:83⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2764 /prefetch:13⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6228 /prefetch:83⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6068 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Users\Admin\Downloads\Amus.exe"C:\Users\Admin\Downloads\Amus.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:13⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4204 /prefetch:83⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2060 /prefetch:13⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3480 /prefetch:83⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6464 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=904 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3680
-
-
C:\Users\Admin\Downloads\InfinityCrypt.exe"C:\Users\Admin\Downloads\InfinityCrypt.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
-
C:\Users\Admin\Downloads\MyDoom.A.exe"C:\Users\Admin\Downloads\MyDoom.A.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3572
-
-
C:\Users\Admin\Downloads\Amus.exe"C:\Users\Admin\Downloads\Amus.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6072 /prefetch:13⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3748 /prefetch:13⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:13⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:13⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:13⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:13⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2720 /prefetch:13⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6680 /prefetch:13⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6884 /prefetch:13⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:13⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6520 /prefetch:83⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6808 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4200
-
-
C:\Users\Admin\Downloads\MBSetup.exe"C:\Users\Admin\Downloads\MBSetup.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Downloads MZ/PE file
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3840 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /t 1 & "C:\Program Files\Mozilla Firefox\firefox.exe" -install -extension "C:\Users\Admin\AppData\Local\Temp\{242af0bb-db11-4734-b7a0-61cb8a9b20fb}.xpi"4⤵
- System Location Discovery: System Language Discovery
PID:5236 -
C:\Windows\SysWOW64\timeout.exetimeout /t 15⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5296
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -install -extension "C:\Users\Admin\AppData\Local\Temp\{242af0bb-db11-4734-b7a0-61cb8a9b20fb}.xpi"5⤵PID:4700
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -install -extension C:\Users\Admin\AppData\Local\Temp\{242af0bb-db11-4734-b7a0-61cb8a9b20fb}.xpi6⤵
- Checks processor information in registry
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:6016 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2020 -parentBuildID 20240401114208 -prefsHandle 1916 -prefMapHandle 1928 -prefsLen 27412 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {81a33a07-f240-41ac-b586-950f4df30e22} 6016 "\\.\pipe\gecko-crash-server-pipe.6016" gpu7⤵PID:6104
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2480 -parentBuildID 20240401114208 -prefsHandle 2472 -prefMapHandle 2468 -prefsLen 28332 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3b4b9c08-daa7-485a-9c0d-f380cfaf2eef} 6016 "\\.\pipe\gecko-crash-server-pipe.6016" socket7⤵PID:5840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2908 -childID 1 -isForBrowser -prefsHandle 2944 -prefMapHandle 3148 -prefsLen 28473 -prefMapSize 244628 -jsInitHandle 1392 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {058660d7-77a8-48d0-8515-5c3e616469ad} 6016 "\\.\pipe\gecko-crash-server-pipe.6016" tab7⤵PID:5536
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3516 -childID 2 -isForBrowser -prefsHandle 3508 -prefMapHandle 3348 -prefsLen 22725 -prefMapSize 244628 -jsInitHandle 1392 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {099d2111-1d59-45a3-892d-62c1de3cf5ec} 6016 "\\.\pipe\gecko-crash-server-pipe.6016" tab7⤵PID:5576
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3732 -childID 3 -isForBrowser -prefsHandle 3656 -prefMapHandle 3660 -prefsLen 22725 -prefMapSize 244628 -jsInitHandle 1392 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b30102ec-e8fa-4a3c-8273-46e60b19702b} 6016 "\\.\pipe\gecko-crash-server-pipe.6016" tab7⤵PID:5588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3928 -childID 4 -isForBrowser -prefsHandle 3848 -prefMapHandle 3852 -prefsLen 22725 -prefMapSize 244628 -jsInitHandle 1392 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2e079598-4403-4cac-a40c-94a40ab2c71e} 6016 "\\.\pipe\gecko-crash-server-pipe.6016" tab7⤵PID:6056
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4896 /prefetch:83⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3412 /prefetch:83⤵PID:5348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5528 /prefetch:83⤵PID:5452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6984 /prefetch:83⤵PID:5496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4232 /prefetch:83⤵PID:5988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6956 /prefetch:83⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6908 /prefetch:13⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5492 /prefetch:83⤵PID:5776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2016,3230217193373963610,11643511336680024907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5428
-
-
C:\Users\Admin\Downloads\RedEye.exe"C:\Users\Admin\Downloads\RedEye.exe"3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- UAC bypass
- Disables RegEdit via registry modification
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops autorun.inf file
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:5420 -
C:\Windows\SYSTEM32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:5336
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:5640
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:4964
-
-
C:\Windows\SYSTEM32\NetSh.exeNetSh Advfirewall set allprofiles state off4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:5268
-
-
C:\Windows\System32\shutdown.exe"C:\Windows\System32\shutdown.exe" -r -t 00 -f4⤵PID:296
-
-
-
-
C:\Program Files\Malwarebytes\Anti-Malware\Malwarebytes.exe"C:\Program Files\Malwarebytes\Anti-Malware\Malwarebytes.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6872 -
C:\Program Files\Malwarebytes\Anti-Malware\Malwarebytes.exe"C:\Program Files\Malwarebytes\Anti-Malware\Malwarebytes.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:6972
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3216
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f8 0x49c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3352
-
C:\Program Files\Malwarebytes\Anti-Malware\MBAMInstallerService.exe"C:\Program Files\Malwarebytes\Anti-Malware\MBAMInstallerService.exe"1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Modifies system certificate store
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:772 -
C:\Program Files\Malwarebytes\Anti-Malware\MBVpnTunnelService.exe"C:\Program Files\Malwarebytes\Anti-Malware\MBVpnTunnelService.exe" /installmbtun2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
PID:3960
-
-
C:\Program Files\Malwarebytes\Anti-Malware\MBAMService.exe"C:\Program Files\Malwarebytes\Anti-Malware\MBAMService.exe" /Service /Protected2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Modifies registry class
PID:3252
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:1872 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "9" "C:\Program Files\Malwarebytes\Anti-Malware\mbtun\mbtun.inf" "9" "4ba9030c7" "000000000000013C" "Service-0x0-3e7$\Default" "0000000000000154" "208" "C:\Program Files\Malwarebytes\Anti-Malware\mbtun"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:3264
-
-
C:\Program Files\Malwarebytes\Anti-Malware\MBAMService.exe"C:\Program Files\Malwarebytes\Anti-Malware\MBAMService.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Checks processor information in registry
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:5448
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa392f055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:6152
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
3Windows Service
3Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
3Windows Service
3Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
5Disable or Modify System Firewall
1Disable or Modify Tools
3Safe Mode Boot
1Indicator Removal
2File Deletion
2Modify Registry
9Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
2Query Registry
8System Information Discovery
8System Location Discovery
1System Language Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD58abff1fbf08d70c1681a9b20384dbbf9
SHA1c9762e121e4f8a7ad931eee58ee60c8e9fc3ecb6
SHA2569ceb410494b95397ec1f8fa505d071672bf61f81cc596b8eccd167a77893c658
SHA51237998e0aee93ff47fe5b1636fce755966debe417a790e1aebd7674c86c1583feef04648a7bc79e4dedaabb731051f4f803932ac49ea0be05776c0f4d218b076f
-
Filesize
107KB
MD583d4fba999eb8b34047c38fabef60243
SHA125731b57e9968282610f337bc6d769aa26af4938
SHA2566903e60784b9fa5d8b417f93f19665c59946a4de099bd1011ab36271b267261c
SHA51247faab5fff3e3e2d2aea0a425444aa2e215f1d5bf97edee2a3bb773468e1092919036bcd5002357594b62519bf3a8980749d8d0f6402de0e73c2125d26e78f1e
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\icudtl.dat.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize16B
MD5f22f6ff81314b7ce60f87a5b43818f18
SHA1e9b2c106bd98d9dcb67768484f142c772ff1e21a
SHA256b05b27763a120e309b88a670810655ea2e4504dee37003adc4f9abd3f18c1698
SHA512cb5322b63476650989a25cec357cea8ef383213943939a2b805dd21ad2ceda51f8882fc7546d0ea607abc8e5e2c009ecbf8913151499fd471f84b7b301a5c1f1
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_remove_18.svg.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize720B
MD58c0940f7e2dbeb9c131828278993133f
SHA1dea279c453113880b217f87ee4589fbadf1029d9
SHA256636580b4fc868ca59eeb17fc2d9879bce09f5fc95ac2d96d01409d02acf5444e
SHA5128a947ae781fdd9ddfddd9daafd9dabd868a9195e0dcfd87de18cf62f5abad463c4dd431e7877c138b1bd9a05579ae1b7454d87454a707ed53bfdb3562ab80238
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\example_icons.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize688B
MD585855cc634dbbe8eaa2d0b9bb625cffa
SHA1da0aaff55164b6815266194ae51d8bc4e64945e0
SHA256b72ae3c360e2e0001add4974ff445ba266699cfc45f3f4c8d6b840bf46ea1d63
SHA512a32763242641b0a11a24debddacb72c82b5637c2fed49ad0f7425f4d05a47912767ddd5ca02cd14fa17d3be70d960065df5ba366107e5bcb89276837f82ae417
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\example_icons2x.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize1KB
MD51779c0bbd1d56031bdb527d6cb0b11be
SHA11bed60d7a232cad8e3301c646c572ebcfe394523
SHA2567f11d1ca36dfe9641d0a49170619f81280acf7e2df314df812bc53ea2bdd18de
SHA512064af8544b654336a11018e7e50f47a312bc2b343d677a72844ca86b963ff553d79de70581e9a30c597594a65c86f6a1e4b345f482ef7efa0ad562a4d70e2300
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\rhp_world_icon.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize448B
MD561e7b83bb0cc41d4a6e2fb09c0e7b785
SHA14563bb653225f32ff88b2c6b20983f23a8f7e58d
SHA2568045219241a9db280c7c67280686ef52d376d5945bc5525180bc9e7a26969fb7
SHA512267430bd53b3c6a936d6bf83a3824df2448a388364e3abfd42161fcb488869fcb4316681819e11cd67991e71613129623ed70edadbb37e8eb88abadd60fb0e8c
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\rhp_world_icon_2x.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize624B
MD521eb84973523f8c12dbb7011b56e62ee
SHA152e277fa287a0166b84bc1a52af3a00df2a87ebc
SHA256ac41ac62ccee83fa4b16d8e40504f9992a8fa5c21df453355c232c7634bd9e7a
SHA5123e6c4cc0eb3399806bd0d3ed6639f067d522123f840809413a11ff5437c15cdce9466a26db7aec88d3337cca4fb9007e6d06a2da407bf75c039d034c4e14628c
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\rhp_world_icon_hover.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize400B
MD5a8a6ed3c621edd47c2c9b5a2e411d38e
SHA185fda6d2d1c13fc8cdcdf2be952a813686679b50
SHA256d491c23fe48af7a835d16833617d3145f9244cfc76601d3c44b9db1e5386b9d5
SHA5122d0859850cb19442eff18954b94ca9e6c8210c06c29421728123622a316c0a23ed00928d971aa2a90d189966dc6eaaa469a6853a233a9d2799a8119503296520
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\rhp_world_icon_hover_2x.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize560B
MD56df48c66480365d6ff558f23ac4782bd
SHA1f3c1108f1812b64c5a10783f309f7d9891552f70
SHA25668e445dfdb80ab464c6fb9c01b48af23f82120291e50bad2e609f7f435951d33
SHA512e573508ed79f21d1b5a5335ccdd66d152204433456f359955e9d80e936e201fe8ecb11549e087612ac8279c418790c920712c782789649fc287b40c23c4fc86a
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\dark\rhp_world_icon.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize400B
MD55a1ebe2da404210f47bb540720fd720c
SHA153884f25cea923edbbd61fed8b964372cfd10c67
SHA256927ca20cf6e26e1f4fa78c64bfbec8518c496d47aff894cf0a38e8e38c3f2331
SHA512e3b1f8e6e69bfccef392585d4681c69414b56be5e8be19a037c9a1faef100b2b702a6fc3a608b0066a598ef17b3d348d372f93c96ad785fbe1d1fa067e45fc03
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\dark\rhp_world_icon_2x.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize560B
MD57a156742a50e9c1e9de4f0bc2d2815b7
SHA173d0d2e00843a4d04ea66fb6de9255652dbbdd4c
SHA25659c33604edd5f3d1d18276c10b7b835e4eb98ab1c0de5df5c90f8db30f75f836
SHA51259ab9309a72a110babeb2afd00bc39ef12656b72138b2589306b4138a68f4df94a4b1dbceecd977575b6465091920a0e92905258888db5346e2e87615fbabdea
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\dark\rhp_world_icon_hover.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize400B
MD58ebee57f4e0731695dc89f79022c79e5
SHA1bf109077439f4ec6d4f1580f9d11e86f9a9479d7
SHA25669f1edaa52256d93dc0f88df8c60dee4a4546ad394460d3e12a76ecb594fddb9
SHA51218aa76810f63c02ce92f9aca7f2868ce4026ed5a396322b2ce10b0f62b0985b3e99a81abd9cd219e95f39de688f6cdc38769bae5c9c6264cebf473285c0bf1c4
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\dark\rhp_world_icon_hover_2x.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize560B
MD5b0d2b40e1d39740fb84a4fc5c1bdcf3e
SHA1e990520dd8b4612c11b047d130f5203793ebc381
SHA2560ed19f31250c7e54312cc1e94bb8525231077bf4ab63c43ccb4488bc79a5bdc5
SHA512a40d7af95677c31e2d89a47c596d0097e88959371e22e4ba51682026863bb7c6b25fa152ce240b46862155ebb6b0ad8ce8740f22b71a1987864b8e39b5a59997
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\icons.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize7KB
MD5cff9a28c1674841341e2774ab26e9941
SHA10cf95fd08a70e6416f753873d7fc3d85bdc62f98
SHA25638f0ae66cb6863f715e0b551e655d33a3f3eaf9faf37cdf47033c225a7bc56c1
SHA5128a525e79d516f1aaf2a4e2c23cbdcc7e478dd253fb89c89203bd56d2b00ff1185e1d3c5203a04353906c1cd8d86214dcc708afbeeaa68c735d4a2df53e8f3803
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\icons_ie8.gif.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize7KB
MD53d466b275e003796984e6124d83cb372
SHA1fb6910d8738d7ef8495da7665a23e3c0600ed0e9
SHA256507509fd64106acdd3cadc1512c39b0d475e9084d3a9f4b1c00cb0f3ef121d76
SHA512fb780709cbece377d18f9162bd41cd9301230cdbd958e25cb3bd79e747f34980b55a1bceb292b6618666358fd52be6136cb1707015286432a9797157a0353cfd
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\icons_retina.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize15KB
MD5fc390edb211aa55205eea03f03149711
SHA13a4e3a2026ec6f7a462ad7753569d175a1dde746
SHA25665dc4537597e91f484aba38dc105d7555fa0f060e1b101da92adc0292d3e2c58
SHA5125d5c4306b4cb94dd2779217e65f28477d94e240e443404467af58963d8b0026e3592d1f6d76bf2b1a8af73aeb4383a39a86db071cb1cab8eafe713811671afc4
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\new_icons.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize8KB
MD525dbd16a72551bc13d4eebeb583ceb16
SHA1ad47a4e737b4c5403a35d0b0ac31984829fe290f
SHA2569a0d296ad7fac4ea30933ce61f9e30127e29c4ad4640677558608008903f6e6a
SHA5124cf1fbd77afb3b2f75591ad4547f645db85abddd43842191c3ef0375aae5280c4a50ad68b3896f6feca1125078a402b13e053612b5c7cb5f84eece7813a9ddb6
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\new_icons_retina.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize17KB
MD5de4753ec404ca89ad4f70856d7926c29
SHA1007bb266eeff3e0ebc648f6972f565111cc4bcb6
SHA256ec83dfdbce5dc09048f02ded591c17e4d21e07cd38534acbd1e910662e846834
SHA5124c946788dd126da6e9623a4c9c37361d6fbb93f9c830f1fece9b5f63a6b9b0d695e25d7794d201c7ccc7a34100903273b2afa0a8d2874328669174ad0cce8774
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\bg_pattern_RHP.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize192B
MD5faa4390182a246353337196697721e67
SHA1aadf454b6531e7d9a8b9387d45d59185892c4658
SHA256d3dd8a68990de39a638e09ecb80f2fb6bc1f7afcf83fecff99fd2a28d60d4887
SHA5126e4e8b092ee129400e4b48a2bee369488cb63c70d2b12660f03535594cf05452ec5a3c487c0c07aaaa90f1a20ac203e62f2f82cf4949f39c3fdba1b8e2072885
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\bg_patterns_header.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize704B
MD595fa40750c5dc0a4abd06df53dc44e7c
SHA1722262b7472315f92c7bd546775ee4f41706073a
SHA256c0e9db326de851314f82f184d508d0e8a34a252fa0fe7f89dac49c394090c53d
SHA5124a53acf9edcda887fdc8fd8498b2b0d6a1ea70e3fcfc047b14723ad7422ef9f68679915133e632092ae226994a4960aedcd2dd562dddf3137b484019c80dbdfe
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\illustrations.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize8KB
MD53282d01ba2ab05dc06c5c33890da96a8
SHA1faf1e6b17a9765c964ea0170f6cc394b1b8800dd
SHA256e8dc8176f06b4093a3b00ebb77eb314a8791143e6bada04b623352edc5343b0b
SHA512a8e1df54d40de8ce6d0d3af34bc1ec795204e1149623fe316cb0ade9e444ab3a131e5d6705647260b6b47a7ae2ae55a24f39bd3f00e8552f7100ea3c35feddf1
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\illustrations_retina.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize19KB
MD55d853fb66b29a74b111f7936f4f0a37a
SHA1bdc874a52f0b850d0a79a9d63c239e3c751afafa
SHA256d32a505b1e0b70d31fcb564b51c4301e4fb8a27f3413be3a348f534a0d08369f
SHA512fd8ae0ebc23b32abdc32068c47a1431d031d775016c195c0220cb40da8caaee20ca4d7eae8a8f4f37b8e8af8bb82d04419b5f5d34619203b5adcf159499f049e
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\en-gb\ui-strings.js.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize832B
MD5d205e85f2db31fff19e53b334620e1fe
SHA1aefd835a356385117a6acd255d9da1f569d01cfa
SHA256591a173d398295f66c7edc649849dda23fb947c29bedb6ec020694b57ab16675
SHA512a35261f3eeb3f4f8ae32ba3f4b7493d0e7ff49bb3437d950c1ec4a62890becde9d4eb3a7c57c712b5cf75e101625b58c73a7beffea1abcdd2683bc012aafe054
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ui-strings.js.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize1KB
MD5de4d82e67095078e7e242fa2e9b64495
SHA1eecf02f63468d2e1a7ea67779fc5cba69eaeacd3
SHA25683249bbedbf34cb5a044f05169a76c50951b96a54fc7319ff05b266fd4e458dd
SHA512d861d1819fbde6eb7e9db618b619ca978c30343859cb91c9e6c00718a47af86dea8536b1d0b5ca4bd395baa21af02bd953abad1d034a32c31102060e203ec4da
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ui-strings.js.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize1KB
MD5c46358593fb78b7feed27b6b948cded7
SHA18c53a120dcd6d9cecc74179f910d15956dc28dd4
SHA2568df22bac9ca3953f45b09347a0fbc7c839e7f4d0b2bb1c4587b235b53157f61c
SHA5127e92940b3c5c1ed49fbbfc28c2749c86d327918e092c2ff170c7e9751eea155d50612116652bd0654dece22def4ba104e4615cdc769dbb0c4929c26ba31f3454
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\css\main.css.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize816B
MD54c8c98ba9714269d25df6bc667de335c
SHA1944582f30e43f06fc28a0129530fb67c0f94dc33
SHA25635dc1e78770bfcc9c7204fea2a2608babb3fdd1b616cdb4658d54f86f004442a
SHA5128662429b71decb18409df3da813ec129975d9a66e15519f2163872f349b72a0fdabb42024c35d8c4cacce8c8b0b14574d9242980f7432e4e4e2914b9557c8a66
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\bun.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize2KB
MD55540c7be25d810bbb87bd0646c77fb47
SHA1712e5569c34d2afe7d1f99ff5fc33b3095abfefe
SHA2568cd4b6703b167ff11ed74be28d18858880df2265c249a2408c7b07e42b036586
SHA5126c63654ec24aa2b461c7c0ecf963c8f57ea5853e48f547b848d26ceb2b265c2fa79d0ef21c848c191bc16d99d495605d3195ead3ce69197556df1dc80bcfcc6e
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\cstm_brand_preview.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize2KB
MD55bc699ee861c9174aa99083f5b28a764
SHA1815063ef24a86c123385dfb91ab9487554359d7f
SHA256b1dccb8c8843a8e871b3af65cb4739caee8cbe6a649cb4418a475d0ca0cc0d9b
SHA512508c34de53e0f185d63d3bd4f6d0e67e76b4e08d88b2d7a927d6c00cc8d48442a9c051f7bceb89316a9f5418cc6697d6834f3acd44c2218f38289255d2f9e872
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\cstm_brand_preview2x.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize4KB
MD54b1e6de45edd1fa8213e8b87bbf87909
SHA14b3b5c71c29cdf996c73f23372ebad5c53dae9af
SHA256851f66d0630a583c7abb6b26b15c53c8709bcc74521f147c2ac79eb891708c35
SHA5128ee8f819775d5f704ba030fcb7200838d5887cf61dc436a741302f08d0a3b4c2cf224035a87a083291201a8d7934f6af8a58d7db290626bb35a2d24853e3da76
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\dd_arrow_small.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize304B
MD536c87c68a0ae3fa36acafb261272397e
SHA12be569d597fc4a4a219500ae6333a75b68dfb2b8
SHA25624d920bc4ecd3e5a6cfdc28b18efe2dbc398177e390cd528bce0319ac8eeb4c2
SHA5126642985f68bcae2d103d7f153a23706e5deb800b235d59c31818fa834867a90ec3749fb6281af01839ca841f4430c6dcb3a3ce9cd105c261ef5f6c9698cd59c4
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\dd_arrow_small2x.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize400B
MD5c008cf51eaedf0f37809357ae70fb70a
SHA153d664c687aab0cbf1dcf27ccc2c4e6509312411
SHA2567327bc3c60221ba6cc431ef85650e8d0352fed0da0c3c7147fb2c9be5471b945
SHA5122a5db2ee9807972f3804c87d53a6cad808e45cd0d32d687d930d09008884514c627f5fd3b45e51623cd478dae3e5d64ed1b8188ee646e3ea87f2565f2a070a12
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\nub.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize1008B
MD583c46f081a2f14223655eba78908f386
SHA108d2bde49ddbdb859db6e442730541c73f6f2285
SHA25621afb50827ea3e5fbf85242fb91170b69f6e4f0fdc4b5060f13a27a063f122ff
SHA5129264c0a04eac1aa5549e709fe94e523459671f3fe978422333526d0425f10d9cb71bf6148cecb19a9833f00b5062fe9439c6491264b4a42cd6a6d6d53737d54a
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\share_icons.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize1KB
MD53d4d87a0f6870dfa6674231ffc1ea475
SHA1b3912dfa4a31aa48058474461e908f6e836425dd
SHA25624e8fc75490235923f1cf51c874409364f53c5955c951f685c3c37b54249e496
SHA51229bf3c034636a7019b052334cfd8ea64b2969bb02554c6c837873a7c4ae242c78c0e921044b19507531ff28295ec838bc42fc7c1b5f4146dedea1a2abf7a6c85
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\share_icons2x.png.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize2KB
MD5cfa552a97c4d955104b1062be60aafc2
SHA1f9653d8b151a056a9684ecfd25c15a874b97374b
SHA2569908946484c240cbd91f68c9fa5ae33db9fc7d61c67032422561b9b33cb1b978
SHA512b2cce802047f4ff04085a8907a20d95706ee663a4c4c087425bbb18aa3a23053c62ef25bf28892841ea2f070a92bac85bc02efaafad91157ff9fa696d5e65d85
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\nl-nl\ui-strings.js.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize848B
MD503da0445a61286dcdeefc9037e8b2f6e
SHA18ed16b60e8b3b4f1852b2b44332ea5272edf4dca
SHA25651070c54950f331d5b055cdd8796a13c1e39860fc244251461b69dd5601cbd60
SHA512cb55c1541bb87c193179ee779f593f1c169d72e8f1ab12943643f2494f7ae8c23ac62d185568745262da0b142f88ee4052a81fa48f2c40f0f67f9d82ef5b360c
-
C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\DisplayLanguageNames.en_US_POSIX.txt.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize32KB
MD527250f6f1ea6a8588b6cfca43c914a6e
SHA1f4d1f724d20fc2411687ae2bfdc2c294393c9dbc
SHA2564dc9283e231c5e599510dfd1c014fb7fa79d9832b32c86e75891359fa896c05a
SHA512f158daccf8ee15be0c8f53ffd80fbdd6276848ad304e7c7af7ae0726a47d105c9ec20da2e6f3ba81b486a17d34a42be18106e678aa89d9b5def4804cd9ddd692
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\identity_proxy\win10\identity_helper.Sparse.Beta.msix.DATA.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize53KB
MD57b7b430b7322c8ed18646247021f614d
SHA181ef4ca6ada6fdcb5be6aefa9389f7dc84d92dfb
SHA256c9db3aa6d74bff5e855c7eca05cc378efcaf0428110a8b4be4ce4f0247bc2f09
SHA512ac34e262a79497f7b25e23e46b261e78978cb31dd94c12ef85db17f911afd678c9b3ab1fa5ee1ac1922fc98f0dc1b7ee489d0698150b3a07fc21a012c96a8c95
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\identity_proxy\win10\identity_helper.Sparse.Canary.msix.DATA.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize53KB
MD577146b52a008aa949fbd72ec07126202
SHA1449a8851435d842bc835169f2ab844e4ee527159
SHA25648c26588a53ff2d0011d208b45ca19a9300f417419116f9178ce97d1ef81bea5
SHA5125c4532574b393642f1e178aa95688f03597c5e19bcad86b32240eee8c99263e7638710328977144c212f0b614cd1848c9e45b7a63e269cbc712f5037e3a6f354
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\identity_proxy\win10\identity_helper.Sparse.Dev.msix.DATA.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize52KB
MD5a1b6a39f5c1b35d0a9d3ac3cb18aa9da
SHA1a8e983741a6ac25a1e3591f365d569aa6527c596
SHA256b15a2611518e208dac2ec754651ad644975158e61cc1fb3a1dd57334bece5469
SHA5128f7f19d4d97b8fbcef0a88ba58f5532d1051f4b9534b6a71fdf6a6a353dfa9486f3700f288ba753d24ba004701609c47a808a0b3ad28908aa53eff6571d3596c
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\identity_proxy\win10\identity_helper.Sparse.Internal.msix.E61696229AA7C2AF620482A380E6BD94B29A6AA8E114B432CB88A925AC4D0180
Filesize56KB
MD54f3cc2afae390a4f0f7dc54ce96f84a7
SHA116b3dd60df4046521d232efca6aab8b494d7de84
SHA2563c8e1aad89e8984207e9cdf8c0132a23dbcef30132759526d023e4b3885a9990
SHA5127266325a1268c6b845f56eb151702a97e1eb29bcff30046c56664bb8c376944297282c38e2732e4785b6c1eff83bff9620a7f47e6af60d4cc6cc8fdfcd988bb1
-
Filesize
8.7MB
MD53084e61d7ec183685908bc90aefa32c6
SHA1302357c243a0d8db5d51fb0b995de85a5d12b278
SHA256486126c0d68a371e90f7c135ec46510dd53c1164f644c72be57716143af53eb6
SHA5127ef31dc0e2ad9ccbc936d0931462db2fdd17b88d06c6bd162c9f444bf7c1a77f5ef5afe18128398418b5d7447d049ab18eb97b0a3d6cf46ccc2393e0294d8c33
-
Filesize
2.7MB
MD5e04e61828c9fffcee59cd90ef155c90f
SHA17a97b65f11d2b3f30d8e2dde4c44bdf16f3d3b24
SHA25605d4d87f43646f7ca2e50520d8850e8808748a508c2761838d5fb92d66d6ce35
SHA51204792b998628cde88bc2601534678e55b2d6fde290496e5af08a2955a992ca3bb767bd025dca4373abc55141de8d270f62f628e51c887de54035bbee10379ce9
-
Filesize
291KB
MD574adfb1f3492af639732d896b84eb639
SHA1f22c35601ccfd35953760ba6c0d32409bdd941ce
SHA256e1a9fdcfaec9dd8e70054d706ff61325d427ce84fae71984036ea7d8e531d9ae
SHA51237fb397fa50a3396bdb7872e1279312b6c122a3dc6588e07bcee735a864f0ba93b687997fdc362c2ebfaef225c77b08d2c3a3168f5c17aa6ef79a636261d56fb
-
Filesize
621B
MD5ef47b3bf56713bf2bc1d22abadfa75a2
SHA147b3e276aafe3738e03addf3feecb770a3e414e6
SHA25653b0556dfa9329307ef0afbbef5eb5c3757c8b963f1701e3f7205802eb9070d3
SHA512bdc5a022310d576043b0386fe63211fbe57c49c0d4f3c66b10db4b4ada599441194a34eca1c55ca55ed111f79a4b8c4211a776adf08cacd7fb884b922cb7c134
-
Filesize
654B
MD57b11ad613ce07f827952b42b85d76087
SHA1e1c476a28c9317d0310c8132685e76df111db567
SHA2566986eac9fdacef074a292d5c2d6c59a48763f4b0b7b4b9936c74bfde48dc75d5
SHA51273c599f150c3e0cd2f66031db4c721c5a513c86fbe80c4f46cb32c9dc5d1385723a6e4ab434ede928bd6353b2ecbe86bfbdbaf2164b0101765ee28accafe0303
-
Filesize
8B
MD544f850482fd540c6f723898a992cb593
SHA1937e77cf6f6c2a3d803588e9523a975402a18d94
SHA25699e6170cabc08fe64c3ed5e5b0f60dd016a31489fe512960ae1a2c5c8b004d48
SHA5125602ae0343eb9a8deb9a77f4fcff76f0d9320fe28d0fdeb9be78c5f4f1d62985c2e61ec3405c8fe3bb02e967eb3e76fdaba17eccdfec5e792a7a3948bded13d2
-
Filesize
2.2MB
MD5b39ba8b6310037ba2384ff6a46c282f1
SHA1d3a136aab0d951f65b579d22334f4dabbebdb4a4
SHA2563ecbcb6c57af4456111f5f104b8fb8a317cdb0f16e98412249f7a2d62bca584d
SHA512a8b98f47c30503029f2dc80398dacd5f8fc07db562d04c56b8c7902bebf11517223350c41850b81aca770ebc9e68fc365921bd6cce34b57b2c945f1c51b538b7
-
Filesize
2.8MB
MD52bbf63f1dab335f5caf431dbd4f38494
SHA190f1d818ac8a4881bf770c1ff474f35cdaa4fcd0
SHA256f21a980316bd4c57c70e00840ab76d9ad412092d7d2d6a2cff4f1311f7c05364
SHA512ebb9834323329dc01ba2c87e5fad1083a4cb86f5ed761cb63299ac5336a9843a1aadd42fbed706797c2295117af1c00f96806422338352653c8e0255fecc2fd5
-
Filesize
1KB
MD55d1917024b228efbeab3c696e663873e
SHA1cec5e88c2481d323ec366c18024d61a117f01b21
SHA2564a350fc20834a579c5a58352b7a3aa02a454abbbd9eecd3cd6d2a14864a49cd8
SHA51214b345f03284b8c1d97219e3dd1a3910c1e453f93f51753f417e643f50922e55c0e23aab1d437300e6c196c7017d7b7538de4850df74b3599e90f3941b40ab4a
-
Filesize
7B
MD54047530ecbc0170039e76fe1657bdb01
SHA132db7d5e662ebccdd1d71de285f907e3a1c68ac5
SHA25682254025d1b98d60044d3aeb7c56eed7c61c07c3e30534d6e05dab9d6c326750
SHA5128f002af3f4ed2b3dfb4ed8273318d160152da50ee4842c9f5d9915f50a3e643952494699c4258e6af993dc6e1695d0dc3db6d23f4d93c26b0bc6a20f4b4f336e
-
Filesize
113KB
MD52ccb84bed084f27ca22bdd1e170a6851
SHA116608b35c136813bb565fe9c916cb7b01f0b20af
SHA256a538caf4ac94708ddb4240d38b1b99914ca3e82283f0d8a2290be28fc05eaccb
SHA5120fd66d241bdebd0052f4972e85b42639e3c5a40affe23170b84bc4068dff8e84446898a77ebf7cc0bef97454abb788faccce508a68bc5e717980ef26d8436986
-
Filesize
9B
MD59e5d32c87a4c96692e1dba76841e5097
SHA19a8e4fe3fb581a32b48b6f7ba5251bc3bb026548
SHA2564ed31aadd5843b7227a2b79e3b7385d0ce951e1d71377eb668d0686ed0b50c3d
SHA512d8242d52ca08bdaf207662ac2e24dc507e1a92d687d163426c085fbb841f159ce8e5ec04087909d94c69f04789b28acdd2c4e68829e995bedc87ac90960de9e4
-
Filesize
47B
MD5c89d72d98bea4c1653c9b47675ca3290
SHA119e70c16a7c4530a965a554e727fac18a543efcf
SHA25678b5367b02d3b9b0c711f0eb86f0499c943809b376a4bd3e84f5a3adcd4008f1
SHA5126320f699c248cc3b468cd50e5ca5e9c3bd0b9080a03049ab0b741ac800346d05a8b9251ca51a1b6e990b0143dfa109cedac6c099ae2b9f85932f807dd5098818
-
Filesize
1KB
MD5a34774a4a3099270e7c02e46817d8248
SHA10f8cbf0085b758573b4470169a34520ebd2bbc62
SHA256d694047c8ef94291f0d69937e5dbdd39bac6380eac3cfb1d2530d75c3fd23dcd
SHA5123d22e539816d4fb62be1c12506293ae41a68a370770734fffcc358cdb7617ab6b75b62a359c84a8727ece2f9596312af30b6918c2d33cf39af8278c3a7589e5d
-
Filesize
47KB
MD593cc1bc4867bcc6088b31d9efa59c9c7
SHA117630ff81a6377aeea3aeec13a1a581df97df49f
SHA2562cbe90ef525f4d55f1a25b073d2ac774ad2e64fea4ce3a21a203e733bff794ba
SHA51287804a1de723519f5c1403524fcd1e684229c4df091a7acfbc903af0fe5591b0cd9358708a95da5c3fbea11a182534511ae54fb255d777969402d12a55821fc5
-
Filesize
66KB
MD58838a8966ba17f5fd6e60e5be27db5b8
SHA17766d030b7b9401d1ce2df5c22f6e9bc1eaf4d7e
SHA256f86c9c5d63305a5ddd65f7f5b1ea97685a870a49815027b67243360c289a36d7
SHA51216673ec58816d7e1efdf59486e2c243f9003cc7c6ca42dc94c53f6bb3620f42daf73585319b70bb49d495e1261fcdcc9c231b53c7a047f5d170a62e87901eaad
-
Filesize
66KB
MD52f877cc17303ca07b4d69c2bb81e3604
SHA1c1cd5a56c0befa6037cc7028f8fe09c1736be28a
SHA25673950e26c613f94bc8675fad0a3129a72b3a14850ee2c5501c03ec762b839556
SHA5126318796cd4640bf3ca79ea55597ca9192eb86c110b41de3d0c2b2a51117f6679888ea8ed633cc38afcbecf697264f0fa6c60affd7e84dc1ee6f5baa4bf8b742e
-
Filesize
795B
MD52c42f0a8c1c68a5a99fa203bd9b97620
SHA11d53f4c0b810a74fb5012a1fb146e065b0fc0e27
SHA256357e4264e42060e3fa80b17817a76471827f6808a1e64c4a7adef41d796bbce4
SHA51252f2aae571f0d73a11ff872c8c3bb5086ac28255b0e733d544cd9e276a66c882093dd3fe4b2bd43124b551ecddea060e770624f6c4ecc0e2bc0aa0117f6ad268
-
Filesize
847B
MD52f6b3ebd506015bc6fcb96e8074811a6
SHA118f75a8e00c42bdd8f1691aa7b978ad69cf0e528
SHA2568e3315b08e18432e9605e6e4288c21cbacff0183af2ded359dab5a94f3212a53
SHA512a563394133cba00ae1f35978fe537d14fffafcc55e8517ea51b9d6b36d25c84b0e023b5f3b647684146a687ebb7d8ff63be45865f6e2e519fdc18529f0856fcc
-
Filesize
846B
MD5d634a1ee86a850c7e67cd28a47067879
SHA102c2e456bcca8a732ccd0b315035be49a94087ad
SHA256190608a2128197754fb914497f768f7dbdb22a4502a71b747157fc62987970c9
SHA512396003cba8065db09ca964cd8a7c6b2b88e39aff5e0febeb43d0d26d259f719afe2d279a693aec9f96b31564a16f7780f0681c0c04744eaa7f322c7659095b52
-
Filesize
827B
MD5b14872d2db0a42101ef12abe3bcb4aab
SHA1bae89bb69075cb5156c4d25137bac4bcc402cb3e
SHA256b3ba91b445cea10d93fbc4f5db5c99a201624b4febc5f51ee53e1b55125a8ace
SHA5129606595d0fc68ac620bf6f4e34a1a015eb9098d0cda41f817615011c57d0ac24410a775c399ddfa9deb20b12eab20fee9b70dac641c0502030889b51be0aeb87
-
Filesize
11KB
MD50829bf574b0ddf308437b487affd6888
SHA1ad656b06b4fe8f069bb60de5858f8ac088760e30
SHA256c913ea20a184602d85e5230ec305e2522bfa99ae619ff7948ae87cd08fcbd68a
SHA512cfa28ee6bfda5ffedddbe4f751344c49e30ebee94f75c7a38cf4b03ddbe548a3210990ae524106515f22e34b57b5fc85414213cfe985adb4350baf89b1726f6b
-
Filesize
11KB
MD5f34034a368740accb0900dd28389fcb5
SHA1b3cffbdadfdcb3335ac7979a9ded23bec07bca57
SHA256ec75f486f64858056eaf8f87ea257c623357ec59e8910030f9475bdbe2380964
SHA512fb261bb8b821fe96d248d250cbb38eebf3b99b9638116b72ad12eadbdf9acb0234b9ce17b83c9c7eb85e49cdedfa6f21a041da2133caf78cc74704f087cf6051
-
Filesize
1KB
MD59ae65c136f014328dda6782dbdd7fe97
SHA1be1b4a536897c9654029db9f0882a333d61a6cd4
SHA2566783be23ea3a4747181158b32cbd6d0c8260501588f9d8d974f544f377af5e5b
SHA5128d69edc777c21f18d20ab5596d3b24f44790e59f62e68c6765a41a4ac014e60d7ddba2da89817fd09c35936ff505cc275d07f3a2c89c8e54686e04ffb43f699c
-
Filesize
2KB
MD594613ccb9f248551d589af81a364a9b2
SHA168c5f1f51404d91f91111f7325b64d5c354350d7
SHA25667d40d993214b0dadaa497668faa625d248da78bc61211f61a7e353106a6c48d
SHA5123f4a2b68823599fca9aeb6bd241c315f9e4d7b0008a17f182defa43b0ac76e87da4c1c58989d3c4ff72faf61909558b028d1ace852c132fbb938e4b4a71291f8
-
Filesize
814B
MD5153cdd2563aedeead6984d2b0159416c
SHA1af65f6757eba81f3c7e66ae3825db99d11578a96
SHA2561e2a9f2f7236ef68e722349ef33d63fc861776c12f168ba8107631f1dd5cd59e
SHA5126715657c28b269fd8554217469706cbf44aafdd7a5d693a158e0a7bd6444f4f075de2e57a733957c4143cf07e935291ce3c79803fd589dd0703f1930c68ee643
-
Filesize
1KB
MD543e07262b255a0d80e0541825147ce91
SHA1f900f64a23ce85907d95138dd31ea9b393ab2d90
SHA256b7258856d2154bc41e215fbcd3f9bdac2a3d036bf3d05f465265bdea413fad26
SHA512e3bf4c0c3edc13680e8de04954354f89cb2f40d046319e760034fc7c3e5a24be79d8b5c263ee5e3af218305f71da9307cb63d53835c351b046e80e4dca5d4d1b
-
Filesize
1KB
MD5275acbf7f1e9893f509c336fc6ce6b2c
SHA1ad3c4d631e6dfaeaaeec7e424fe3c2860a75af9d
SHA2568345420acec5a40261e4b595020a92dbb232b336e5b7eff89e087dabdd6730b7
SHA51217d91e6c1696bc9d54ffcbcc187e7eddb0afcaa78015569ac00834c8950246c016829db5c55db1f3bf362705386bc22199cd7067a78a3d471c7726e86b3a22bd
-
Filesize
2KB
MD56b868227d8932a6cbbab2518d7bcfd12
SHA1718f5ce6ccfc9989940f5bc522a4559412caaad0
SHA256fe38af60a10a00610a225ae2c3c36a1abb686a493c959627e5c4bb57f10663a6
SHA512b1a7abf781233638ceb03ede34fd4d008d89853752fee6fba4221ca5dbb798452b4354d56bd5d4fba830471cef138c252963d19e080e2046087ae521af08965b
-
Filesize
4KB
MD5602fd4610c64446f3a54826a56bdf96c
SHA11205a682b85265206de4056c92afa91c7ca74580
SHA256b3f9925048c80202d386631848505335b0b6452f0b10f6e1611608533b26cfc7
SHA5127bddd31bf9290a830350220078777b11f31e67f31318fb1d46c3a2fb8e802763b88980774258098d7004da2e7568b775db16ba35fafb800b00f7965963ceabf6
-
Filesize
11KB
MD58112f4765dfd183ce791e23f76e06a92
SHA1a0432b3be8ef848f498aca45950d0cc547fd5fbf
SHA256ebc57fa893d4f48e1d0db2b2dd20989312c5e1afcb2364402f81bb0e5b9faba8
SHA512ffd19a808605aee8f4ace439972e3e04a104f4c00726f790725db6e8ae3df32cb89fa5e4a97346cb277b0bd055fd606f7ba97e0a76ab2fa16b4e5bb7a5301acd
-
Filesize
1KB
MD552364fb8d3b4a1e17886ce8d6c66da6b
SHA149636011653d59507ff94a8943f058a6e6f7db9b
SHA2567a37a32c84b1025b56839cc2db52bc7e3ae9edf9db8550db5f7d6307d00c601f
SHA512d18a0030ed9d0c68610158e249348ee1cff384575b5ca99e68ace713e6b2c8d5e2a2a3ce24db03467a1140e90cf245de54ab91ec9652799c079bc51e94e896c7
-
Filesize
1KB
MD5b99137ba005f62eb946d2e2d28e567f2
SHA110e8503f651dd3c784c57db88ea23a50a9d61dad
SHA256b2785c21e0af77fc4244576f3fff44d012826f27b0736ce6e22afb83cba6cc1a
SHA512d6c53d30d13acb101afee3ee72fd9035abf2d2c1f806d6284b4337bf205904e24ad6410c353fe15ac8463c97dd58fe40a6b76a54fa9adc9ecfe09d091e3c30f0
-
Filesize
1KB
MD5072fa4ab9e262ae77b02017002326afe
SHA19392e5512bc559c05313acf7f2e37e3cb723d1fc
SHA2566877aeac0bd717e0043e9c71c79f230dbd350f8f9636160d255c3afabfa507c3
SHA51239285a17ef018fd703136a58ed1b503f85c7b7b9b4567437c0dbe0c531a62c669ad7680b3aa87d5590ab354a203622121ff3c1e5b9e5b0a8b70f7acd021910a2
-
Filesize
1KB
MD50fc5fa0fbf4bd1ac9af39a568cf89a1b
SHA1618cbb4eca6254cc4fa5c6078026ca4732371dea
SHA2564c04bc67603d48c000b8bd4aa1e243c994fbfae9134d277980394be058f65ac4
SHA512d717bede03b4a8e9f2226cffe61e07c1afbc3bcd84713faab986053f82e32e8affff237e990756a85d75c7eef92e7c8ea65db7e57841f1fac8bab520f22ffb5f
-
Filesize
1KB
MD5b5249544100caa4fb0ceede67d4fb038
SHA132a78df720d027f45223b9d6b231f209e4c44913
SHA2561efeb0aeb032e7c7713154aab73eaf6aa44ed1035b089ad07b59863dabc35a76
SHA512106ae51e99404cc85caf0f4e9c3a19a2e124c0e63643b60172e846236dbb78c8e520626eb46cb0ff656c3e54a0550e0957ed540de33d8c81e57f6016629dbef1
-
Filesize
1KB
MD5792ec342bcf101198a804ea8d2a826e1
SHA15c7ed4c0e9f05a854812627a98e9b6e02fa5ab03
SHA256792e2ddefa5924a6d512f2ae18486c1817abe7be0a6cc0e9ce6b133c37fb367a
SHA5122f99379c34a08157f6773872d9fa489b2698ff1435eeaf01c05587f1224cd2ae7173485ebdfe97c211217f56170e5ebadbcfc3d9a00b5461af406f2e2fed9621
-
Filesize
1KB
MD507581a8284a29285d6474cb6246b23e7
SHA18328efd7ac0cd1ad93cc50a305ee82d88f59b09a
SHA256c03289f829e9c8871585834b00d592541b9bd42e38d7233c0f2a6828feaf4481
SHA5124729041b80ce1c7ce8676d92dbd198369765942f57937f3376a7c186f380e8411918162f97cee1c91f710d783b4e34eb185b52ca4daee61dcfdb63f363becf84
-
Filesize
1KB
MD5dedbf9138aaf364547b68ba771520255
SHA1a2c48a0de35252f4d0736d672344dbc570f23ce7
SHA25644b00cff4f0f1921661d71779e161d38e21430ab8e4010210d52a29d992d2187
SHA512e5b66315a6236584a78a72e1eabb0396f2260dacfdab460706a96ac4df83fe7724c2fa4c51c3dbf7fbfef0b58ac33df6ceccd246677897eb250ef5a7c6d37152
-
Filesize
1KB
MD5e461363a394c3dc557efc901303205c2
SHA1257891fe96c555b6812d5dbf30987b31123b17be
SHA256c206dc6ece0b7eaac9fb4329594bc28c4f3cb6bc15d7f3bdfb79faa387c05f67
SHA512d085d4c88af7f9d19e8c050a2178d08d802de6ce977266b4dcc7591812ae919be19ee64448cc488a7119420ceff4d07ead1db754870d79a32f10f44f73acecdf
-
Filesize
1KB
MD5778aab15992ac97610fbbd53c89c1d5f
SHA17b5f76a2ae6e690a7c8ee1a11fa34379ec3b0ec7
SHA25690057191046cc5a34ffed7dac9d49ccd7f5774ec04e3bf71088d91d05658f50a
SHA5121445613248f4340a5bf5229b25485d2b70c186e38ddb5ae38ed9f507dfbd162af5f61b08640a0b3dcbb5675af7a9218b368c3f2d9afcfc298cd5d000e263ec59
-
Filesize
1KB
MD52c43da12a07b1d0959cd60f50a5e3d69
SHA10fe003be23da0ededa0bf728c73211a4d6f0d6bb
SHA25654c17ae7e6395ec3ad452e348a49c48db8c094c6414323cb98814a76cec769c0
SHA5128b1944d543cc31b13834ebf76c8759bb7ffa8b84d734f57174ccc0689a05597057c7367a7aebb6fec7223bce45014bc8f6d0729501328ecd685ca4962feeb969
-
Filesize
125B
MD527d393cdc062c808282bd51af664aed0
SHA19705584e1e7b987f340702b0c9a3a3172e945d34
SHA256b8db4f3989bc369281bc93b2e88a218d062047696298aed545d338dcfa1d1cb5
SHA51224e936db900f408d809305e0b8b719461ef10f71f81e2920dd79f5c4e671756f92ce36d5a90e8edb2a593e527d8d71e62b234450db5626df16c325fbc79084e3
-
Filesize
4.5MB
MD5f802ae578c7837e45a8bbdca7e957496
SHA138754970ba2ef287b6fdf79827795b947a9b6b4d
SHA2565582e488d79a39cb9309ae47a5aa5ecc5a1ea0c238b2b2d06c86232d6ce5547b
SHA5129b097abeafe0d59ed9650f18e877b408eda63c7ec7c28741498f142b10000b2ea5d5f393361886ba98359169195f2aceeee45ff752aa3c334d0b0cc8b6811395
-
Filesize
5.4MB
MD5956b145931bec84ebc422b5d1d333c49
SHA19264cc2ae8c856f84f1d0888f67aea01cdc3e056
SHA256c726b443321a75311e22b53417556d60aa479bbd11deb2308f38b5ad6542d8d3
SHA512fb9632e708cdae81f4b8c0e39fed2309ef810ca3e7e1045cf51e358d7fdb5f77d4888e95bdd627bfa525a8014f4bd6e1fbc74a7d50e6a91a970021bf1491c57c
-
Filesize
338KB
MD55d4dc07f705301286ae5e4918d6d3e0b
SHA11ed0961c0f9d5c541492125300d2593c090790ae
SHA2568259f10003b4aa420f0744d9395372ee7435329676803be74dee47d8e0d3fdd7
SHA5122fdffcfffed21821586c012cc233da667baa073aa067aa5b9e573029bb759499723c7f2eed7390b0c20f57b082c9a3d389383ee641c592114a77bbefc33dc003
-
Filesize
28.5MB
MD54ec5e8dee169c536e8bc7172c1094a73
SHA1f48aaeaab4be5e30ed75692d637d8b506710684a
SHA25654772eef09699773843a710f76e71ddb64f33174c3d6cd959f1c1056e6ef007b
SHA512958ae94da4e640f6be46534aae48759d412e2cfc5d26652a4384a5405225978000da6af1b4fe550f2c51c9032dc3cb2d6007897957b3924dd831ed1a3cb7224b
-
Filesize
935B
MD5de80d1d2eea188b5d91173ad89c619cd
SHA197db4df41d09b4c5cdc50069b896445e91ae0010
SHA2562b68990875509200b2cf5df9f6bdfcda21516e629cab58951aac3be6a1dd470c
SHA5127a8f5f83552dbff21be515c66c66f72753305160606c22b9d8a552ab02943a2c4e371d17dce833020d2779c6d9fe184a1e9ef3d1b8285c77aeb17b2bba154b3f
-
Filesize
17KB
MD5659ab62ff1b3be99035af52a7cce6028
SHA1aa116a6d29f668a343e2b34c4c9b48c4d9b1b612
SHA256bd2d5f1ba5fdda555006a6d41bafc07c8a66d53ea5fc48f809b12d512d542a36
SHA5127ee6c8736da6c3065063f2720b292827abc6695d5ae5e67870fbf2f466d789ed97314af92e7be01c886b7b92d1fe2e4871a79446041221497be5799eaa5c72f3
-
Filesize
924B
MD52aad842e19c5065facf83e8c6fd25631
SHA1ebece4231fff70a034463ddea73078254a73bd07
SHA256dfa92ee3704f699253037ec8ce3d355b81810e2e920dccfbb0ff852175382bd6
SHA5124d66fd65acc495a3bfe0279e0bf144ab7da509bfd062a8d3acce022b5c40dbc590303c80a54e1910fad6557c5516c723db131e03e01de104e16e49e23285e9cc
-
Filesize
39KB
MD510f23e7c8c791b91c86cd966d67b7bc7
SHA13f596093b2bc33f7a2554818f8e41adbbd101961
SHA256008254ca1f4d6415da89d01a4292911de6135b42833156720a841a22685765dc
SHA5122d1b21371ada038323be412945994d030ee8a9007db072484724616c8597c6998a560bc28886ebf89e2c8919fb70d76c98338d88832351823027491c98d48118
-
Filesize
23KB
MD5aef4eca7ee01bb1a146751c4d0510d2d
SHA15cf2273da41147126e5e1eabd3182f19304eea25
SHA2569e87e4c9da3337c63b7f0e6ed0eb71696121c74e18a5da577215e18097715e2f
SHA512d31d21e37b0048050b19600f8904354cff3f3ec8291c5a7a54267e14af9fb88dfb6d11e74a037cc0369ade8a8fb9b753861f3b3fb2219563e8ec359f66c042db
-
Filesize
1.8MB
MD5736706fdb8a7f37b329459d456d429c1
SHA16b09e570b46776427f5bf29acb9196d09aa68b1f
SHA256a092d4c28314d491259a17b48125bf4fb149c77b827e1a628045524f51013e7c
SHA5128c6187650667cf6afa3049944aeedb9850bdbde017db2247709b023704ea8e693d7e59726dc38ec9cdc11f0e9ad9a3f1afecb01d77a9823734a4939ebed2be34
-
Filesize
514B
MD54dfb36dd71e101b992ec7e676996e38a
SHA11fb6f6f492de9a3222b183e8fe622ad7c266c96c
SHA256c82b2757bf1d75b6d7a857e8a7563ed78697098e441635b1e4966dce596ec042
SHA512b468e51e2a56fb00b66125eb720d6e20c2c5eafbcd7c2e6c5d0c7f42f0262f6f56b68ebdf20f1a83473c6faa3e00175e76d2c553539cb7a66112ddbec7d10603
-
Filesize
24B
MD5546d9e30eadad8b22f5b3ffa875144bf
SHA13b323ffef009bfe0662c2bd30bb06af6dfc68e4d
SHA2566089fbf0c0c1413f62e91dc9497bedc6d8a271e9dc761e20adc0dccf6f4a0c1f
SHA5123478f5dcf7af549dd6fe48ad714604200de84a90120b16a32233b6d44fa7240f5f4e5fe803f54b86bbdfd10fa1bfdd88fb85eb6a78e23e426933f98d0a2565ec
-
Filesize
24B
MD52f7423ca7c6a0f1339980f3c8c7de9f8
SHA1102c77faa28885354cfe6725d987bc23bc7108ba
SHA256850a4ea37a0fd6f68bf95422d502b2d1257264eb90cc38c0a3b1b95aa375be55
SHA512e922ac8a7a2cde6d387f8698207cf5efbd45b646986a090e3549d97a7d552dd74179bd7ac20b7d246ca49d340c4c168982c65b4749df760857810b2358e7eb69
-
Filesize
10.4MB
MD58c3e11d837b6ca4288dad6193ee220c8
SHA1c6016224cbd624dc208876e618ca9e8d50f977cd
SHA256afa74670f93ac4f1a3988a9aed5841f52c7531fa8d7b617f8da4ace79c4a5bb1
SHA5123dd1a6d428425c5f498983cea9b60412d7ec8cdb8ee73662306a983d1f6fc863f42d425db6520144890f15b74ffb6b9c9c9166b5226748e981c0fadf48f0935e
-
Filesize
529KB
MD5bcba36bdba0002e9a7cbe563d0bb0d92
SHA192a779c97e78f8da01fbdd342ef74e0a63c13460
SHA256397dfbd6e751ebf7d6dfd88ac3deec9d134f1d04de8105693baab151a456e2ae
SHA512e659981484d20d6b04664e8cfc6328b0d625d942f7f30c3ff4779453dc1e2a45eae9531cd84140b2bc93e60d98505037e179ebc24cf7a712ef496cf2ec64ee48
-
Filesize
582KB
MD57457b035c013546e603712c1eb6ec404
SHA1a733daf6f4e445975f5d53dd63047eaf6081d390
SHA256b2f9f7704d224f548ab17b7fd1a4f60d749ea9d2f5a2f35402e075306ea9ef94
SHA512ea7f3b3feabce0e109317bfd31fffde602fe6e156d37736b8da9a8edca25623847528f892f8fcbee67e253bcca08cc700c47c48df3b983f009059604f3c12b6b
-
Filesize
149KB
MD5343838f9c2ea24c92095076ac729b23a
SHA11488802d57c3bad3a0c16ad50defbcfc92987374
SHA256d79c73b15f0cc73c39b28510f71a797b3c3061850c674bac2cf19d92abd8be55
SHA5126f8392752bad8fa5e224f0ccbb6fb84c2ead7e07e4fd5dbbd1ae130207a6d1c1bbfe003fb5a05686bab5b3530732b6eb2b50063ad78bb0950b572eff5c35fab5
-
Filesize
20.6MB
MD5fea6aae1c6a4b11578a433d7f340179f
SHA18a69095f9eb562da1b18b83f8642d023f9db19dd
SHA256910c6038fcae25ada2b35ab5a015d4686e0e06fe9e88fe1b51e735f586aa57c8
SHA512a937d912e99df74e92c528635c9f83ef34c77cfe7a6a8f33d63646b7b7775dc2917892e89b6085db5772935e6d3d3d18137801349e89ea69e592244cc2a9a301
-
Filesize
75B
MD57564ad4de0e3aed65bc491c48b68e615
SHA1f3c9afb1b0fccf723dab4067352898a0df8d7a8e
SHA2562bf0a7d8ea12240de85ea11e765512370e92ac2e483e08eafa00fd6fbef778b7
SHA512c55809228fe77558e13e095454e74f968b724f0a406948b8dd04892049288fd8b28f8e4f8c0248eda942ddc00adc664ff3ba50595bc6c815b2c2478ce60b2de1
-
Filesize
152B
MD50d6b4373e059c5b1fc25b68e6d990827
SHA1b924e33d05263bffdff75d218043eed370108161
SHA256fafcaeb410690fcf64fd35de54150c2f9f45b96de55812309c762e0a336b4aa2
SHA5129bffd6911c9071dd70bc4366655f2370e754274f11c2e92a9ac2f760f316174a0af4e01ddb6f071816fdcad4bb00ff49915fb18fde7ee2dabb953a29e87d29e4
-
Filesize
152B
MD5a4852fc46a00b2fbd09817fcd179715d
SHA1b5233a493ea793f7e810e578fe415a96e8298a3c
SHA2566cbb88dea372a5b15d661e78a983b0c46f7ae4d72416978814a17aa65a73079f
SHA51238972cf90f5ca9286761280fcf8aa375f316eb59733466375f8ba055ce84b6c54e2297bad9a4212374c860898517e5a0c69343190fc4753aafc904557c1ea6dc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD54b9920b7a6a4b476f86eab574d9e2dfc
SHA14550dcc21a72b47536af1b327848dbaa13c0107e
SHA256ea057cde5395c6dd4ae958c16b2e73416911dc85df5d801afee595d4d1aaaec9
SHA5127e4227c72b322598ad0f67bd06e85678490d0fcb62c16ed019aeec7350112607a3f76dbe7986c14f07a47e8f7e14aedede6d720569a5284337934779fec27ce8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD57a773a976d9128eae3e2173f7f98e16c
SHA1f17895706b0204ce9d39201e8b633f5edb9f74df
SHA256573853e280be45ac9951be8c22ee24d3ac1bc98251a70d43d5116cb77956df2f
SHA51201df51942324d5c2f1c707127e6e87207a7e6218109b0a6d3058afe7008554c5ae62e82714df45fa2e4df92f78e3c49437b25929678ad8d3c6693f6de306de21
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5be44073ffa7296af63188388e888f646
SHA10f28b4b573a44865611b5c4a2afbcf8f66c52ec6
SHA256d6bebcf6ba8209b99b6ba78ca1bf4abfec426e11c18c7863b79a5930a0ffd203
SHA512cb257a13ddad097bcfe92a9957a80488b7fcaa6dc3b2c9ae4088885bd11a7ff725466926c572de1165a1a20f6b40ecaa0b04864df11fd2bbf1211ee4503c9fbb
-
Filesize
579B
MD57b2253a6fa7b6c941784b92704186809
SHA1eef99141df17a30e851e15a88373ad50438a1180
SHA256602fb72bf192a45033d30ad0518344b2f7c173894ff70934259944aab1bf7c88
SHA5120772930a8d2aaa2f1d2bc65f93de20f65c26145f18ac567f15714a467c203726bade5252a906f40231bda84ce1f663d517a062528de0b0f94df8da358a5892b8
-
Filesize
3KB
MD5387102019a394a6448f30fcc2b4b0435
SHA1cd01b89535fc445bbdf0bf9e1f252d7e295db16e
SHA25625f98542373a96900190a2f8630cb95529ab43a09bfbe7ef5241033040a929eb
SHA5128c5f923d22c5618101ceed78e9942d5c3d7f7983999aad30e46b769b6c3984d1a5cc6b0bb78023693e7d9167c655ec769507eb3d7d41e45f7191ded69dc894ac
-
Filesize
496B
MD5f861f6f9b58c52d5032def551b43e230
SHA1efe2c3a18cdbeef54b18dff9a9db0cd0f95c49cd
SHA25658de693413dfcf57fccaa1b82a94d94d37e47e5f3417d60264313dc2e51ddf7d
SHA512bbdf16aba8f19981089dc0aac36cf7b1f15fa34771d127002d1b6356cf772abbdb85cc0de6ad9df2b6739fcd2c472bed071470089bae87a52baac0e443ce357b
-
Filesize
6KB
MD581b762e36580b9722437b9af8dbe8394
SHA1601622f3d465f585178e1fe05d20f71ed21f96c2
SHA2568d86a3892aa3f74e622e8a6189fd3f5876acef01809b88f6dd7b8c810ac7c8b4
SHA5127754c98018b6d89171d3047d67c3d5b68d9fd9f6c08a71063dd401fa76bd5783d4fcb3cc990eac37818f1acd0899cefb937976ccfccd2fb3f4a0861b116032ce
-
Filesize
6KB
MD5e7f7e28e5e8c7e366b7058bc1d6bcf22
SHA1892530db63da2cfa32269a0a30ebc0e4acfc12c5
SHA2560226f08480c00d84147988ef36de55a2df6931b6232e9ccf99bb8c2a803c4d8d
SHA51201c577868cf00e641b9d880f62a4169acef2c991311be92a454fb3e396f6a704665cf52bbd37324b95c858a7f1a2be9f61e209fa75f79a0d2f84aa01e3a8db5c
-
Filesize
6KB
MD5b9736347f041c3b5c31057da2704b12c
SHA1ac93b584527b4acc50db7fb0c33199bf9425053b
SHA25637731acd94791521e49050235f1ccc680cf12e590b1ce9c0cb8bd5a8211fbd35
SHA5128170b37e95edf471712c0312703925418219c38f7b40ea1bb8c03e476060f32fca96cd65ea89209d916e63305b343c4c3c3706a3142defbd2366dbee0b51b4e7
-
Filesize
7KB
MD52a8639da1b5df80243937d0322706fb7
SHA18e78e24c5422812af79de7dfec4bd8263319934e
SHA256389d056b61e664ea0162490a9cb98b9db23b30ae4b8a66f057b2ae9b1eff3fb0
SHA51237ce73874748f15bdd4bd80713a65a4802607cfd0426c9335215a9539ed9b730a13f8ba6bf38bc97f9eb772b314f7c0573cb3574392b508c85a7970abeada7a9
-
Filesize
7KB
MD517945182778a0854da00b4dfb89d35e5
SHA152e329a271c80b3cda1aa08bdc4c6689f0ee3b06
SHA2567b579e08d70652561fe7c23241683a14bb8879191e3c5440c44bea39cc485b0d
SHA5125aa8690cef949a5abc668c2a52010b280bc658cb289b7fcd5cf63a762db062cb18033ddb9823f922eca35e9f6ada033026c23fc75c61c4282a78405d3a0da0b8
-
Filesize
8KB
MD5ab2357477404b7c7bcc046339bf5cc40
SHA1579b47d3dd7051efc8b94716de8a9d6c2b00c9e9
SHA256e10ac9eb5320a47622c54ea0ee1501eac983613d9546b0137f9e9b6c5f7128bd
SHA5120141561c4e205ef05b0efcc2fd683f7ca9f65cc631b31074fcd8fcc341be18cfc0ab3414a9236b1139be9cc3ba66c39dbcf17bf9c9ff2c80ffa9ff02d802cee8
-
Filesize
8KB
MD540b5423ee3fa2b9e52b4255a0f2f9fea
SHA19b99ca1832bfe2fa5dab37b11442cb50fe35e048
SHA2560488fafdae9dc9dcc0c226737b50b182db920549a83415ee21587c8faeb87ad2
SHA512d3bf031833d655c9ae7991de1a2ed82e42b719f6e76dac63c60a36c37edf40a737e4a81444777c6dc3d2b3e4edd534060020e8c3edad6bc1bbd4925341442dfb
-
Filesize
29KB
MD5d38787050c3512ba72e0f16deb0a1704
SHA1d939875f03be815397f0021e9cdcafbea313469b
SHA2565bdfc351a6768f29d89eb037859dd35b5761f0eb556f1dfa919ebb4839426ab1
SHA512f0b9a4ee00f1a4b8d55d44b78439d1d119009b430d760f126746bbb9fda6e5448df1e497bc10a658fbf0a80a8b67493d60076e3d35a5f2d51fc39c27bfcfc2ce
-
Filesize
874B
MD5d6b1e98cbed3fee63c3c3f41af1c7158
SHA1f7fb66a403fccaa3651fab65a7babe03b215f46a
SHA2569205a4e80af0dd972947427334c399230c36968643507f06a64f58fc6f04395c
SHA51211e8505caf0fd1060fb2b1fd8ac9d65ffe1ee89fc403346b7899e665ece09eb0da56c0f493aeecdf557fc38245982732c2e002ace6a8c9740be87634cf03b88a
-
Filesize
1KB
MD570815fc294e69fef09c057186be71c42
SHA198debdcaf7956136759d2a5bdd3d6d73156b10ad
SHA2569cd1386e0e2e87432f702c4d1158c25ce53854188ec7c3e6d8b3beb74e0cd2c0
SHA5122e938f26a5ac20a7e5b18d7eab0129dad45a759b6137ae92dea34b9a34d3cecc81f239988fe9389f924665c4fb6e4d43e830a727a0601bdd42689874dc90a64e
-
Filesize
1KB
MD54c207a82f0dcd6fd1ddc59808557a186
SHA11449f3f6dce76506f6667b07a6ccf8653b65893c
SHA256d1298f4bb82542bf8ac7fd053544f466394f291c310082a9823dfacd748cf2e3
SHA512eb0b5b3539752b5c010c1736cf06794b69d62132e11b6484511fcf7ea5a3b87bd901ebd8084d263682d7484501dc23ffdd3da74548377e024bd8cc0058fbf1ae
-
Filesize
3KB
MD545353343a7ddc50576e75c5779b4fa9b
SHA17837d3bed697252b6ed9d2132dd5bb44a664a8ee
SHA2564e0c0ba8fd6f341da6332cbe1d0a4004a7f820480a32b09484c8f7af6a7c47c1
SHA51204e48e517ba00e85083c7a73f100a9a0b8324c68a7efbc5e25dda3578397b9874e862505d678db6718fbc4a24b9f35a28c4203ccf0488772f72c7b388dccb91f
-
Filesize
3KB
MD5cdbfc4cb7bc955b7a284cda50d371d01
SHA1e8e3321da6c2fac76737a0138930ab268d9901b4
SHA25624e053ec24ab0400290af75a79087c37b095a98adffd22a0cd23e723cabaab08
SHA5122c9b78e7ed67b879a3a7044772f48bc569633846a1b236e8a8aae4a845cbb3c95d5a7b855d85ef0f9159465dc388210f7e722c097e9e277df9c6805bc0bbfd8a
-
Filesize
3KB
MD55dab8cfadefd2747e1bef20bb77d6cf9
SHA18f98a00668445fcb26e178ab48de3f4d4f824c88
SHA256a5e6deb9ff2d01cfb49136d43a24b61f0fa23c2507265a4113722f2dbf7fb0e1
SHA512c3bfbe34cfb3dd9492cf53caa0bc641564e51bae6842e29a8b22fc4ca9bb5713497516f30e3c5fd5709018c6544e53e559b0289538d23da52ad9a9d99fffb9c8
-
Filesize
2KB
MD5e060d195fb323274a51a117f3182440e
SHA16a3fdb77bf6a608721d894da8f9fb8ca02ae0c89
SHA2562b1b6ae772a6960b460f6770715b17d5f5a4782bcbc30aab6b5ef6949de515ec
SHA512194870d0802758c5a51ca1e64c02ab7ab156e1ee4528d4cf73b4f25fe1049b5b348b2494b24c0bdc59e74e12845b9ca8beee9c87182f6468aece74c17ea0f8e2
-
Filesize
3KB
MD557fa4ca99e12ffaf2aa5ba14ed2886f1
SHA1fa6bae4898d931f4a4fef15c3dd20467bc2b4935
SHA256f612b32260a02feac163dd1cff6b0554aa9603098a268052462aecc285c88c8e
SHA512250e8768571f3d2e7c490ba4852d42f855ff499f884b9334425bcca05f86de1033014fe74b991bc1954018f9611c947f62de2d674f56dd9035541e05c50f9afb
-
Filesize
3KB
MD57562e1735f79500e4b6de04067945a55
SHA179bfba8feb1c8e406a4f8ddeda1966f9c82429f5
SHA256a3edc06933e63a771c223ebcb63850c1b2cd3994906ac832d1c6f3a71e6aa9cf
SHA5125954d10fa0ac28744eb60d1dea8b24490b75d1c32c8d2a9a7ca4118aa821ac6a98f06f85b180d271b804590c74decc01fb9d587d9e57c9ec03118dd91c131ca6
-
Filesize
3KB
MD54d5f962c5dfd1a356889644b3e80a14a
SHA12a241a08fdf0965c2f5d3b0089c192c43ff61478
SHA2567f94f75a6fdea01a3158901824b0037d6f7c7a37754cdea74816d016ea0fa71e
SHA5121ec74aa6e95313272712a01cf187d41c71ed17eec8cb7064a7a5da7c6422453c33d6cc78ebe44678f99b7c465e560b74df97e7c33d0d264294f6d0c4b80ac99e
-
Filesize
1KB
MD59dacd8a624875c03bf7526cb5889bdea
SHA1052e3fa183cfd5943f2989909f8468e11911a2c4
SHA256c5fc09eb49eac62a027d42c5d4ee1ec8b8795a7c7c5d9b3ef2baf1d48d6590da
SHA512da6356e27f63c08c16642dffbad1681bf74037a709deb8df5218d76bc249c223ebafe751b711548a3633cf92404c4b28f77205084bd7d632d39bdbfb4d1ce368
-
Filesize
1KB
MD53fed2deb72542ab9cc65685884d0d4f8
SHA1bff05ed8a7240026e3d127610f50d7495b9cd77c
SHA2562b56b22a66026bcb6ccffb04750b844e95767be8bc52ac964df645a811c409e5
SHA5122c98fd5cd6209173f1924bf17a8eb67cec87eddd5cd9fa52fe572d3c94dcd78201ee0e8cbaffbf8e3245c67bc5b46febda24eb04396e86b27770569679a55b91
-
Filesize
3KB
MD5767237e8661fe71bd49f41bae2e9524d
SHA19ab6c70f12acd628b31cb564b5d5a43ef27063d4
SHA256635755d1b12a9cbd6776612585a80895799682c8cb6347c5f415cbbc4e9f06a4
SHA5123566dd42a69e04ff6962dba30bb3fb949c867a68a4bc0941cf0119d0dd3ccbf71b6fa89c25075ac4ba9241145ddd903eab14e628174fc21227367e8d2f6c41c2
-
Filesize
874B
MD574e966ca36e7603e1bd62bfadcbe19be
SHA1f4d7a4c70343b09a098958f49f0012273e2bd842
SHA2561329cf7ce64d2e6b3dd1e4f9dcd81ae18820eaa1170a223bb7708732003633f7
SHA512fc45bd8b729715ca9867282d0c29b54aaf15a712ecf4105ec415c2aab33e2adba34ba6cf3164607bd43523eaecd078c06aab474687e77a100ea8479dcc2f2353
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD571811298ccd0ca549b57b1be7195d98e
SHA1295d032176eae1ec88f00642776a8fc6603983fd
SHA256a5e9fcd44c786b9b408651f1f19375bbf764a8899b32e431be802cdb92f5d272
SHA512b6ae2105257a2eff2fd1d7b14b2d851c36364d8872f35d66233aec87ff97adc6fe67dff90939ab79ec5a196c5d05f42bc32dfcfc3a3e9943e6cf0c24ce5e70e4
-
Filesize
12KB
MD54faf7486096c382778607f641c37cd48
SHA1bbac23407aec7225f6fd2af8136dd2c7f85cdc33
SHA256f8bfebd033c24f3420c7ac4423faa45b401c3f36f7c15f754948836f71f1e1f7
SHA512256e6a44b6980a369ed48eb91afb1d4a2dc945e626fff1f9c2baff52129a63086cc4af10422925b37cd88bc32d715c73cbd729c63cf6c641cca2fb8e3e1807a1
-
Filesize
12KB
MD5c8f219e97fb2cb1ae2a9d9f9e1f30072
SHA1a42e9e024d95ce3cd96fbc640caa2f4af4937894
SHA256086f8a645a97807ed2942cac754f1465a85e6b4f8910f320757400a82e0e4b62
SHA512775964d2bcdc54e47120ba19115b490899e355f07ebaf339494b0c67424a5b69af16609c6a0e9bb17c0b4508b967baced694973ffe1e3eaf8da315f22f0dea73
-
Filesize
12KB
MD5fb5d9a1e3cdeb41e2c1c4bef65305feb
SHA1a09c7869a25e1d22f7d7f3f37eebd08978bed8c5
SHA256253aa0ee7404031649dffd2f7dc7f4cd4940a0fea2526d9d701a68665786e9f7
SHA5125a484ad2e520eded48de8e6a3f93b3c19535e24558de00b315326e21fce8bb0916aa06b0c15b94830c23c7de2dac9f55aaa6e61d1db72f895bce423b1bf4fea3
-
Filesize
11KB
MD58e9e4682aa2e691800ae529ada878be9
SHA1798f5b631f257014bf5e372078897055e94c571a
SHA2565e63cfd79cbeabcdcd180f756a6c725487747307e8e8b2219fa32b759a369b35
SHA512f3a0357e5ea152d9a4eab563ebc1590bf52bd84372c1bbb6daa02ad32a63d4faf1fddddbce371ad58d4a6bfae2c101c4e9d06db43858f03c11914f7cc79f88d5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\activity-stream.discovery_stream.json
Filesize25KB
MD59e66623625151db053f66293461330a5
SHA1603418dd2a914147a99e97d7afe49ed93aae29b8
SHA256463cbb1d879c46e876defb3b840936dde1cffad1a9b9980c6f26d5ec85670a2e
SHA51246a2c2f5dbca0fc3313b44effc61708360b82caacad057c0c3e993003cd219c3689590f4ac83ff096556c090b5ea3be1fa2314e6343e1c09b262c5f1f948da8c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\activity-stream.discovery_stream.json.tmp
Filesize21KB
MD5e96ee3595ad667d7ed3a90699ebbbb5f
SHA1a10df85ac41f5ae2096ec2ed46c78784cb6eea92
SHA25617c04012403189529551cd1e85a573edf5e5101f97c0907fdb35ba3f9308d2cd
SHA5123ba93b193f33cb27fcba50cac5c7beedccf0d702259d1a83821942b8f88ae564dab773f7f38004cc105427a78f0c00560ba7b0d663f5baca59392b4fc3e6f8b8
-
Filesize
36.8MB
MD5295a3ee7bd4c6c46060c1d717217d971
SHA110e8dcb0e7f20a2db2483d5fb56ab34119318d4d
SHA256802c4087aec78e1353c3c6d3dfd6f68eaf0dfa7313ab3ed8bdc3f28c4514d6f6
SHA512f9a2ef8848c148587fbaf62062d52867db39631a199cdb62a9bc58493e9c16d71772a9d864dc1a40cc5415c796e72f484a0c097740a653042c7e165a9e9774df
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD52147cdd8b3ca87966cf8f82e28738e2a
SHA18a6bf26fbdf8f7af25d2a4096362543b5cb64634
SHA2567268871dbd0ef1a309a017708f98835ccf8bd195bbbf0b27ab3f223af1d93b90
SHA512ed553f0f450d8fbc952e54a00f220e0f368db541edfeea6ed0aa4f45e451981e9bfe9c90f3684a0de24232d5018bb8aa74913d2dc6ea6ce34c799f0f06f6e929
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD57f3d368daf6c31bba04b39f649b5960c
SHA182fb8e9c06cf94d80e1f1a2e8ac6e196b8bd9d0d
SHA25618862188c2a1605c0bcbdacdf21206682cb01a1691c8cfc92686de7022accfe7
SHA512ef7076f63542c5e1fce3f7fefec8082d7284a08f3672f4b66c86ec1d4f5a76947ec0f2f91bd9d531a4b6a08beb0724f31b0c6153152e6f57a4db8e8f0174a112
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5895263a877bff45a1a3a5bf0914f80e0
SHA1482803a99e60b9a10b5d3f6c0e36526feff0b529
SHA2560f11a0f3713727f982a0126cf7cddf6687421c382e00f2dabe37ae80877c0ce7
SHA512da827d5009f3445f2da3f97e8034c3880a8258c528cfdbb390de15e6c962db732a825c108ff4234fc973903929eaac7b26bc1d8f2eff9f489543d723d0dde59a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\pending_pings\156d495b-4c95-4851-8a4e-e1aacfcba8c0
Filesize982B
MD5e989fbcee3091893e176e12e9abdbae4
SHA142bfd0688c734d006fcf2f951c27a90ff0406eff
SHA2561cdcc5c211acda9d7c55928e0e0ef5eef25a5f5cb85842c6264f3d377d2892c6
SHA5127c5f11353df13decffc97acd48aeb62d5be04398befba9ccfa4b5badc1825b6e0c9057898085d84330f682cc8403cbc427c8eb1089b7fed285ec9f883fb0810b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\pending_pings\dfd6e876-b520-4064-9724-191379ab8cd1
Filesize27KB
MD5a0ca74b844755a519585feda7dba73bb
SHA18a1e997de53f604b94dbf9b05995d48a9fd5207e
SHA2560e728275b2edeefe93839147ad8f7e26bebfd8d0dcb8aa5dd142d5f40fb6b404
SHA512760c99ff3406849625053dba0306546ad48576572e88190d9ac4add11797d9d7ab9fca518dc210e6d49b3de00b8d13a804dfb816b09ebd59f134d0cba3741e21
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\pending_pings\fda6b87a-c0b1-4e82-b340-480e3f9df9f6
Filesize671B
MD59eded3ed9d24a5aed6a12d89c6fb9f20
SHA17dfe1b1bdb4d0ed33db1aa6ec6401decc2beba8a
SHA25622711d948810fe40e69b6d1dc0a1e63525fbb3970fe48f1dbb78194ead32948c
SHA512ba0fb28314c49280666647a6f8c8e3a0769e02aeb73d9ca3a1dfedf005c0cda9a71b72e0ce0f7b23ffba5cca3109c64e2a694f4e32ed09665eef8784c2848983
-
Filesize
9KB
MD55d32c1d1a146a2b71fd912affc932841
SHA128d0fd24179b9100a7fab98d221d6f16adf987e2
SHA2563c2e3024b8342a5abf76189d3ee98c42a1bb45c139484929c2635359b2e00d77
SHA512c036d17b8ff21aa070d69e8e3c18f417840d5326e3a460ed15d7c2d49058b507d61657e645fb5160fb5df487f62b86437bc34a7df36223341ed69b1b8b58e255
-
Filesize
2.7MB
MD51e17ceff00f18d129b514bd6b01d9e85
SHA1e2e5b38df2052b7ed3f95e3f0e2dabc079c64f29
SHA25664517ef6dd936d54c2ef6a6edad5e018cef9facd71693b9a94dceca2847fce6a
SHA51273ace5997c333a8c9d0279a77f51e335a724c39d7bd450b4aab9b162bd5eccc4d457536abab663ce539046e91e6e57a04814426c416418d077ef8320ad672b2d
-
Filesize
211KB
MD5b805db8f6a84475ef76b795b0d1ed6ae
SHA17711cb4873e58b7adcf2a2b047b090e78d10c75b
SHA256f5d002bfe80b48386a6c99c41528931b7f5df736cd34094463c3f85dde0180bf
SHA51262a2c329b43d186c4c602c5f63efc8d2657aa956f21184334263e4f6d0204d7c31f86bda6e85e65e3b99b891c1630d805b70997731c174f6081ecc367ccf9416
-
Filesize
50KB
MD547abd68080eee0ea1b95ae31968a3069
SHA1ffbdf4b2224b92bd78779a7c5ac366ccb007c14d
SHA256b5fc4fd50e4ba69f0c8c8e5c402813c107c605cab659960ac31b3c8356c4e0ec
SHA512c9dfabffe582b29e810db8866f8997af1bd3339fa30e79575377bde970fcad3e3b6e9036b3a88d0c5f4fa3545eea8904d9faabf00142d5775ea5508adcd4dc0a
-
Filesize
22KB
MD553df39092394741514bc050f3d6a06a9
SHA1f91a4d7ac276b8e8b7ae41c22587c89a39ddcea5
SHA256fff0ccf5feaf5d46b295f770ad398b6d572909b00e2b8bcd1b1c286c70cd9151
SHA5129792017109cf6ffc783e67be2a4361aa2c0792a359718434fec53e83feed6a9a2f0f331e9951f798e7fb89421fdc1ac0e083527c3d3b6dd71b7fdd90836023a0
-
Filesize
10.6MB
MD5e9e5596b42f209cc058b55edc2737a80
SHA1f30232697b3f54e58af08421da697262c99ec48b
SHA2569ac9f207060c28972ede6284137698ce0769e3695c7ad98ab320605d23362305
SHA512e542319beb6f81b493ad80985b5f9c759752887dc3940b77520a3569cd5827de2fcae4c2357b7f9794b382192d4c0b125746df5cf08f206d07b2b473b238d0c7
-
Filesize
4KB
MD58750df7c3d110ebc870f7afe319426e6
SHA1a770fff05a829f666517a5f42e44785d6f0b4ae7
SHA256fa3f934083746a702de18b927284f0145d4b82a92f2111693e93a4f762b50c00
SHA512dfcbc2ba358ec40143e842d5242781a59943e646f50c41010a8cc4e2c5a15d5b19dcd2ee9556a0317ca73283e84d1f9d1b0b8b7470b493fe38e4e027336b8a2a
-
Filesize
37KB
MD5aa90fce252dd93a26ae3f15614453171
SHA148b45b7837d6ebaef2ef9dc6063c8e97479d41a8
SHA256862e8db9e095c55f2416797e75e447051f561e97312ca014986ba2575c9079e5
SHA512358e320587529e649ca964a9eb27b6a119cfdf5359d4b2e774dda555e2b4a299bc8aada67060f211e849ff4e750061e9d2873920d61c1506eefc9e63e26ff287
-
Filesize
233KB
MD5246a1d7980f7d45c2456574ec3f32cbe
SHA1c5fad4598c3698fdaa4aa42a74fb8fa170ffe413
SHA25645948a1715f0420c66a22518a1a45a0f20463b342ce05d36c18b8c53b4d78147
SHA512265e6da7c9eede8ea61f204b3524893cf9bd1ed11b338eb95c4a841428927cccbed02b7d8757a4153ce02863e8be830ea744981f800351b1e383e71ddaad36ad
-
Filesize
1.6MB
MD53430e2544637cebf8ba1f509ed5a27b1
SHA17e5bd7af223436081601413fb501b8bd20b67a1e
SHA256bb01c6fbb29590d6d144a9038c2a7736d6925a6dbd31889538af033e03e4f5fa
SHA51291c4eb3d341a8b30594ee4c08a638c3fb7f3a05248b459bcf07ca9f4c2a185959313a68741bdcec1d76014009875fa7cbfa47217fb45d57df3b9b1c580bc889d
-
C:\Windows\Temp\MBInstallTempe4eec3def11f11efa0a5ca53edaaaaec\ctlrpkg\Malwarebytes_Assistant.runtimeconfig.json
Filesize372B
MD5d94cf983fba9ab1bb8a6cb3ad4a48f50
SHA104855d8b7a76b7ec74633043ef9986d4500ca63c
SHA2561eca0f0c70070aa83bb609e4b749b26dcb4409784326032726394722224a098a
SHA51209a9667d4f4622817116c8bc27d3d481d5d160380a2e19b8944bdd1271a83f718415ce5e6d66e82e36819e575ec1b55f19c45213e0013b877b8d61e6feb9d998
-
Filesize
154KB
MD595515708f41a7e283d6725506f56f6f2
SHA19afc20a19db3d2a75b6915d8d9af602c5218735e
SHA256321058a27d7462e55e39d253ad5d8b19a9acf754666400f82fe0542f33e733c6
SHA512d9230901adeecb13b1f92287abe9317cdac458348885b96ef6500960793a7586c76ae374df053be948a35b44abe934aa853975a6ccd3788f93909903cc718c08
-
Filesize
6.4MB
MD5838bf248f5a5cdd26ff54053f8ff77a5
SHA1e2c54478d0c3d4c7555e24d989d88eacfb54a302
SHA256c693feaca7cf606aec312b61e3139d49ec1fa94f6648c8ac0f35e50de6138b96
SHA512c149e2a78222f708e3df72bb603d55dcb104855c09c3bf0696908b168fffeb399ef9144705401b152b3d4122863ef00b98f62ce58dc7bb15f5ebb44cccf4e44f
-
C:\Windows\Temp\MBInstallTempe4eec3def11f11efa0a5ca53edaaaaec\dotnetpkgtmp\shared\Microsoft.NETCore.App\6.0.36\mscordaccore.dll
Filesize1.3MB
MD53050af9152d6bb255c4b6753821bc32c
SHA17a20c030a6473422607661ffa996e34a245b3e2d
SHA25697468531d7009e36c338b47fb19e0c6bf210f013610f413c852a4cc27e84b514
SHA512ad07c4b0bb995e80a1718d74992afdeb6c2c4f217e72f361691e2d04dae9be9cd8e55b50fd7172d73755b02b6105c00a3b67534ba9469d92f9e0fbaab8e8f1a9
-
Filesize
9.0MB
MD52ad48a7f9211bf407521e8fd571898f8
SHA1f9192adb5127e1e8c95f0f976509b7646e42e32f
SHA25681642eb2c8741c221b541521cf59686575d8fba12933590e03531fa6f923ba2f
SHA51248534464022eee44c6143e08d5734fdde9eb6c916e860b86bf62686d6c29139e456dbcd27e73413d6b2fd0c284acf0a4373be42d054b0a92b25512856b1545ed
-
Filesize
11KB
MD5bd4ceae54af081d6b1dd91ff584c5d61
SHA15ade462d66e042da58bb1447d1b31f1aad901b68
SHA25664416d564725416c6869ea951878a2734b1f6940b11f7961a897c45f0d8c6625
SHA51237e7abd312f694ee2c8ea54ecf50ed12c16684f1007c61d9a6d1d01cba958be511c5e4e11cd7393a5cd57349fda1c552bebca42962137e0d11695c195761ebb0
-
Filesize
2KB
MD55d8c05cc4f9b4304d57ea10b87f2dcf0
SHA12cabe3d39aa5ec16c54c7818284a2ee235d2ddbd
SHA256e26c2d3347e5f077da92713c9df3cd3eae438fb7e29810bd5c3afe567d2d3125
SHA51255bff23fee9852f229246b71721b3659c916079787935d400a97641449dfda752fc8fbf36f9ea3dc4028f05daeb9006a99660284a61aa5d5a466af0ee966c738
-
Filesize
21KB
MD58da81aa1f6b89ce1d2e216e3ea351c59
SHA14baf79cbade9a5584630a540e6368d547579fb12
SHA256ded569e249e590314d095f740c6b8934a5a797e4f3edbe0f78eac9d333f12a2a
SHA5126d611bbd9d480ef2defd745fd06c4ab86e181267cf689d9d0e124edbaf22fd30fbe2310879cc7bb6dde5bae72c4feea1d329cdecfbf101d95634f85dd0769119