Analysis
-
max time kernel
371s -
max time network
865s -
platform
windows11-21h2_x64 -
resource
win11-20250218-en -
resource tags
arch:x64arch:x86image:win11-20250218-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/02/2025, 17:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://example.com
Resource
win11-20250218-en
Errors
General
-
Target
http://example.com
Malware Config
Extracted
Protocol: ftp- Host:
smadsoft.com - Port:
21 - Username:
anonymous - Password:
3pyg6)IjxzTMQOVTNRP
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spywareblaster.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spywareblaster.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spywareblaster.exe -
Blocklisted process makes network request 5 IoCs
flow pid Process 373 4548 rundll32.exe 374 3284 MsiExec.exe 375 3284 MsiExec.exe 376 3284 MsiExec.exe 377 5784 rundll32.exe -
Creates new service(s) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate spywareblaster.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spywareblaster.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate spywareblaster.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spywareblaster.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate spywareblaster.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spywareblaster.exe -
Executes dropped EXE 15 IoCs
pid Process 4452 Let's Compress.exe 5176 SpybotPortable_2.6.paf.exe 5484 SpybotPortable.exe 5396 SDWelcome.exe 5860 HiJackThis.exe 4456 SDScan.exe 5148 Cloudflare WARP.exe 4364 spywareblastersetup55.exe 3640 spywareblastersetup55.tmp 684 spywareblaster.exe 3396 spywareblaster.exe 4920 spywareblaster.exe 228 spywareblaster.exe 4220 spywareblaster.exe 3824 spywareblaster.exe -
Loads dropped DLL 64 IoCs
pid Process 4452 Let's Compress.exe 4452 Let's Compress.exe 2956 MsiExec.exe 3284 MsiExec.exe 3284 MsiExec.exe 4548 rundll32.exe 3284 MsiExec.exe 3284 MsiExec.exe 3284 MsiExec.exe 3284 MsiExec.exe 4452 Let's Compress.exe 3284 MsiExec.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 3284 MsiExec.exe 3284 MsiExec.exe 3284 MsiExec.exe 3568 rundll32.exe 3568 rundll32.exe 3568 rundll32.exe 3568 rundll32.exe 3568 rundll32.exe 3568 rundll32.exe 3568 rundll32.exe 3284 MsiExec.exe 3284 MsiExec.exe 3284 MsiExec.exe 5784 rundll32.exe 5784 rundll32.exe 5784 rundll32.exe 5784 rundll32.exe 5784 rundll32.exe 5176 SpybotPortable_2.6.paf.exe 5176 SpybotPortable_2.6.paf.exe 5176 SpybotPortable_2.6.paf.exe 5176 SpybotPortable_2.6.paf.exe 5176 SpybotPortable_2.6.paf.exe 5176 SpybotPortable_2.6.paf.exe 5176 SpybotPortable_2.6.paf.exe 5176 SpybotPortable_2.6.paf.exe 5484 SpybotPortable.exe 5484 SpybotPortable.exe 5484 SpybotPortable.exe 5484 SpybotPortable.exe 5396 SDWelcome.exe 5396 SDWelcome.exe 5396 SDWelcome.exe 5396 SDWelcome.exe 5396 SDWelcome.exe 5396 SDWelcome.exe 5396 SDWelcome.exe 5396 SDWelcome.exe 5396 SDWelcome.exe 5396 SDWelcome.exe 5396 SDWelcome.exe 5396 SDWelcome.exe 5396 SDWelcome.exe 5396 SDWelcome.exe 5396 SDWelcome.exe 5396 SDWelcome.exe 5396 SDWelcome.exe 5396 SDWelcome.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2036 takeown.exe 4552 takeown.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\A: Let's Compress.exe File opened (read-only) \??\G: Let's Compress.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: Let's Compress.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: Let's Compress.exe File opened (read-only) \??\H: Let's Compress.exe File opened (read-only) \??\N: Let's Compress.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: Let's Compress.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\U: Let's Compress.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\S: Let's Compress.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\M: Let's Compress.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\W: Let's Compress.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\J: Let's Compress.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\E: msiexec.exe -
pid Process 3948 sc.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\is-F0USJ.tmp spywareblastersetup55.tmp File created C:\Windows\SysWOW64\is-12DJ7.tmp spywareblastersetup55.tmp File opened for modification C:\Windows\System32\GroupPolicy spywareblaster.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini spywareblaster.exe -
resource yara_rule behavioral1/memory/2148-2469-0x0000000000050000-0x000000000005D000-memory.dmp upx behavioral1/memory/2148-2476-0x0000000000050000-0x000000000005D000-memory.dmp upx behavioral1/memory/5440-2474-0x0000000000A10000-0x0000000000A1D000-memory.dmp upx behavioral1/memory/1420-2523-0x0000000000890000-0x000000000089D000-memory.dmp upx behavioral1/memory/1420-2526-0x0000000000890000-0x000000000089D000-memory.dmp upx behavioral1/memory/5436-2524-0x0000000000A10000-0x0000000000A1D000-memory.dmp upx behavioral1/memory/5436-2528-0x0000000000A10000-0x0000000000A1D000-memory.dmp upx behavioral1/memory/1992-2597-0x0000000000890000-0x000000000089D000-memory.dmp upx behavioral1/files/0x001300000002b5ed-2600.dat upx behavioral1/memory/5136-2602-0x0000000000210000-0x000000000021D000-memory.dmp upx behavioral1/memory/1992-2604-0x0000000000890000-0x000000000089D000-memory.dmp upx behavioral1/memory/5136-2624-0x0000000000210000-0x000000000021D000-memory.dmp upx behavioral1/memory/6788-3837-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral1/memory/6788-3857-0x0000000000400000-0x00000000004FE000-memory.dmp upx -
Drops file in Program Files directory 35 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\SpywareBlaster\sbdatabase.dtb spywareblaster.exe File created C:\Program Files\Cloudflare\Cloudflare WARP\aws_lc_fips_0_12_10_crypto.dll msiexec.exe File created C:\Program Files\Cloudflare\Cloudflare WARP\aws_lc_fips_0_12_10_rust_wrapper.dll msiexec.exe File opened for modification C:\Program Files (x86)\SpywareBlaster\unins000.dat spywareblastersetup55.tmp File created C:\Program Files\Cloudflare\Cloudflare WARP\warp-cli.exe msiexec.exe File created C:\Program Files (x86)\SpywareBlaster\is-8KL9H.tmp spywareblastersetup55.tmp File created C:\Program Files (x86)\SpywareBlaster\is-6IVNJ.tmp spywareblastersetup55.tmp File opened for modification C:\Program Files (x86)\SpywareBlaster\chromeckdb.dtb spywareblaster.exe File created C:\Program Files\Cloudflare\Cloudflare WARP\warp_ipc.dll msiexec.exe File created C:\Program Files (x86)\SpywareBlaster\is-M27PV.tmp spywareblastersetup55.tmp File created C:\Program Files (x86)\SpywareBlaster\is-5JMAU.tmp spywareblastersetup55.tmp File created C:\Program Files (x86)\SpywareBlaster\is-U645L.tmp spywareblastersetup55.tmp File created C:\Program Files (x86)\SpywareBlaster\is-74T0S.tmp spywareblastersetup55.tmp File created C:\Program Files (x86)\SpywareBlaster\is-RS923.tmp spywareblastersetup55.tmp File created C:\Program Files (x86)\SpywareBlaster\is-1DVF9.tmp spywareblastersetup55.tmp File created C:\Program Files (x86)\SpywareBlaster\is-R2LTS.tmp spywareblastersetup55.tmp File created C:\Program Files\Cloudflare\Cloudflare WARP\warp-dex.exe msiexec.exe File created C:\Program Files\Cloudflare\Cloudflare WARP\warp-svc.exe msiexec.exe File created C:\Program Files\Cloudflare\Cloudflare WARP\wintun.dll msiexec.exe File created C:\Program Files (x86)\SpywareBlaster\is-GVA7R.tmp spywareblastersetup55.tmp File created C:\Program Files (x86)\SpywareBlaster\is-TSTSU.tmp spywareblastersetup55.tmp File opened for modification C:\Program Files (x86)\SpywareBlaster\ckdatabase.dtb spywareblaster.exe File opened for modification C:\Program Files (x86)\SpywareBlaster\chromescdb.dtb spywareblaster.exe File created C:\Program Files (x86)\SpywareBlaster\is-M78VB.tmp spywareblastersetup55.tmp File opened for modification C:\Program Files (x86)\SpywareBlaster\rsdatabase.dtb spywareblaster.exe File created C:\Program Files\Cloudflare\Cloudflare WARP\warp-diag.exe msiexec.exe File created C:\Program Files (x86)\SpywareBlaster\dep\is-FCFTH.tmp spywareblastersetup55.tmp File created C:\Program Files (x86)\SpywareBlaster\is-I8R0B.tmp spywareblastersetup55.tmp File created C:\Program Files (x86)\SpywareBlaster\is-M9I61.tmp spywareblastersetup55.tmp File created C:\Program Files\Cloudflare\Cloudflare WARP\Cloudflare WARP.exe msiexec.exe File created C:\Program Files (x86)\SpywareBlaster\unins000.dat spywareblastersetup55.tmp File created C:\Program Files (x86)\SpywareBlaster\is-Q88TJ.tmp spywareblastersetup55.tmp File created C:\Program Files (x86)\SpywareBlaster\is-9UB3V.tmp spywareblastersetup55.tmp File created C:\Program Files (x86)\SpywareBlaster\is-MUC8D.tmp spywareblastersetup55.tmp File created C:\Program Files (x86)\SpywareBlaster\is-LHJJU.tmp spywareblastersetup55.tmp -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\Installer\e5d9a17.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI9A9E.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{C69BD129-10F4-4332-A279-B754DE05A911} msiexec.exe File opened for modification C:\Windows\Installer\SFXCA9DE06CBCE040D61B7E6C0E313D4C8E2F\WixToolset.Dtf.WindowsInstaller.dll rundll32.exe File created C:\Windows\SystemTemp\~DFC7AB152AC80A6DA4.TMP msiexec.exe File opened for modification C:\Windows\Installer\SFXCA9DE06CBCE040D61B7E6C0E313D4C8E2F\RequestSender.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI676B.tmp-0\Warp.Installer.Actions.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI9AFD.tmp msiexec.exe File opened for modification C:\Windows\Installer\SFXCA68BD3185194C5A88D656F9EF9C7F66CA\Microsoft.Win32.TaskScheduler.resources.dll rundll32.exe File opened for modification C:\Windows\Installer\SFXCAADA352EFAD4D0C9B955F6A1BEE02C4A8\Microsoft.Win32.TaskScheduler.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI595D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5A88.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9AED.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9B1F.tmp msiexec.exe File opened for modification C:\Windows\Installer\SFXCA68BD3185194C5A88D656F9EF9C7F66CA\RequestSender.dll rundll32.exe File created C:\Windows\SystemTemp\~DF5D81C213D985497C.TMP msiexec.exe File created C:\Windows\SystemTemp\~DF55D1B771AAA03824.TMP msiexec.exe File opened for modification C:\Windows\Installer\SFXCAADA352EFAD4D0C9B955F6A1BEE02C4A8\WixToolset.Dtf.WindowsInstaller.dll rundll32.exe File created C:\Windows\SystemTemp\~DF2A4D65D3C933EE81.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI59AC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5BE1.tmp-0\Newtonsoft.Json.dll rundll32.exe File created C:\Windows\SystemTemp\~DF63EFD34546708156.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI676B.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\SFXCA9DE06CBCE040D61B7E6C0E313D4C8E2F\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\e5d9a10.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI9CD7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAC1E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI69CD.tmp msiexec.exe File opened for modification C:\Windows\Installer\{09B66760-FE2C-426F-852E-296E112C2DB4}\icon.ico msiexec.exe File created C:\Windows\SystemTemp\~DF2E96A6FD7FAC738C.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI9BEC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9F2C.tmp msiexec.exe File opened for modification C:\Windows\Installer\SFXCAADA352EFAD4D0C9B955F6A1BEE02C4A8\RequestSender.dll rundll32.exe File opened for modification C:\Windows\Installer\SFXCAADA352EFAD4D0C9B955F6A1BEE02C4A8\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSI676B.tmp-0\Common.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI5BE1.tmp-0\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI9A8D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9D07.tmp msiexec.exe File created C:\Windows\Installer\e5d9a14.msi msiexec.exe File opened for modification C:\Windows\Installer\SFXCAADA352EFAD4D0C9B955F6A1BEE02C4A8\Microsoft.Win32.TaskScheduler.resources.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI676B.tmp-0\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSI6C5F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9B0E.tmp msiexec.exe File opened for modification C:\Windows\Installer\SFXCA68BD3185194C5A88D656F9EF9C7F66CA\Microsoft.Win32.TaskScheduler.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI9D27.tmp msiexec.exe File opened for modification C:\Windows\Installer\SFXCA9DE06CBCE040D61B7E6C0E313D4C8E2F\Microsoft.Win32.TaskScheduler.resources.dll rundll32.exe File created C:\Windows\Installer\e5d9a15.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI5BE1.tmp msiexec.exe File created C:\Windows\Installer\{09B66760-FE2C-426F-852E-296E112C2DB4}\icon.ico msiexec.exe File opened for modification C:\Windows\Installer\SFXCA68BD3185194C5A88D656F9EF9C7F66CA\WixToolset.Dtf.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI9B7D.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFDD638D8AECBE9200.TMP msiexec.exe File created C:\Windows\SystemTemp\~DFFF32223B3469DB10.TMP msiexec.exe File opened for modification C:\Windows\Installer\e5d9a15.msi msiexec.exe File created C:\Windows\Installer\SourceHash{09B66760-FE2C-426F-852E-296E112C2DB4} msiexec.exe File opened for modification C:\Windows\Installer\MSI5BE1.tmp-0\Common.dll rundll32.exe File created C:\Windows\Installer\e5d9a10.msi msiexec.exe File opened for modification C:\Windows\Installer\SFXCA68BD3185194C5A88D656F9EF9C7F66CA\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSIA8E1.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5BE1.tmp-0\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSI676B.tmp-0\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5680 sc.exe 3268 sc.exe 3352 sc.exe 5572 sc.exe 3948 sc.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 4 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\HiJackThis.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\spywareblastersetup55.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\Let's Compress.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\SpybotPortable_2.6.paf.exe:Zone.Identifier msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spywareblastersetup55.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spywareblaster.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SDScan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spywareblaster.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spywareblaster.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spywareblaster.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spywareblastersetup55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spywareblaster.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Let's Compress.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SDWelcome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spywareblaster.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpybotPortable_2.6.paf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpybotPortable.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HiJackThis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe -
Kills process with taskkill 1 IoCs
pid Process 4984 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{C74190B6-8589-11D1-B16A-00C0F0283628} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{C74190B6-8589-11D1-B16A-00C0F0283628}\Compatibility Flags = "1024" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{9181DC5F-E07D-418A-ACA6-8EEA1ECB8E9E} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{8E3867A3-8586-11D1-B16A-00C0F0283628}\AlternateCLSID = "{585AA280-ED8B-46B2-93AE-132ECFA1DAFC}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{627C8B79-918A-4C5C-9E19-20F66BF30B86}\AlternateCLSID = "{585AA280-ED8B-46B2-93AE-132ECFA1DAFC}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{1EFB6596-857C-11D1-B16A-00C0F0283628}\AlternateCLSID = "{9A948063-66C3-4F63-AB46-582EDAA35047}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{35053A22-8589-11D1-B16A-00C0F0283628} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{2C247F23-8591-11D1-B16A-00C0F0283628}\AlternateCLSID = "{556C2772-F1AD-4DE1-8456-BD6E8F66113B}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{627C8B79-918A-4C5C-9E19-20F66BF30B86} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{979127D3-7D01-4FDE-AF65-A698091468AF}\AlternateCLSID = "{CCDB0DF2-FD1A-4856-80BC-32929D8359B7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{2B11E9B0-9F09-11D0-9484-00A0C91110ED} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{DD9DA666-8594-11D1-B16A-00C0F0283628}\AlternateCLSID = "{87DACC48-F1C5-4AF3-84BA-A2A72C2AB959}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{F08DF954-8592-11D1-B16A-00C0F0283628} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{7DC6F291-BF55-4E50-B619-EF672D9DCC58} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{9181DC5F-E07D-418A-ACA6-8EEA1ECB8E9E}\Compatibility Flags = "1024" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{9181DC5F-E07D-418A-ACA6-8EEA1ECB8E9E}\AlternateCLSID = "{95F0B3BE-E8AC-4995-9DCA-419849E06410}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{2B11E9B0-9F09-11D0-9484-00A0C91110ED}\AlternateCLSID = "{1EAC2F2A-251F-4BA8-8617-99A8DD715453}" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{99FF4677-FFC3-11D0-BD02-00C04FC2FB86}\Compatibility Flags = "1024" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{DD9DA666-8594-11D1-B16A-00C0F0283628} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{F91CAF91-225B-43A7-BB9E-472F991FC402} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{979127D3-7D01-4FDE-AF65-A698091468AF} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{35053A22-8589-11D1-B16A-00C0F0283628}\Compatibility Flags = "1024" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{F08DF954-8592-11D1-B16A-00C0F0283628}\Compatibility Flags = "1024" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{F91CAF91-225B-43A7-BB9E-472F991FC402}\AlternateCLSID = "{556C2772-F1AD-4DE1-8456-BD6E8F66113B}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{BDD1F04B-858B-11D1-B16A-00C0F0283628} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{BDD1F04B-858B-11D1-B16A-00C0F0283628}\AlternateCLSID = "{CCDB0DF2-FD1A-4856-80BC-32929D8359B7}" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{627C8B79-918A-4C5C-9E19-20F66BF30B86}\Compatibility Flags = "1024" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{1EFB6596-857C-11D1-B16A-00C0F0283628} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{99FF4677-FFC3-11D0-BD02-00C04FC2FB86}\AlternateCLSID = "{D606EEC9-8368-4F10-88DB-BF5563EC36F6}" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{7DC6F291-BF55-4E50-B619-EF672D9DCC58}\Compatibility Flags = "1024" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{2B11E9B0-9F09-11D0-9484-00A0C91110ED}\Compatibility Flags = "1024" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{BDD1F04B-858B-11D1-B16A-00C0F0283628}\Compatibility Flags = "1024" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{2C247F23-8591-11D1-B16A-00C0F0283628} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{7DC6F291-BF55-4E50-B619-EF672D9DCC58}\AlternateCLSID = "{8B2ADD10-33B7-4506-9569-0A1E1DBBEBAE}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{996BF5E0-8044-4650-ADEB-0B013914E99C} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{66833FE6-8583-11D1-B16A-00C0F0283628} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{99FF4677-FFC3-11D0-BD02-00C04FC2FB86} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{DD9DA666-8594-11D1-B16A-00C0F0283628}\Compatibility Flags = "1024" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{2C247F23-8591-11D1-B16A-00C0F0283628}\Compatibility Flags = "1024" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{6D835690-900B-11D0-9484-00A0C91110ED} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{35053A22-8589-11D1-B16A-00C0F0283628}\AlternateCLSID = "{A0E7BF67-8D30-4620-8825-7111714C7CAB}" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{66833FE6-8583-11D1-B16A-00C0F0283628}\Compatibility Flags = "1024" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{66833FE6-8583-11D1-B16A-00C0F0283628}\AlternateCLSID = "{8B2ADD10-33B7-4506-9569-0A1E1DBBEBAE}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{C74190B6-8589-11D1-B16A-00C0F0283628}\AlternateCLSID = "{95F0B3BE-E8AC-4995-9DCA-419849E06410}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{6D835690-900B-11D0-9484-00A0C91110ED}\AlternateCLSID = "{7E96FC67-468E-4E70-B246-D42078DD2361}" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{996BF5E0-8044-4650-ADEB-0B013914E99C}\Compatibility Flags = "1024" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{979127D3-7D01-4FDE-AF65-A698091468AF}\Compatibility Flags = "1024" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{F08DF954-8592-11D1-B16A-00C0F0283628}\AlternateCLSID = "{0B314611-2C19-4AB4-8513-A6EEA569D3C4}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{8E3867A3-8586-11D1-B16A-00C0F0283628} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{8E3867A3-8586-11D1-B16A-00C0F0283628}\Compatibility Flags = "1024" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{1EFB6596-857C-11D1-B16A-00C0F0283628}\Compatibility Flags = "1024" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{24B224E0-9545-4A2F-ABD5-86AA8A849385}\Compatibility Flags = "1024" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{6D835690-900B-11D0-9484-00A0C91110ED}\Compatibility Flags = "1024" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{F91CAF91-225B-43A7-BB9E-472F991FC402}\Compatibility Flags = "1024" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{24B224E0-9545-4A2F-ABD5-86AA8A849385} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{996BF5E0-8044-4650-ADEB-0B013914E99C}\AlternateCLSID = "{CCDB0DF2-FD1A-4856-80BC-32929D8359B7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{24B224E0-9545-4A2F-ABD5-86AA8A849385}\AlternateCLSID = "{9A948063-66C3-4F63-AB46-582EDAA35047}" regsvr32.exe -
Modifies data under HKEY_USERS 11 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Safer Networking Limited\Localization\C:\Users\Admin\Downloads\SpybotPortable\App\Spybot\ = "en_IE" SDWelcome.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Safer Networking Limited\Localization\C:\Users\Admin\Downloads\SpybotPortable\App\Spybot\ = "en_IE" SDScan.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Safer Networking Limited\Localization SDWelcome.exe Key created \REGISTRY\USER\.DEFAULT SDWelcome.exe Key created \REGISTRY\USER\.DEFAULT\Software SDWelcome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Safer Networking Limited SDWelcome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Safer Networking Limited\Localization\ SDWelcome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Safer Networking Limited\Localization SDScan.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{24B224E0-9545-4A2F-ABD5-86AA8A849385}\MiscStatus\1\ = "131473" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.ProgCtrl regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C27CCE3A-8596-11D1-B16A-00C0F0283628}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66833FED-8583-11D1-B16A-00C0F0283628} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F91CAF91-225B-43A7-BB9E-472F991FC402}\ToolboxBitmap32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F91CAF91-225B-43A7-BB9E-472F991FC402}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{627C8B79-918A-4C5C-9E19-20F66BF30B86}\CONTROL regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3B6C15BE-F9FD-7E15-F865-ABA8E2A09915}\lxSffdZrpjp\ = "_`wB|iP" spywareblaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSSTDFMT.StdDataFormats\CLSID\ = "{99FF4677-FFC3-11D0-BD02-00C04FC2FB86}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9181DC5F-E07D-418A-ACA6-8EEA1ECB8E9E}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66833FE6-8583-11D1-B16A-00C0F0283628}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0B314611-2C19-4AB4-8513-A6EEA569D3C4}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BDD1F055-858B-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2C247F22-8591-11D1-B16A-00C0F0283628}\TypeLib\Version = "2.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3B6C15BE-F9FD-7E15-F865-ABA8E2A09915}\lxSffdZrpjp\ = "_gM}]O@" spywareblaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.TreeCtrl\CLSID\ = "{95F0B3BE-E8AC-4995-9DCA-419849E06410}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{24B224E0-9545-4A2F-ABD5-86AA8A849385}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{556C2772-F1AD-4DE1-8456-BD6E8F66113B}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.ImageComboCtl\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99FF4676-FFC3-11D0-BD02-00C04FC2FB86}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C74190B6-8589-11D1-B16A-00C0F0283628}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{24B224E0-9545-4A2F-ABD5-86AA8A849385}\VersionIndependentProgID\ = "MSComctlLib.TabStrip" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7DC6F291-BF55-4E50-B619-EF672D9DCC58}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{627C8B79-918A-4C5C-9E19-20F66BF30B86}\Version\ = "2.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0B314611-2C19-4AB4-8513-A6EEA569D3C4}\ProgID\ = "MSComctlLib.Slider.2" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EFB6597-857C-11D1-B16A-00C0F0283628} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DD9DA660-8594-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7DC6F291-BF55-4E50-B619-EF672D9DCC58}\ToolboxBitmap32 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2287204051-441334380-1151193565-1000_Classes\{5C321E34-4206-13D1-B2E4-0060975B8649}\bgyxwhiefeT\ = "[kA[dB^Y\\IM`hHjIfVzernEmjzT" spywareblaster.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CCDB0DF2-FD1A-4856-80BC-32929D8359B7}\MiscStatus regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35053A22-8589-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}\2.1\HELPDIR\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C74190B8-8589-11D1-B16A-00C0F0283628}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2C247F24-8591-11D1-B16A-00C0F0283628}\TypeLib\Version = "2.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F08DF952-8592-11D1-B16A-00C0F0283628}\TypeLib\Version = "2.1" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9A948063-66C3-4F63-AB46-582EDAA35047} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C247F23-8591-11D1-B16A-00C0F0283628}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35053A22-8589-11D1-B16A-00C0F0283628}\ProgID\ = "MSComctlLib.ProgCtrl.2" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DD9DA660-8594-11D1-B16A-00C0F0283628}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B11E9B0-9F09-11D0-9484-00A0C91110ED}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66833FE6-8583-11D1-B16A-00C0F0283628}\MiscStatus regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BDD1F049-858B-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BDD1F04E-858B-11D1-B16A-00C0F0283628}\TypeLib\Version = "2.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSSTDFMT.StdDataFormats.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99FF4676-FFC3-11D0-BD02-00C04FC2FB86}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BDD1F049-858B-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87DACC48-F1C5-4AF3-84BA-A2A72C2AB959}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95F0B3BE-E8AC-4995-9DCA-419849E06410}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.Slider.2\CLSID\ = "{F08DF954-8592-11D1-B16A-00C0F0283628}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F08DF954-8592-11D1-B16A-00C0F0283628}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A0E7BF67-8D30-4620-8825-7111714C7CAB}\ToolboxBitmap32\ = "C:\\Windows\\SysWow64\\MSCOMCTL.OCX, 17" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C8A3DC00-8593-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DD9DA660-8594-11D1-B16A-00C0F0283628}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{979127D3-7D01-4FDE-AF65-A698091468AF} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.TabStrip.2 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{585AA280-ED8B-46B2-93AE-132ECFA1DAFC}\Version\ = "2.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B11E9B0-9F09-11D0-9484-00A0C91110ED}\Version\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{99FF4677-FFC3-11D0-BD02-00C04FC2FB86}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.ImageListCtrl\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C74190B4-8589-11D1-B16A-00C0F0283628}\ = "ITreeView" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DD9DA662-8594-11D1-B16A-00C0F0283628}\ = "IComboItems" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F08DF954-8592-11D1-B16A-00C0F0283628} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9181DC5F-E07D-418A-ACA6-8EEA1ECB8E9E}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A0E7BF67-8D30-4620-8825-7111714C7CAB}\ProgID\ = "MSComctlLib.ProgCtrl.2" regsvr32.exe -
Modifies system certificate store 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 SDWelcome.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 SDWelcome.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 SDWelcome.exe -
NTFS ADS 9 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\SpybotPortable_2.6.paf.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\netspeedmonitor_2_5_4_0_x64_setup.msi:Zone.Identifier msedge.exe File created C:\ProgramData\TEMP:5C321E34 spywareblaster.exe File opened for modification C:\ProgramData\TEMP:5C321E34 spywareblaster.exe File opened for modification C:\Users\Admin\Downloads\Let's Compress.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\HiJackThis.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\1111_with_WARP_V2024.12.760.0.msi:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\spywareblastersetup55.exe:Zone.Identifier msedge.exe File opened for modification C:\ProgramData\TEMP:5C321E34 spywareblaster.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5824 schtasks.exe 5288 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 4028 msiexec.exe 4028 msiexec.exe 5176 SpybotPortable_2.6.paf.exe 5176 SpybotPortable_2.6.paf.exe 5484 SpybotPortable.exe 5484 SpybotPortable.exe 5396 SDWelcome.exe 5396 SDWelcome.exe 5860 HiJackThis.exe 5860 HiJackThis.exe 5860 HiJackThis.exe 5860 HiJackThis.exe 5860 HiJackThis.exe 5860 HiJackThis.exe 4456 SDScan.exe 4456 SDScan.exe 5148 Cloudflare WARP.exe 5148 Cloudflare WARP.exe 5148 Cloudflare WARP.exe 3824 spywareblaster.exe 3824 spywareblaster.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5396 SDWelcome.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 672 Process not Found 672 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 4028 msiexec.exe Token: SeCreateTokenPrivilege 4452 Let's Compress.exe Token: SeAssignPrimaryTokenPrivilege 4452 Let's Compress.exe Token: SeLockMemoryPrivilege 4452 Let's Compress.exe Token: SeIncreaseQuotaPrivilege 4452 Let's Compress.exe Token: SeMachineAccountPrivilege 4452 Let's Compress.exe Token: SeTcbPrivilege 4452 Let's Compress.exe Token: SeSecurityPrivilege 4452 Let's Compress.exe Token: SeTakeOwnershipPrivilege 4452 Let's Compress.exe Token: SeLoadDriverPrivilege 4452 Let's Compress.exe Token: SeSystemProfilePrivilege 4452 Let's Compress.exe Token: SeSystemtimePrivilege 4452 Let's Compress.exe Token: SeProfSingleProcessPrivilege 4452 Let's Compress.exe Token: SeIncBasePriorityPrivilege 4452 Let's Compress.exe Token: SeCreatePagefilePrivilege 4452 Let's Compress.exe Token: SeCreatePermanentPrivilege 4452 Let's Compress.exe Token: SeBackupPrivilege 4452 Let's Compress.exe Token: SeRestorePrivilege 4452 Let's Compress.exe Token: SeShutdownPrivilege 4452 Let's Compress.exe Token: SeDebugPrivilege 4452 Let's Compress.exe Token: SeAuditPrivilege 4452 Let's Compress.exe Token: SeSystemEnvironmentPrivilege 4452 Let's Compress.exe Token: SeChangeNotifyPrivilege 4452 Let's Compress.exe Token: SeRemoteShutdownPrivilege 4452 Let's Compress.exe Token: SeUndockPrivilege 4452 Let's Compress.exe Token: SeSyncAgentPrivilege 4452 Let's Compress.exe Token: SeEnableDelegationPrivilege 4452 Let's Compress.exe Token: SeManageVolumePrivilege 4452 Let's Compress.exe Token: SeImpersonatePrivilege 4452 Let's Compress.exe Token: SeCreateGlobalPrivilege 4452 Let's Compress.exe Token: SeCreateTokenPrivilege 4452 Let's Compress.exe Token: SeAssignPrimaryTokenPrivilege 4452 Let's Compress.exe Token: SeLockMemoryPrivilege 4452 Let's Compress.exe Token: SeIncreaseQuotaPrivilege 4452 Let's Compress.exe Token: SeMachineAccountPrivilege 4452 Let's Compress.exe Token: SeTcbPrivilege 4452 Let's Compress.exe Token: SeSecurityPrivilege 4452 Let's Compress.exe Token: SeTakeOwnershipPrivilege 4452 Let's Compress.exe Token: SeLoadDriverPrivilege 4452 Let's Compress.exe Token: SeSystemProfilePrivilege 4452 Let's Compress.exe Token: SeSystemtimePrivilege 4452 Let's Compress.exe Token: SeProfSingleProcessPrivilege 4452 Let's Compress.exe Token: SeIncBasePriorityPrivilege 4452 Let's Compress.exe Token: SeCreatePagefilePrivilege 4452 Let's Compress.exe Token: SeCreatePermanentPrivilege 4452 Let's Compress.exe Token: SeBackupPrivilege 4452 Let's Compress.exe Token: SeRestorePrivilege 4452 Let's Compress.exe Token: SeShutdownPrivilege 4452 Let's Compress.exe Token: SeDebugPrivilege 4452 Let's Compress.exe Token: SeAuditPrivilege 4452 Let's Compress.exe Token: SeSystemEnvironmentPrivilege 4452 Let's Compress.exe Token: SeChangeNotifyPrivilege 4452 Let's Compress.exe Token: SeRemoteShutdownPrivilege 4452 Let's Compress.exe Token: SeUndockPrivilege 4452 Let's Compress.exe Token: SeSyncAgentPrivilege 4452 Let's Compress.exe Token: SeEnableDelegationPrivilege 4452 Let's Compress.exe Token: SeManageVolumePrivilege 4452 Let's Compress.exe Token: SeImpersonatePrivilege 4452 Let's Compress.exe Token: SeCreateGlobalPrivilege 4452 Let's Compress.exe Token: SeCreateTokenPrivilege 4452 Let's Compress.exe Token: SeAssignPrimaryTokenPrivilege 4452 Let's Compress.exe Token: SeLockMemoryPrivilege 4452 Let's Compress.exe Token: SeIncreaseQuotaPrivilege 4452 Let's Compress.exe Token: SeMachineAccountPrivilege 4452 Let's Compress.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 4452 Let's Compress.exe 3380 msiexec.exe 3380 msiexec.exe 5176 SpybotPortable_2.6.paf.exe 5396 SDWelcome.exe 5860 HiJackThis.exe 4456 SDScan.exe 4220 msiexec.exe 760 msiexec.exe 760 msiexec.exe 4220 msiexec.exe 3640 spywareblastersetup55.tmp -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 5860 HiJackThis.exe 228 spywareblaster.exe 3824 spywareblaster.exe 3824 spywareblaster.exe 3824 spywareblaster.exe 3824 spywareblaster.exe 3824 spywareblaster.exe 3824 spywareblaster.exe 3824 spywareblaster.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4028 wrote to memory of 2956 4028 msiexec.exe 121 PID 4028 wrote to memory of 2956 4028 msiexec.exe 121 PID 4028 wrote to memory of 2956 4028 msiexec.exe 121 PID 4452 wrote to memory of 3380 4452 Let's Compress.exe 122 PID 4452 wrote to memory of 3380 4452 Let's Compress.exe 122 PID 4452 wrote to memory of 3380 4452 Let's Compress.exe 122 PID 4028 wrote to memory of 3284 4028 msiexec.exe 123 PID 4028 wrote to memory of 3284 4028 msiexec.exe 123 PID 4028 wrote to memory of 3284 4028 msiexec.exe 123 PID 3284 wrote to memory of 4548 3284 MsiExec.exe 124 PID 3284 wrote to memory of 4548 3284 MsiExec.exe 124 PID 3284 wrote to memory of 4548 3284 MsiExec.exe 124 PID 3284 wrote to memory of 3568 3284 MsiExec.exe 125 PID 3284 wrote to memory of 3568 3284 MsiExec.exe 125 PID 3284 wrote to memory of 3568 3284 MsiExec.exe 125 PID 3284 wrote to memory of 5784 3284 MsiExec.exe 128 PID 3284 wrote to memory of 5784 3284 MsiExec.exe 128 PID 3284 wrote to memory of 5784 3284 MsiExec.exe 128 PID 5176 wrote to memory of 5484 5176 SpybotPortable_2.6.paf.exe 154 PID 5176 wrote to memory of 5484 5176 SpybotPortable_2.6.paf.exe 154 PID 5176 wrote to memory of 5484 5176 SpybotPortable_2.6.paf.exe 154 PID 5484 wrote to memory of 5396 5484 SpybotPortable.exe 155 PID 5484 wrote to memory of 5396 5484 SpybotPortable.exe 155 PID 5484 wrote to memory of 5396 5484 SpybotPortable.exe 155 PID 5860 wrote to memory of 5240 5860 HiJackThis.exe 160 PID 5860 wrote to memory of 5240 5860 HiJackThis.exe 160 PID 5396 wrote to memory of 4456 5396 SDWelcome.exe 163 PID 5396 wrote to memory of 4456 5396 SDWelcome.exe 163 PID 5396 wrote to memory of 4456 5396 SDWelcome.exe 163 PID 4028 wrote to memory of 3340 4028 msiexec.exe 193 PID 4028 wrote to memory of 3340 4028 msiexec.exe 193 PID 4028 wrote to memory of 5644 4028 msiexec.exe 195 PID 4028 wrote to memory of 5644 4028 msiexec.exe 195 PID 4028 wrote to memory of 5644 4028 msiexec.exe 195 PID 4028 wrote to memory of 1920 4028 msiexec.exe 196 PID 4028 wrote to memory of 1920 4028 msiexec.exe 196 PID 1920 wrote to memory of 1036 1920 MsiExec.exe 197 PID 1920 wrote to memory of 1036 1920 MsiExec.exe 197 PID 1920 wrote to memory of 1988 1920 MsiExec.exe 198 PID 1920 wrote to memory of 1988 1920 MsiExec.exe 198 PID 1988 wrote to memory of 3948 1988 rundll32.exe 199 PID 1988 wrote to memory of 3948 1988 rundll32.exe 199 PID 1988 wrote to memory of 5680 1988 rundll32.exe 201 PID 1988 wrote to memory of 5680 1988 rundll32.exe 201 PID 1988 wrote to memory of 3268 1988 rundll32.exe 219 PID 1988 wrote to memory of 3268 1988 rundll32.exe 219 PID 1988 wrote to memory of 3352 1988 rundll32.exe 205 PID 1988 wrote to memory of 3352 1988 rundll32.exe 205 PID 1988 wrote to memory of 5572 1988 rundll32.exe 251 PID 1988 wrote to memory of 5572 1988 rundll32.exe 251 PID 4028 wrote to memory of 2504 4028 msiexec.exe 209 PID 4028 wrote to memory of 2504 4028 msiexec.exe 209 PID 4028 wrote to memory of 2504 4028 msiexec.exe 209 PID 4028 wrote to memory of 5148 4028 msiexec.exe 210 PID 4028 wrote to memory of 5148 4028 msiexec.exe 210 PID 4364 wrote to memory of 3640 4364 spywareblastersetup55.exe 236 PID 4364 wrote to memory of 3640 4364 spywareblastersetup55.exe 236 PID 4364 wrote to memory of 3640 4364 spywareblastersetup55.exe 236 PID 3640 wrote to memory of 3456 3640 spywareblastersetup55.tmp 309 PID 3640 wrote to memory of 3456 3640 spywareblastersetup55.tmp 309 PID 3640 wrote to memory of 3456 3640 spywareblastersetup55.tmp 309 PID 3640 wrote to memory of 5404 3640 spywareblastersetup55.tmp 253 PID 3640 wrote to memory of 5404 3640 spywareblastersetup55.tmp 253 PID 3640 wrote to memory of 5404 3640 spywareblastersetup55.tmp 253 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 6720 attrib.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://example.com1⤵PID:3292
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --always-read-main-dll --field-trial-handle=5260,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=3776 /prefetch:11⤵PID:2844
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --always-read-main-dll --field-trial-handle=3892,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=5128 /prefetch:11⤵PID:4160
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --always-read-main-dll --field-trial-handle=5396,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=5608 /prefetch:11⤵PID:4324
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=5636,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=5752 /prefetch:141⤵PID:704
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --string-annotations --always-read-main-dll --field-trial-handle=5756,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=5780 /prefetch:141⤵PID:3456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --always-read-main-dll --field-trial-handle=6200,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6184 /prefetch:11⤵PID:4004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --always-read-main-dll --field-trial-handle=6172,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=1832 /prefetch:11⤵PID:1612
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --string-annotations --always-read-main-dll --field-trial-handle=6176,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6148 /prefetch:141⤵PID:240
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --string-annotations --always-read-main-dll --field-trial-handle=5900,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=5912 /prefetch:141⤵PID:1532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=39 --always-read-main-dll --field-trial-handle=6564,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=5840 /prefetch:11⤵PID:460
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --always-read-main-dll --field-trial-handle=5792,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6568 /prefetch:11⤵PID:1896
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --always-read-main-dll --field-trial-handle=6732,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6700 /prefetch:11⤵PID:2232
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=42 --always-read-main-dll --field-trial-handle=6584,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=4360 /prefetch:11⤵PID:3368
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=6876,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6756 /prefetch:141⤵PID:1264
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=6876,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6756 /prefetch:141⤵PID:748
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=44 --always-read-main-dll --field-trial-handle=6984,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6748 /prefetch:11⤵PID:2712
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=45 --always-read-main-dll --field-trial-handle=5364,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6692 /prefetch:11⤵PID:4420
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=46 --always-read-main-dll --field-trial-handle=7120,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7140 /prefetch:11⤵PID:4868
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=47 --always-read-main-dll --field-trial-handle=7292,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7372 /prefetch:11⤵PID:3100
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=48 --always-read-main-dll --field-trial-handle=7344,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7376 /prefetch:11⤵PID:2812
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=49 --always-read-main-dll --field-trial-handle=7628,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7216 /prefetch:11⤵PID:4392
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=50 --always-read-main-dll --field-trial-handle=7184,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7916 /prefetch:11⤵PID:2620
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=51 --always-read-main-dll --field-trial-handle=8028,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7216 /prefetch:11⤵PID:4672
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=52 --always-read-main-dll --field-trial-handle=7256,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7424 /prefetch:11⤵PID:3704
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=53 --always-read-main-dll --field-trial-handle=7980,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7548 /prefetch:11⤵PID:3308
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=54 --always-read-main-dll --field-trial-handle=8072,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7972 /prefetch:11⤵PID:2848
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=55 --always-read-main-dll --field-trial-handle=8080,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7864 /prefetch:11⤵PID:4616
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=56 --always-read-main-dll --field-trial-handle=6260,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7968 /prefetch:11⤵PID:3604
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --string-annotations --always-read-main-dll --field-trial-handle=7232,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=4764 /prefetch:141⤵PID:1076
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=58 --always-read-main-dll --field-trial-handle=7952,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6700 /prefetch:11⤵PID:2456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=7880,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=8816 /prefetch:141⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:1440
-
C:\Users\Admin\Downloads\Let's Compress.exe"C:\Users\Admin\Downloads\Let's Compress.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Let's Compress\Let's Compress 1.4.0.0\install\E05A911\Let's Compress.msi" AI_SETUPEXEPATH="C:\Users\Admin\Downloads\Let's Compress.exe" SETUPEXEDIR=C:\Users\Admin\Downloads\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1740092443 " AI_EUIMSI=""2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:3380
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F35CAF47A7A7BCB529E88669D6092D3A C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2956
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding FCFDA35932515D45A326950BBD9679642⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSI9A8D.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_241015500 2 RequestSender!RequestSender.CustomActions.Start3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4548
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSI9D27.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_241016093 60 RequestSender!RequestSender.CustomActions.CreateScheduledTask3⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3568
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSIAC1E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_241019921 1939 RequestSender!RequestSender.CustomActions.Finish3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5784
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:3340
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 08B7EBD7AD205BD9150AA00A84289C032⤵
- System Location Discovery: System Language Discovery
PID:5644
-
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding BD2861D8A9B43343B6DB9370F3F96C48 E Global\MSI00002⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Windows\Installer\MSI5BE1.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_241196046 1968 Warp.Installer.Actions!Warp.Installer.Actions.CustomActions.ReadCmdLineParams3⤵
- Drops file in Windows directory
PID:1036
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Windows\Installer\MSI676B.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_241198953 1979 Warp.Installer.Actions!Warp.Installer.Actions.CustomActions.InstallService3⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\system32\sc.exe"sc.exe" create CloudflareWARP binPath= "\"C:\Program Files\Cloudflare\Cloudflare WARP\warp-svc.exe"\" displayname= "Cloudflare WARP" start= "auto"4⤵
- Network Service Discovery
- Launches sc.exe
PID:3948
-
-
C:\Windows\system32\sc.exe"sc.exe" config CloudflareWARP depend= "wlansvc"4⤵
- Launches sc.exe
PID:5680
-
-
C:\Windows\system32\sc.exe"sc.exe" failure CloudflareWARP reset= 86400 actions= restart/0/restart/1000/restart/50004⤵
- Launches sc.exe
PID:3268
-
-
C:\Windows\system32\sc.exe"sc.exe" failureflag CloudflareWARP 14⤵
- Launches sc.exe
PID:3352
-
-
C:\Windows\system32\sc.exe"sc.exe" config CloudflareWARP start=AUTO4⤵
- Launches sc.exe
PID:5572
-
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C09C9FE51AD7603B7E50AB4BEAAED142 E Global\MSI00002⤵
- System Location Discovery: System Language Discovery
PID:2504
-
-
C:\Program Files\Cloudflare\Cloudflare WARP\Cloudflare WARP.exe"C:\Program Files\Cloudflare\Cloudflare WARP\Cloudflare WARP.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=60 --always-read-main-dll --field-trial-handle=8052,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7136 /prefetch:11⤵PID:3568
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=61 --always-read-main-dll --field-trial-handle=5584,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7340 /prefetch:11⤵PID:1920
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=62 --always-read-main-dll --field-trial-handle=7800,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=5596 /prefetch:11⤵PID:992
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=63 --always-read-main-dll --field-trial-handle=9160,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7588 /prefetch:11⤵PID:5656
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=64 --always-read-main-dll --field-trial-handle=9320,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7212 /prefetch:11⤵PID:5852
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=65 --always-read-main-dll --field-trial-handle=6692,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7956 /prefetch:11⤵PID:5892
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=66 --always-read-main-dll --field-trial-handle=7764,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7752 /prefetch:11⤵PID:4420
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=67 --always-read-main-dll --field-trial-handle=7152,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9540 /prefetch:11⤵PID:1168
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=5352,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=4644 /prefetch:141⤵PID:4456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=6804,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6820 /prefetch:141⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:6036
-
C:\Users\Admin\Downloads\SpybotPortable_2.6.paf.exe"C:\Users\Admin\Downloads\SpybotPortable_2.6.paf.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5176 -
C:\Users\Admin\Downloads\SpybotPortable\SpybotPortable.exe"C:\Users\Admin\Downloads\SpybotPortable\SpybotPortable.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5484 -
C:\Users\Admin\Downloads\SpybotPortable\App\Spybot\SDWelcome.exe"C:\Users\Admin\Downloads\SpybotPortable\App\Spybot\SDWelcome.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5396 -
C:\Users\Admin\Downloads\SpybotPortable\App\Spybot\SDScan.exe"C:\Users\Admin\Downloads\SpybotPortable\App\Spybot\SDScan.exe" /scan4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4456
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=70 --always-read-main-dll --field-trial-handle=4336,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9544 /prefetch:11⤵PID:5588
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=71 --always-read-main-dll --field-trial-handle=9444,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7656 /prefetch:11⤵PID:3964
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=72 --always-read-main-dll --field-trial-handle=5588,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7996 /prefetch:11⤵PID:5328
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=73 --always-read-main-dll --field-trial-handle=6540,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9512 /prefetch:11⤵PID:4972
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=74 --always-read-main-dll --field-trial-handle=4356,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9432 /prefetch:11⤵PID:6076
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=75 --always-read-main-dll --field-trial-handle=7960,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9112 /prefetch:11⤵PID:5796
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=76 --always-read-main-dll --field-trial-handle=7144,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=8172 /prefetch:11⤵PID:5912
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=77 --always-read-main-dll --field-trial-handle=7760,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=8324 /prefetch:11⤵PID:3632
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=78 --always-read-main-dll --field-trial-handle=9452,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9424 /prefetch:11⤵PID:5452
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=79 --always-read-main-dll --field-trial-handle=9492,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6912 /prefetch:11⤵PID:5152
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=9412,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9612 /prefetch:141⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:5360
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=9292,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7976 /prefetch:141⤵PID:4900
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=9292,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7976 /prefetch:141⤵PID:5272
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=82 --always-read-main-dll --field-trial-handle=7300,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7940 /prefetch:11⤵PID:5140
-
C:\Users\Admin\Downloads\HiJackThis.exe"C:\Users\Admin\Downloads\HiJackThis.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5860 -
C:\Windows\system32\bitsadmin.exe"C:\Windows\SysNative\bitsadmin.exe" /list /allusers /verbose2⤵PID:5240
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004E4 0x00000000000004E81⤵PID:5476
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=83 --always-read-main-dll --field-trial-handle=6436,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7108 /prefetch:11⤵PID:2772
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=84 --always-read-main-dll --field-trial-handle=7236,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7376 /prefetch:11⤵PID:5900
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=86 --always-read-main-dll --field-trial-handle=9356,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=5596 /prefetch:11⤵PID:6136
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=85 --always-read-main-dll --field-trial-handle=9364,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=8316 /prefetch:11⤵PID:4428
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=87 --always-read-main-dll --field-trial-handle=6372,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9360 /prefetch:11⤵PID:5600
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=88 --always-read-main-dll --field-trial-handle=6752,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7532 /prefetch:11⤵PID:5648
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=89 --always-read-main-dll --field-trial-handle=7964,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6504 /prefetch:11⤵PID:464
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=90 --always-read-main-dll --field-trial-handle=9272,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=8948 /prefetch:11⤵PID:5456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=91 --always-read-main-dll --field-trial-handle=6796,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=2668 /prefetch:11⤵PID:5316
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=92 --always-read-main-dll --field-trial-handle=9636,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=8880 /prefetch:11⤵PID:4984
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=93 --always-read-main-dll --field-trial-handle=9312,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=4340 /prefetch:11⤵PID:6088
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=94 --always-read-main-dll --field-trial-handle=9000,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6844 /prefetch:11⤵PID:5844
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=95 --always-read-main-dll --field-trial-handle=9680,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=8804 /prefetch:11⤵PID:3308
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=96 --always-read-main-dll --field-trial-handle=9784,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9820 /prefetch:11⤵PID:4288
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=97 --always-read-main-dll --field-trial-handle=7636,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=4352 /prefetch:11⤵PID:5732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=98 --always-read-main-dll --field-trial-handle=8324,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6124 /prefetch:11⤵PID:5424
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=99 --always-read-main-dll --field-trial-handle=8012,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9340 /prefetch:11⤵PID:1612
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=100 --always-read-main-dll --field-trial-handle=6356,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9664 /prefetch:11⤵PID:1932
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=101 --always-read-main-dll --field-trial-handle=9832,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9900 /prefetch:11⤵PID:3056
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=102 --always-read-main-dll --field-trial-handle=9884,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6532 /prefetch:11⤵PID:5492
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=10132,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10136 /prefetch:141⤵
- NTFS ADS
PID:4448
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=104 --always-read-main-dll --field-trial-handle=7812,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6816 /prefetch:11⤵PID:5764
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=7744,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9624 /prefetch:141⤵
- NTFS ADS
PID:2672
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=106 --always-read-main-dll --field-trial-handle=9828,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=8008 /prefetch:11⤵PID:5868
-
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\Downloads\1111_with_WARP_V2024.12.760.0.msi"1⤵
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:4220
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:1816
-
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\Downloads\netspeedmonitor_2_5_4_0_x64_setup.msi"1⤵
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:760
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=107 --always-read-main-dll --field-trial-handle=6816,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9664 /prefetch:11⤵PID:3284
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=108 --always-read-main-dll --field-trial-handle=9652,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9304 /prefetch:11⤵PID:5672
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=109 --always-read-main-dll --field-trial-handle=9424,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9964 /prefetch:11⤵PID:6044
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=110 --always-read-main-dll --field-trial-handle=9624,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9688 /prefetch:11⤵PID:5460
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=111 --always-read-main-dll --field-trial-handle=10176,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6588 /prefetch:11⤵PID:3268
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=112 --always-read-main-dll --field-trial-handle=8976,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10164 /prefetch:11⤵PID:5996
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=113 --always-read-main-dll --field-trial-handle=9844,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=8916 /prefetch:11⤵PID:4628
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=114 --always-read-main-dll --field-trial-handle=6812,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10500 /prefetch:11⤵PID:396
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=115 --always-read-main-dll --field-trial-handle=10224,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9972 /prefetch:11⤵PID:5580
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=116 --always-read-main-dll --field-trial-handle=9504,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6844 /prefetch:11⤵PID:236
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=117 --always-read-main-dll --field-trial-handle=9688,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10644 /prefetch:11⤵PID:2388
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=118 --always-read-main-dll --field-trial-handle=9808,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7740 /prefetch:11⤵PID:464
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=119 --always-read-main-dll --field-trial-handle=5348,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10656 /prefetch:11⤵PID:5080
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=120 --always-read-main-dll --field-trial-handle=10160,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9228 /prefetch:11⤵PID:5492
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=121 --always-read-main-dll --field-trial-handle=9372,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7788 /prefetch:11⤵PID:464
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=122 --always-read-main-dll --field-trial-handle=9336,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=8008 /prefetch:11⤵PID:5724
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=10392,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10656 /prefetch:141⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:1612
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=123 --always-read-main-dll --field-trial-handle=6756,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=5812 /prefetch:11⤵PID:5496
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --string-annotations --always-read-main-dll --field-trial-handle=9800,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10652 /prefetch:141⤵PID:1168
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=126 --always-read-main-dll --field-trial-handle=9892,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9100 /prefetch:11⤵PID:4852
-
C:\Users\Admin\Downloads\spywareblastersetup55.exe"C:\Users\Admin\Downloads\spywareblastersetup55.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\is-ACIQS.tmp\spywareblastersetup55.tmp"C:\Users\Admin\AppData\Local\Temp\is-ACIQS.tmp\spywareblastersetup55.tmp" /SL5="$9042C,4011576,54272,C:\Users\Admin\Downloads\spywareblastersetup55.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\MSSTDFMT.DLL"3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:3456
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\MSCOMCTL.OCX"3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:5404
-
-
C:\Program Files (x86)\SpywareBlaster\spywareblaster.exe"C:\Program Files (x86)\SpywareBlaster\spywareblaster.exe" QUIETEXIT3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:684 -
C:\Program Files (x86)\SpywareBlaster\spywareblaster.exe"C:\Program Files (x86)\SpywareBlaster\spywareblaster.exe" QUIETEXIT4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3396
-
-
-
C:\Program Files (x86)\SpywareBlaster\spywareblaster.exe"C:\Program Files (x86)\SpywareBlaster\spywareblaster.exe" -AUCHECK3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4920 -
C:\Program Files (x86)\SpywareBlaster\spywareblaster.exe"C:\Program Files (x86)\SpywareBlaster\spywareblaster.exe" -AUCHECK4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:228
-
-
-
C:\Program Files (x86)\SpywareBlaster\spywareblaster.exe"C:\Program Files (x86)\SpywareBlaster\spywareblaster.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4220 -
C:\Program Files (x86)\SpywareBlaster\spywareblaster.exe"C:\Program Files (x86)\SpywareBlaster\spywareblaster.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3824 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.spywareblaster.net/sb-link/autoupdate.html5⤵PID:5364
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --edge-skip-compat-layer-relaunch --single-argument http://www.spywareblaster.net/sb-link/autoupdate.html6⤵PID:5432
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=127 --always-read-main-dll --field-trial-handle=10788,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9932 /prefetch:11⤵PID:1376
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=128 --always-read-main-dll --field-trial-handle=9552,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7996 /prefetch:11⤵PID:876
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=129 --always-read-main-dll --field-trial-handle=9156,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6048 /prefetch:11⤵PID:5572
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=130 --always-read-main-dll --field-trial-handle=7520,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=5328 /prefetch:11⤵PID:464
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=131 --always-read-main-dll --field-trial-handle=10940,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6048 /prefetch:11⤵PID:5404
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=132 --always-read-main-dll --field-trial-handle=10808,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=2632 /prefetch:11⤵PID:4100
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=133 --always-read-main-dll --field-trial-handle=7128,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10448 /prefetch:11⤵PID:6120
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=134 --always-read-main-dll --field-trial-handle=10052,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10100 /prefetch:11⤵PID:2588
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=9780,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10876 /prefetch:141⤵PID:5360
-
C:\Users\Admin\Downloads\smadav2025rev1530.exe"C:\Users\Admin\Downloads\smadav2025rev1530.exe"1⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\is-1GEGE.tmp\smadav2025rev1530.tmp"C:\Users\Admin\AppData\Local\Temp\is-1GEGE.tmp\smadav2025rev1530.tmp" /SL5="$604A0,2397346,133120,C:\Users\Admin\Downloads\smadav2025rev1530.exe"2⤵PID:3980
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\SMADAV\SmadExtMenu64.dll"3⤵PID:5332
-
-
C:\Program Files (x86)\SMADAV\SMΔRTP.exe"C:\Program Files (x86)\SMADAV\SMΔRTP.exe" rtc3⤵PID:5532
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn "smadav" /xml "C:\Users\Admin\AppData\Roaming\Smadav\smadav.xml"4⤵
- Scheduled Task/Job: Scheduled Task
PID:5824
-
-
C:\Program Files (x86)\Smadav\SmadavProtect64.exe"C:\Program Files (x86)\Smadav\SmadavProtect64.exe"4⤵PID:5180
-
-
C:\Program Files (x86)\Smadav\SMΔRTP.exe"C:\Program Files (x86)\Smadav\SMΔRTP.exe"4⤵PID:5772
-
-
C:\Program Files (x86)\Smadav\SmadavHelper.exe"C:\Program Files (x86)\Smadav\SmadavHelper.exe" "zZb1jxkjbLyptobLmmI.i.b4n.ptovbqxi'jYznpmkxjjbhmyaxex|"4⤵PID:560
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Smadav\SmadExtc64.dll"4⤵PID:2744
-
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Smadav\SmadExtc64.dll"5⤵PID:5648
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn "SmadavSecondaryUpdater" /xml "C:\Users\Admin\AppData\Roaming\Smadav\SmadavSecondaryUpdater.xml"4⤵
- Scheduled Task/Job: Scheduled Task
PID:5288
-
-
-
C:\Program Files (x86)\SMADAV\SMΔRTP.exe"C:\Program Files (x86)\SMADAV\SMΔRTP.exe"3⤵PID:5548
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=6596,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10812 /prefetch:141⤵PID:5992
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=137 --always-read-main-dll --field-trial-handle=5912,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10796 /prefetch:11⤵PID:6036
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=138 --always-read-main-dll --field-trial-handle=5868,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=5856 /prefetch:11⤵PID:5652
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=139 --always-read-main-dll --field-trial-handle=5876,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9368 /prefetch:11⤵PID:1532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=140 --always-read-main-dll --field-trial-handle=5740,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=5856 /prefetch:11⤵PID:4004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=141 --always-read-main-dll --field-trial-handle=7204,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10732 /prefetch:11⤵PID:2780
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=142 --always-read-main-dll --field-trial-handle=9972,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7092 /prefetch:11⤵PID:5408
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=10072,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9408 /prefetch:141⤵PID:3896
-
C:\Users\Admin\Downloads\USBLockit.exe"C:\Users\Admin\Downloads\USBLockit.exe"1⤵PID:2148
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\Downloads\USBLockit.exe" C:\users\public\ /Y2⤵PID:352
-
-
C:\users\public\USBLockit.exe"C:\users\public\USBLockit.exe" C:\Users\Admin\Downloads\USBLockit.exe2⤵PID:5440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=144 --always-read-main-dll --field-trial-handle=5936,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10776 /prefetch:11⤵PID:4024
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=145 --always-read-main-dll --field-trial-handle=10904,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10888 /prefetch:11⤵PID:5500
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=146 --always-read-main-dll --field-trial-handle=10400,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=4352 /prefetch:11⤵PID:3896
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=9344,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6364 /prefetch:141⤵PID:4012
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=9344,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6364 /prefetch:141⤵PID:4004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=148 --always-read-main-dll --field-trial-handle=10728,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6384 /prefetch:11⤵PID:1128
-
C:\Users\Admin\Downloads\USBLockit.exe"C:\Users\Admin\Downloads\USBLockit.exe"1⤵PID:1420
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\Downloads\USBLockit.exe" C:\users\public\ /Y2⤵PID:6036
-
-
C:\users\public\USBLockit.exe"C:\users\public\USBLockit.exe" C:\Users\Admin\Downloads\USBLockit.exe2⤵PID:5436
-
-
C:\Users\Admin\Downloads\USBLockit.exe"C:\Users\Admin\Downloads\USBLockit.exe"1⤵PID:1992
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\Downloads\USBLockit.exe" C:\users\public\ /Y2⤵PID:2572
-
-
C:\users\public\USBLockit.exe"C:\users\public\USBLockit.exe" C:\Users\Admin\Downloads\USBLockit.exe2⤵PID:5136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=149 --always-read-main-dll --field-trial-handle=5944,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10496 /prefetch:11⤵PID:2744
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=150 --always-read-main-dll --field-trial-handle=10284,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=8320 /prefetch:11⤵PID:4012
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=151 --always-read-main-dll --field-trial-handle=5896,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6108 /prefetch:11⤵PID:764
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=152 --always-read-main-dll --field-trial-handle=10760,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10568 /prefetch:11⤵PID:5016
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=6212,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=8940 /prefetch:141⤵PID:5204
-
C:\Users\Admin\Downloads\mobiunlockforandroid_trial_Installer_20250223.807801.exe"C:\Users\Admin\Downloads\mobiunlockforandroid_trial_Installer_20250223.807801.exe"1⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\downloader_easeus\1.0.0\35trial\EDownloader.exe"C:\Users\Admin\AppData\Local\Temp\downloader_easeus\1.0.0\35trial\EDownloader.exe" EXEDIR=C:\Users\Admin\Downloads ||| EXENAME=mobiunlockforandroid_trial_Installer_20250223.807801.exe ||| DOWNLOAD_VERSION=trial ||| RELEASE_TIME=2023-01-10_10_39_20 ||| PRODUCT_VERSION=1.0.0 ||| INSTALL_TYPE=02⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\downloader_easeus\1.0.0\35trial\aliyun\InfoForSetup.exe/Uid "S-1-5-21-2287204051-441334380-1151193565-1000"3⤵PID:3456
-
-
C:\Users\Admin\AppData\Local\Temp\downloader_easeus\1.0.0\35trial\aliyun\InfoForSetup.exe/SendInfo Window "Home_Installer" Activity "Result_Download_Configurefile" Attribute "{\"CDN\":\"http://download.easeus.com/api/index.php/Home/product/config/\",\"Elapsed\":\"2\",\"Errorinfo\":\"0\",\"Result\":\"Success\"}"3⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\downloader_easeus\1.0.0\35trial\aliyun\AliyunWrapExe.ExeC:\Users\Admin\AppData\Local\Temp\downloader_easeus\1.0.0\35trial\aliyun\AliyunWrapExe.Exe4⤵PID:2908
-
-
-
C:\Users\Admin\AppData\Local\Temp\downloader_easeus\1.0.0\35trial\aliyun\InfoForSetup.exe/SendInfo Window "Install" Activity "Info_Userinfo" Attribute "{\"Country\":\"United States\",\"Language\":\"English\",\"OS\":\"Microsoft Windows 10\",\"Timezone\":\"GMT-00:00\",\"UE\":\"on\",\"Version\":\"trial\",\"Version_Num\":\"1.0.0\"}"3⤵PID:5500
-
C:\Users\Admin\AppData\Local\Temp\downloader_easeus\1.0.0\35trial\aliyun\AliyunWrapExe.ExeC:\Users\Admin\AppData\Local\Temp\downloader_easeus\1.0.0\35trial\aliyun\AliyunWrapExe.Exe4⤵PID:396
-
-
-
C:\Users\Admin\AppData\Local\Temp\downloader_easeus\1.0.0\35trial\aliyun\InfoForSetup.exe/SendInfo Window "Home_Installer" Activity "Info_Finish" Attribute "{\"Country\":\"United States\",\"Language\":\"English\",\"OS\":\"Microsoft Windows 10\",\"Releasetime\":\"2023-01-10_10_39_20\",\"Testid\":\"\",\"Timezone\":\"GMT-00:00\",\"Version\":\"trial\",\"Version_Num\":\"1.0.0\"}"3⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\downloader_easeus\1.0.0\35trial\aliyun\AliyunWrapExe.ExeC:\Users\Admin\AppData\Local\Temp\downloader_easeus\1.0.0\35trial\aliyun\AliyunWrapExe.Exe4⤵PID:1176
-
-
-
C:\Users\Admin\AppData\Local\Temp\downloader_easeus\1.0.0\35trial\aliyun\InfoForSetup.exe/SendInfo Window "DownloadInstall_Page" Activity "Click_Installnow"3⤵PID:1664
-
-
C:\Users\Admin\AppData\Local\Temp\downloader_easeus\1.0.0\35trial\aliyun\InfoForSetup.exe/SendInfo Window "Home_Installer" Activity "Click_Install" Attribute "{\"Country\":\"United States\",\"Install_Path\":\"C:/Program Files (x86)/EaseUS/EaseUS MobiUnlockForAndroid\",\"Language\":\"English\",\"Os\":\"Microsoft Windows 10\",\"Pageid\":\"1-807801\",\"Releasetime\":\"2023-01-10_10_39_20\",\"Testid\":\"\",\"Timezone\":\"GMT-00:00\",\"Version\":\"trial\",\"Version_Num\":\"1.0.0\"}"3⤵PID:5476
-
-
C:\Users\Admin\AppData\Local\Temp\downloader_easeus\1.0.0\35trial\aliyun\InfoForSetup.exe/SendInfo Window "Home_Installer" Activity "Info_Start_Download_Program"3⤵PID:5964
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=154 --always-read-main-dll --field-trial-handle=10432,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10672 /prefetch:11⤵PID:1684
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --string-annotations --always-read-main-dll --field-trial-handle=10796,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6776 /prefetch:141⤵PID:6140
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=157 --always-read-main-dll --field-trial-handle=9316,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10840 /prefetch:11⤵PID:1176
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=158 --always-read-main-dll --field-trial-handle=9092,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=5724 /prefetch:11⤵PID:1816
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=159 --always-read-main-dll --field-trial-handle=7320,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7136 /prefetch:11⤵PID:5260
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=160 --always-read-main-dll --field-trial-handle=9820,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7976 /prefetch:11⤵PID:3896
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=161 --always-read-main-dll --field-trial-handle=11164,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=11208 /prefetch:11⤵PID:5232
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=162 --always-read-main-dll --field-trial-handle=9904,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=11260 /prefetch:11⤵PID:4004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=163 --always-read-main-dll --field-trial-handle=11156,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=11176 /prefetch:11⤵PID:5732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=164 --always-read-main-dll --field-trial-handle=11128,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6944 /prefetch:11⤵PID:5988
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=165 --always-read-main-dll --field-trial-handle=11140,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9600 /prefetch:11⤵PID:5980
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=166 --always-read-main-dll --field-trial-handle=5620,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=11176 /prefetch:11⤵PID:5832
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=167 --always-read-main-dll --field-trial-handle=5860,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=5760 /prefetch:11⤵PID:2168
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=168 --always-read-main-dll --field-trial-handle=4788,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=8916 /prefetch:11⤵PID:6100
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=169 --always-read-main-dll --field-trial-handle=5328,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9548 /prefetch:11⤵PID:5252
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=170 --always-read-main-dll --field-trial-handle=11404,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=9100 /prefetch:11⤵PID:3488
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=171 --always-read-main-dll --field-trial-handle=8784,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10960 /prefetch:11⤵PID:1060
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=172 --always-read-main-dll --field-trial-handle=10984,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10712 /prefetch:11⤵PID:5188
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=10948,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10932 /prefetch:141⤵PID:5504
-
C:\Users\Admin\Downloads\FKPackage.exe"C:\Users\Admin\Downloads\FKPackage.exe"1⤵PID:3924
-
C:\ProgramData\HeavenWard\FreeKey\instreg.exe"C:\ProgramData\HeavenWard\FreeKey\instreg.exe" -i freekey2⤵PID:5724
-
-
C:\ProgramData\HeavenWard\FreeKey\freekey.exe"C:\ProgramData\HeavenWard\FreeKey\freekey.exe" -init2⤵PID:5464
-
-
C:\Users\Admin\Downloads\mobiunlockforandroid_trial_Installer_20250223.807801.exe"C:\Users\Admin\Downloads\mobiunlockforandroid_trial_Installer_20250223.807801.exe"1⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\downloader_easeus\1.0.0\35trial\EDownloader.exe"C:\Users\Admin\AppData\Local\Temp\downloader_easeus\1.0.0\35trial\EDownloader.exe" EXEDIR=C:\Users\Admin\Downloads ||| EXENAME=mobiunlockforandroid_trial_Installer_20250223.807801.exe ||| DOWNLOAD_VERSION=trial ||| RELEASE_TIME=2023-01-10_10_39_20 ||| PRODUCT_VERSION=1.0.0 ||| INSTALL_TYPE=02⤵PID:5332
-
C:\Users\Admin\AppData\Local\Temp\downloader_easeus\1.0.0\35trial\aliyun\InfoForSetup.exe/Uid "S-1-5-21-2287204051-441334380-1151193565-1000"3⤵PID:5988
-
-
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\8bd2405837e24f7495ab42b6a4230c38 /t 5788 /p 30761⤵PID:720
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=174 --always-read-main-dll --field-trial-handle=10348,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10780 /prefetch:11⤵PID:2036
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=175 --always-read-main-dll --field-trial-handle=11396,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=11088 /prefetch:11⤵PID:4944
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵PID:4676
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=176 --always-read-main-dll --field-trial-handle=11204,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10968 /prefetch:11⤵PID:7024
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=177 --always-read-main-dll --field-trial-handle=11560,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10748 /prefetch:11⤵PID:7032
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=178 --always-read-main-dll --field-trial-handle=10908,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=7100 /prefetch:11⤵PID:4432
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=11168,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=11508 /prefetch:141⤵PID:6756
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=5676,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=11064 /prefetch:141⤵PID:6780
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=181 --always-read-main-dll --field-trial-handle=10736,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10256 /prefetch:11⤵PID:7096
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:6180
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Malware-Database-main.zip\Malware-Database-main\PCToaster.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_Malware-Database-main.zip\Malware-Database-main\PCToaster.exe"1⤵PID:4468
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\Temp1_Malware-Database-main.zip\Malware-Database-main\PCToaster.exe"2⤵PID:1184
-
C:\Windows\SYSTEM32\attrib.exeattrib +h C:\Users\Admin\AppData\Local\Temp\Temp1_Malware-Database-main.zip\Malware-Database-main\scr.txt3⤵
- Views/modifies file attributes
PID:6720
-
-
C:\Windows\SYSTEM32\diskpart.exediskpart /s C:\Users\Admin\AppData\Local\Temp\Temp1_Malware-Database-main.zip\Malware-Database-main\scr.txt3⤵PID:5504
-
-
C:\Windows\SYSTEM32\takeown.exetakeown /f V:\Boot /r3⤵
- Modifies file permissions
PID:2036
-
-
C:\Windows\SYSTEM32\takeown.exetakeown /f V:\Recovery /r3⤵
- Modifies file permissions
PID:4552
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /im lsass.exe /f3⤵
- Kills process with taskkill
PID:4984
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol A: /d3⤵PID:4368
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol B: /d3⤵PID:708
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol D: /d3⤵PID:736
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol E: /d3⤵PID:6188
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol F: /d3⤵PID:6448
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol G: /d3⤵PID:6404
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol H: /d3⤵PID:6148
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol I: /d3⤵PID:5792
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol J: /d3⤵PID:3472
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol K: /d3⤵PID:7152
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol L: /d3⤵PID:6716
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol M: /d3⤵PID:5312
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol N: /d3⤵PID:4452
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol O: /d3⤵PID:3428
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol P: /d3⤵PID:6548
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol Q: /d3⤵PID:972
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol R: /d3⤵PID:6884
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol S: /d3⤵PID:6180
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol T: /d3⤵PID:6408
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol U: /d3⤵PID:6204
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol V: /d3⤵PID:7048
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol W: /d3⤵PID:7124
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol X: /d3⤵PID:5288
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol Y: /d3⤵PID:4132
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol Z: /d3⤵PID:732
-
-
C:\Windows\SYSTEM32\mountvol.exemountvol C: /d3⤵PID:6156
-
-
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:6884
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:6968
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Malware-Database-main.zip\Malware-Database-main\TaskILL.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_Malware-Database-main.zip\Malware-Database-main\TaskILL.exe"1⤵PID:6524
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Malware-Database-main.zip\Malware-Database-main\PankozaDestructive 2.0.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_Malware-Database-main.zip\Malware-Database-main\PankozaDestructive 2.0.exe"1⤵PID:6788
-
C:\Windows\system32\wscript.exe"C:\Windows\sysnative\wscript.exe" C:\Users\Admin\AppData\Local\Temp\1C5F.tmp\1C60.tmp\1C61.vbs //Nologo2⤵PID:4496
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1C5F.tmp\z.cmd" "3⤵PID:4160
-
C:\Windows\system32\msg.exemsg * your pc was destroyed by PankozaDestructive 2.04⤵PID:5200
-
-
C:\Users\Admin\AppData\Local\Temp\1C5F.tmp\MBRTrash.exeMBRTrash.exe4⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/channel/UCVTSRzzkAAtUZzX88xoMdhw4⤵PID:5432
-
-
C:\Users\Admin\AppData\Local\Temp\1C5F.tmp\1.exe1.exe4⤵PID:6308
-
-
C:\Users\Admin\AppData\Local\Temp\1C5F.tmp\2.exe2.exe4⤵PID:1840
-
-
C:\Users\Admin\AppData\Local\Temp\1C5F.tmp\3.exe3.exe4⤵PID:3392
-
-
C:\Windows\system32\reg.exereg delete hkcr /f4⤵PID:420
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=182 --always-read-main-dll --field-trial-handle=9112,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=4348 /prefetch:11⤵PID:6508
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=183 --always-read-main-dll --field-trial-handle=9264,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=6600 /prefetch:11⤵PID:6496
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=184 --always-read-main-dll --field-trial-handle=6228,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=4296 /prefetch:11⤵PID:4024
-
C:\Windows\System32\PickerHost.exeC:\Windows\System32\PickerHost.exe -Embedding1⤵PID:6696
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=185 --always-read-main-dll --field-trial-handle=11516,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=8860 /prefetch:11⤵PID:6076
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=186 --always-read-main-dll --field-trial-handle=6092,i,12331736354284649584,1031380232325094842,262144 --variations-seed-version --mojo-platform-channel-handle=10700 /prefetch:11⤵PID:6684
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
817KB
MD5685015247ff185390dfb92de790ec187
SHA170a8b212ea37d7fab2af745c9040de78fb47a7d6
SHA256ecb11fa4cad9db6dd6f132f0d1a96dd06d89f68186752fe342e23b5a13009f5f
SHA5125a23d30ad5bdeb10361baee824b84efc9efd4c12d74ba519216d1b7417a16347d41ec5d0b603c6c9cdef531eb94b454ed64cbbb4ebb320c14969ca017643a62c
-
Filesize
162KB
MD54da2e19fed9a93f3429f3ac9e0e76a1e
SHA1b0ec44edc077d9fc1dc17586b11920bf60aa26cf
SHA25683d99d8ec12afb2099a7d1b0fe503f7126a607f7a6379a24d907d3d9cdcf62b2
SHA5129d248c07f2d9692f5326f25d41b3b36790f8cae73346f7f522f513489fb724edd573bd8a04bf794b6604c6a3e1c784038a211156a4b5628c8cca04ce7b9fcdfd
-
Filesize
1.8MB
MD5effb66061635cbdae06ef811de9c9361
SHA15f75ca5017ec6a55bf102b266c2bbd313e56f25c
SHA25671c3ad607d3b6766e6ecb864a3f41c5498da83ba0f5a96500b7f954a08bbec41
SHA512bb45d57e9e1aef1840545622cdaa7b9c2232f67a7cfe212b1b7b39f46da1a2c01535131498e036904c5da2f76d7ce404dacf40bc9d49969fa36094600a60c39a
-
Filesize
1.0MB
MD5e52859fcb7a827cacfce7963184c7d24
SHA135c4ae05d90f610c0520933faaca2a8d39e1b2a1
SHA25645b6eef5bbf223cf8ff78f5014b68a72f0bc2cceaed030dece0a1abacf88f1f8
SHA512013e6bf4762b1f90650ee6a1cb275607d1cad9df481362f42606a37f3a6f63de5cd0cdb0e9739df141b58f67ac079cf27be4ffe4937371972dd14eae18c58a94
-
Filesize
2.5MB
MD5430f52e6f90343ea26ab73b32c818df6
SHA173070ee9e60f3e0a5bd47c447de3c90dc8c70d49
SHA256e1bb13dfb8948dd6a094db3328ded12f08319a37705f81180d4611b2e420942c
SHA5120f1f8962a8d8af342d54ba88050d5860f9b46ac9f87ab238be2707d1723669e715e593e3bf1a76d3856d6156e31555fb742ba59f32271642ca1c9b0d55b6d81a
-
Filesize
60KB
MD5db11a07e8ad03370071ec5e6485acd58
SHA13016e240a5b1c2ee48a6400f7d7db35c72471861
SHA2562da5d859131bd17d3588aa973d33a20261171b4380c88a32838465f9957cda3b
SHA512aa19c41ede9eac133d32b4e9e682150eed33d9fa2f5631af76677f3427ee858bdc7ec975455d1e93270848b89c604cf068a5435a238b620613e582c47fcac134
-
Filesize
847B
MD5ef375f28c91db0202bf7db29c0cbc2ce
SHA15a3f5d4ec75a468b908c2eb2b9e6f4b1e76c1017
SHA256f4d1c038db378dec10e7e2fc81ccc2e2d4b8132ef0d66905e3625a0b0cbbde5f
SHA512f18141e352fcd253e02cb25fa0cff29ab06dec62bafd5aa80ca48c959d1dba97deae830d01bf521f851a8143b9416747eb170d0cedafa32b59155027c02f244d
-
Filesize
386KB
MD572b1c6699ddc2baab105d32761285df2
SHA1fc85e9fb190f205e6752624a5231515c4ee4e155
SHA256bf7f6f7e527ab8617766bb7a21c21b2895b5275c0e808756c2aadcd66eff8a97
SHA512cde1e754d8dfb2fa55db243517b5dd3d75b209ea6387ef2e4be6157875e536db2373f23434a9e66c119150301c7b7cdf97de5a5544d94c03247b4ae716cbc170
-
Filesize
1KB
MD5747ce0e054926fb82589e9233934b332
SHA1b0210dfa37c1091123a43d726d34a3c975fa439b
SHA25627c6022ba581db7a0ee498187f00049fc7284119a6d2a29ca131c81d5cf4a978
SHA512049c32832708ca5e3186733587e3892ab0a759adf93b8f8853a32a6fe412507b6cbc1fd7a6bb7eaa65b738af708caf688b0e326c37e1a84d9ba4e248a7077f64
-
Filesize
1KB
MD5bce58f0f756f17b8be5bab89fef4a388
SHA18c1797c473c90def4de25d74a646b1ded4e77f39
SHA2562e45aa712157f230da352504de36b452cd474f7776d62ae94c119cd7c3fff223
SHA5126c4395a5937b1da81c6dbaae9d11176d52ae69700c48867be525514582a4dfb1c92720700e65b350f4de54425960bdfeb3c7bc5347425775503d6f736e15dd3c
-
Filesize
1KB
MD5dcef0f13e217f0d0df45f07cf77da4a1
SHA157b3f21899e66a33156b7fd84b0f86d82f358164
SHA256e43131396acdb9cdf35a7c653414b9ebd24616aebd74e99d52b9a48fcabafd9f
SHA51248a6059fa6626b5ffe0d164cd66772fef1c7e66d748f8d4b2b6e2eff9a9577df7b06d8f187ab49ece061ccd2c3b30f0bc2e40c439c13918fc2e4a73119b5651c
-
Filesize
1KB
MD50991df4c63366cca38b2b7a0efa76b8a
SHA122a368f752761e91466c8394594f074b10269df9
SHA2568d47ecb2169adcbdc01fc90d832755de0c397716c626e0fe7c7f6ec56e8555de
SHA5124c69ef73a8300dfeaa1d25091fbb3d0134c19a230e82abe6cf7f86ba36c66d0da59e4107213c8a69f168aa23469eb59143dd2854cb203ce967d4e96e990ef07b
-
Filesize
1KB
MD56a0ecf3290b50e76a1315ab773df2751
SHA135cfc5baa8a0a15c0fb19a9083e4178f1f519f50
SHA25682331c21c8e918105b97086175c99ff9be8476ad28ec52eeb06f8fd66fa190ae
SHA512d72317eb8c558101f049131e547c2b5b50c3535f36ba28a00ea667e9731c0ff577e471004ca0aab004dc974ac4fbf83b5890918cf712fb8cb0ec4039cb862ace
-
Filesize
788B
MD5201ae8230c63ddbd6842cca0a7fa2681
SHA1a62ee45756daefd65066d428f0926c64060b261b
SHA25613fee6c4e80ca8f1b25f62baaf7c28c5eb153f8e471aa054766cc332962bc22a
SHA512424c92159827ad3425e4db8cb488d2cd87ada25809a8e1b9064860a3b62327f8bdb2db9e410b60861d3c71148c8e348d3c2db8983def32828a15d542fe96dda0
-
Filesize
88B
MD57f411750d07619f38537e7fd612b8b44
SHA1cda241a1ce5141288582c8f0ac4850992b427bdc
SHA256ae89726af2bd0c0218fbf63af20d4464f44dced5156364d817b6e73afc8e9f87
SHA51235dad46325060004a66e01e10af6a3ebfd94b6751347b6ec64840c4ec03d81480fc324494ea39dded03bf2f1a1ce352b15ab518d14214c15567af17fb32f16b8
-
Filesize
1KB
MD57a9703e90829992168af77b8c3b6a2f2
SHA1028f6a285b4cd9eb990199cd03dc9ab241fcfe2d
SHA256746f2924a4a212f82076d4e57dc1202c75c4611839c2df644881ffe7e8274cd2
SHA51279b338c0d8fadeff7213ee8f087e2cb150ebfbd0e9395e3e5a3ab066c4ae1a921c8476e6c79cd00790fbfa29a387178cabf46aa2a15a9835b3792c357b2db706
-
Filesize
1KB
MD580e59c2ebc6df1a8983046644aa919a5
SHA1a3883d95e491960b1b04f55b2c2b620309fc20c0
SHA256d7d274103abf9006008916871acd4e221cfc5befac8e308af93d10bf0e698258
SHA51233e9f02edf7022d7c3b17882a503f2a8f5be56dc931c98fe918acf110992f3332dd46d3949b38f2753f663debec2a95910098bbe71e46c6391ce00745a1c6b6e
-
Filesize
1KB
MD5963bac90f47153a939c96f4c88d83b83
SHA1984f5ecdd83dc7ff9764a4144d9cfc5cd93525b1
SHA25634087d9186cf16dba72fad924d9638308b0d5410a122d483d93e9bb2824c7203
SHA512dcea910d966acf752151fb5100d9da44a342816d1a2899177ccbc40e7f1b527fc11e50e75259c4c2244dbe1d80dcd35ad6439c148f0af4b04c69f8eb8769242e
-
Filesize
392B
MD54ba62946fc72dc787801d2ed2093c436
SHA1a6a292483c6e7677e4bbc2a9fdc25c3cb9d88e04
SHA256b262b8b35e2e3d3abc3b19aa86634b8c24fa361ac5c72f46f0813ce7b804ea54
SHA5127574f15e52ba0a17b153e6b8911b2eaeb0740ec0cab2408aa4d671142d80dfc7e271949229928a9f5f38984c47fc4632419a10ed9ea5c0c6066eee8b88df6048
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
4KB
MD5ba4c1dfe226d573d516c0529f263011e
SHA1d726e947633ea75c09bba1cb6a14a79ce953be24
SHA2562ffe1ac2555e822b4a383996168031e456f09f9cf3bb763fccee35be178cf58a
SHA51273d607f0cc27eb3b1966911edf669417249bbcaa2d07f037cb3d3d3eaf368110e7e683d0e2186b06820302cd17041d5f60adab1d0ad0ebc03e34075cea37f5f8
-
Filesize
5KB
MD5f1e9eed02db3a822a7ddef0c724e5f1f
SHA165864992f5b6c79c5efbefb5b1354648a8a86709
SHA2566dff504c6759c418c6635c9b25b8c91d0d9ef7787a3a93610d7670bb563c09df
SHA512c22b64fff76b25cf53231b8636f07b361d95791c4646787ce7beac27ad6a0de88337dcceb25b5196f97c452dda72e2614647f51a8a18cb4d5228a82ed2e0780c
-
Filesize
11KB
MD517ed1c86bd67e78ade4712be48a7d2bd
SHA11cc9fe86d6d6030b4dae45ecddce5907991c01a0
SHA256bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb
SHA5120cbed521e7d6d1f85977b3f7d3ca7ac34e1b5495b69fd8c7bfa1a846baf53b0ecd06fe1ad02a3599082ffacaf8c71a3bb4e32dec05f8e24859d736b828092cd5
-
Filesize
603KB
MD54df53efcaa2c52f39618b2aad77bb552
SHA1542de62a8a48a3ff57cf7845737803078062e95b
SHA256ee13539f3d66cc0592942ea1a4c35d8fd9af67b1a7f272d0d791931e6e9ce4eb
SHA512565a6ba0c9afc916cf62dac617c671f695cd86bd36358e9897f1f0e1a23a59d3019a12349029e05bf91abfb7b213ef02fc5c568a2bfcde0e3896e98cbcfa623a
-
Filesize
9KB
MD542b064366f780c1f298fa3cb3aeae260
SHA15b0349db73c43f35227b252b9aa6555f5ede9015
SHA256c13104552b8b553159f50f6e2ca45114493397a6fa4bf2cbb960c4a2bbd349ab
SHA51250d8f4f7a3ff45d5854741e7c4153fa13ee1093bafbe9c2adc60712ed2fb505c9688dd420d75aaea1b696da46b6beccc232e41388bc2a16b1f9eea1832df1cd7
-
Filesize
2KB
MD59a3031cc4cef0dba236a28eecdf0afb5
SHA1708a76aa56f77f1b0ebc62b023163c2e0426f3ac
SHA25653bb519e3293164947ac7cbd7e612f637d77a7b863e3534ba1a7e39b350d3c00
SHA5128fddde526e7d10d77e247ea80b273beae9dde1d4112806f1f5c3e6a409247d54d8a4445ab5bdd77025a434c3d1dcfdf480dac21abbdb13a308d5eb74517fab53
-
Filesize
2KB
MD59a5ab3d4e8e6c25ac9f8dd20a573d113
SHA123a125b2ba80cd34f36b64bd1a6a4318f7913fca
SHA2565b72284c8cff95adbc588b63bd11c8357ca5bbf672485752e0cf9f6d06f3c329
SHA51288d696b60bd4a01878023055c99bf0118e1490492cf7be7073b4b081c8355b73d1d7997677cd32fcad4c32e2d330be1cf648af2e0f2b2d65f149d606ad30ae33
-
Filesize
29KB
MD52880bf3bbbc8dcaeb4367df8a30f01a8
SHA1cb5c65eae4ae923514a67c95ada2d33b0c3f2118
SHA256acb79c55b3b9c460d032a6f3aaf6c642bf8c1d450e23279d091cc0c6ca510973
SHA512ca978702ce7aa04f8d9781a819a57974f9627e969138e23e81e0792ff8356037c300bb27a37a9b5c756220a7788a583c8e40cc23125bcbe48849561b159c4fa3
-
C:\Users\Admin\AppData\Roaming\Let's Compress\Let's Compress 1.4.0.0\install\E05A911\Let's Compress.msi
Filesize2.6MB
MD5f0768b8fb79d6e85606928a8942eb9b4
SHA1bc3b854d0dda803b62d6acc859574acf7c5bf3d0
SHA2565814b58aa3203e7b08b4a9bea8f9fc8bd71993073d5ba827b03de71286377196
SHA5121c35ee1b8b9bd342b690cd580eb38c630a4a6792ce72b08ebabbb76ea8aa297b50c8ba389db6bbbe418b87bf7cd75313f25bdeb6ed5541e13ffef06dae230e3e
-
C:\Users\Admin\AppData\Roaming\Let's Compress\Let's Compress 1.4.0.0\install\E05A911\lets_compress.exe
Filesize518KB
MD5a67204f86460f7b1e2bfa5006b202605
SHA1978a7f8fb723ea2236a1c7b6e8438c5906dc66c4
SHA256eaf8d7191a316c5b55ef00da8421c8614ea94e18bbd7de8ddc4bdd04b48b4eec
SHA512c14288a03b8d5af7161f9fabe4d9269ec56cbe523b0273f5b94be72aedae1c758f4c4ed06156df0eb33737f4b0debb5d4c1f0b8dfed1ec76fc9af0d56bb66bb8
-
Filesize
1.6MB
MD5bbc4c48776d5b5261d1d1b46ddb899bb
SHA1a5721691e0fbe4d65d074e4a928394efc6b375c8
SHA256fd7e65d9fb95d7734efe5c9496245f6be10c692da15f43595dba7659e27fa296
SHA512757d3efaa8b380fbbafee9c46f030339b4455f9573a330e1f04f2c2b60b8138911854acc05a31e818cf2c8eff8f6f2b6fe8928dbb30e39ed71b5d57cb49a9666
-
Filesize
206KB
MD59d45f2790dda55df2d99ef66dcb2019d
SHA1f2a369c1b82476e2e0641f95394dd4dee8223f01
SHA2569b7ff49f7e1d0a39826ec458c8004b20a65a4bd0592b083f38b01e2dbc2b510f
SHA5129bef561ec6908dcd7e75f5f63cff8b1ec73e9be2b4e4aa5602182cde18d691cc28259b980c87246c5d27b4284bc783fba44d92a202f77b15f3e65c89dd3aa069
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
66B
MD51cb62b0579f0ce7f6850153a83c3b6e7
SHA1c40d0302a089bac50d15abb0015f4f34aca826ca
SHA25655106713ea8559b6b96636f8559c98e73470c9c3d8e318631818657b6815d9d2
SHA51255d3e9538d97bdfed05c679b211e9b32c4c267f3e04439c953046baa7d2b9b8029fcce6ce3c5a0c5d89b274cad7d0e1856aacdb7e5030185650713f62f7e7bda
-
Filesize
4.7MB
MD562b3ac73731fc81080b814c88320961b
SHA176a7977f8ee1dc1663eb557aa9ad3940beadc9b9
SHA256c2d89609c65e1179432737cdf317894efd44a4659dd71f6b9a15141b8928137c
SHA51226a61dafa7fbd49fa50e68a0a67974f43c8100a92155d7977bcf227def166a5b7351697b97a35e81a25fbd16bc36017bfa2b8964aa65618500af3a61da4eaa34
-
Filesize
549B
MD57d52aa2322d59490a4ab565075166a7b
SHA15ed06b30928212977f33b45bbd851812f2660ee9
SHA256847bd4b3d805936b1fa2cb4dbc31b22e8f9a6d9d961236cb8430b27334cd63ac
SHA512cc20f9cda176f7b49f90fec80fb8ada56c066a06940bd58533800f9c3bcc1ac8ed707ce352e6364785a7c5e4aab5db712af604fb87afad7f859b5c570b4f2f95
-
Filesize
279B
MD56c9e2c1af983cc415773b1e44f40f009
SHA18009f98a1cfb54d88383aba563a0b6a876e8fb57
SHA256f3c4f1333c7928d18af450cb0062c5cd007c899cb436b105d9804834a17198ab
SHA512186f93fa09e3d66e997f6bfa5f1351d9aedec315b5165799fbf008a17ccc9b3c1758261ab8af3f3b8ce2621336bb5a1524dbc6b15a00236576c323055760d56d
-
Filesize
483B
MD58e23d6ae1fce7d134593d1ef555299ae
SHA1786ad5cad894422f883b55fb00d9a7671d1b8e53
SHA2567281dfdaad20c91d51388e81e2156be8e25e2b806ffc84580993822f10ddc91c
SHA5124edeb103c1f743fbffc753a6aa23100744b1ed52ee9e618c2450a833f473010acf261fce0f8a9d59f1ed521de759b8064211751e67bf4463c072f5afb0a44217
-
Filesize
6KB
MD5ffba0388187990039eedd2fe48cf0688
SHA10a76168749cfe2753898842ab15e59cabef08306
SHA25673a790d6c7170a3197b50369f5023ed2155f12239c23056b19eeec81d80ef383
SHA512d85bd4d3bda4919dcacf0832a4303f19a556a69aac81e0d49028e465d4123ec8895b119f1e08722d5c541f9bc143c37b21218a25e22448feb3b18c96bb5d1536
-
Filesize
408KB
MD5f5b62e103b2790783534b9b15d852861
SHA1577a4ba628d6ee691c245f1642d0ac959706909e
SHA256daf40252a688bd14e1c8845efc0f792c9cbc9d93cdb99549d153238a7b22f815
SHA512da748c6bf441a77e2ca9ca578c6353d215ffcfcfdfc2c26484e25507a6c5efdedb3ca6290f9cf49d6c1d30b29fca14880bcbb11317678160b229a9e94936676e
-
Filesize
11KB
MD5fc711608a97efe2e9affe4f742e955f5
SHA129f18f9d763661da5c6943206fc0eb24f6dcc870
SHA256f87998b35adb4f078056ea1907be18c2a698c068eb379170cb660255213f87cf
SHA512499cd4a68792c7899c46d944749d8179cc56b08eb76619eb1e3abb9792a90a3ab708c21d36a77305b7b02dc24d2ae563978f234f2f4252303687501dad428bb2
-
Filesize
15KB
MD547dc1818d152b434d465575915f12589
SHA1c9c026198b9ae849c92ff960854f79b81eef63ae
SHA256e92e5b899460d603278a5244fb6e456064457a5a25b6f3914f9a875d5c287e42
SHA5120266b8e2e8de8b726975de6d2e1d3592e66b7fb276bd7d92e3c46a4f0281b74dc7e27c249e3ac86ce441058333692dac2262781c6776c904667753a4e5a08267
-
Filesize
1KB
MD501c01d040563a55e0fd31cc8daa5f155
SHA13c1c229703198f9772d7721357f1b90281917842
SHA25633d947c04a10e3aff3dca3b779393fa56ce5f02251c8cbae5076a125fdea081f
SHA5129c3f0cc17868479575090e1949e31a688b8c1cdfa56ac4a08cbe661466bb40ecfc94ea512dc4b64d5ff14a563f96f1e71c03b6eeacc42992455bd4f1c91f17d5
-
Filesize
183KB
MD5c2c83128276cc7c9cccc399bb5d76031
SHA1776f9ca8175d95d0bc7c44847d60091bdf415041
SHA256791da16b0df6956e88b04dab8b543b99dc2abd9af24aa25208fe5a0981e811b3
SHA512c8651107f699daa299182dbe594da76cd794ba0d7661a483aaa932f0967a3af5761c8e8a3250cb501019d39b483d09427ac75aa7fa3a191a090e226d8d9fd515
-
Filesize
22KB
MD59624f3e0efeb4c10660a9a35c4f21e45
SHA1ecef3063ca41df75730e0fd61d8a839a4926980e
SHA2569375fd0099f4509bc6a59c80e5213c12a840344104b3063bed8d990026f0bc63
SHA51244c1a8a3ce188b751a891c8125f61554a83e53b6c8d22270ed34033147fd63e066b45f6bea6595d9bed6d48e5b0980173449bdec236ff96814121859c9e57b79
-
Filesize
149KB
MD58eabeadadc6d03c9807787af28381b65
SHA1b5015709fb98a8a849a0440c54c07c394e89bc59
SHA256386a4209241d3424783e2456ef79988a1032a9f4ead891b5551253520e439ee0
SHA51218ddec2d28640108faf5a4b9878cc0e6224fdc6ee26bd9fcfc2c972d0ea82a21468181c6fcc3413a99e2a9bc070e71d41c998528a324eee93ee1b59351b6f037
-
Filesize
417KB
MD5ea331456b0c22e14ee435f7be74e92ed
SHA1afc527b8a232dcca8f6ba66bc6ee32045bfcb721
SHA256458b53c62837677a0308c12db582107831a40ce1b2b818603d166401f599ed68
SHA51264e88e4f1a2edb35daa04781561480210c61b401084e81622b4c84dfe61745941eafc3ed1513aaca92bc2f662b3a19255e3db9f9661742767398b2d5f573b714
-
Filesize
544KB
MD540117f705bff008c3d96a73162dad044
SHA12735813836f36b5de83a745c47628053a0f61f66
SHA25632211c43bcfee2ea3ae54899af178d1fc0c2b1111b2a9e3cc3fd125e1ab7daad
SHA512eace1d55d479c4cf5692ec1dc98a6738e94874901bebe14a0a0a93eefd00fc4bd55a701e4629a1f7c47f72ac91fe3b698d590a8463119998852e05d6682f91a4
-
Filesize
401KB
MD5ec4cd2159189ffa5d293a24e92964b6d
SHA1d16bbb7b4504afa4d70442e051e548372586b5d3
SHA2568a77ed5526ecf88b81844993b5c55bdf6e056aade9c8cb3e1fd89a3b4d41a780
SHA512099663cd0584dce7ec17322fcecef330341a711a1d6854f57eb852650ab8272b44708f18ebf6ca0e42b2ca0ed10ad99ea7729562de553353afb615604ea19101
-
Filesize
959B
MD5ee9a8381338b060d86c58e2415f481f3
SHA1200f3ed7c773f50c80644f3976e09e876f45993f
SHA2567e1096d6f39ebe04d6e38bc714983af05ed92cc2bb4d3365ed4c85e733cb145c
SHA51226b9108b9522574e08560bc45a6470f85ca149317bd763f3a357040e0f0e743fd7bfc05e0ce2d9fb52bf89e22c61d221ddf8a7163f5143848717ca3d56847ef1
-
Filesize
13KB
MD594a43bf9e4550a8e06cefcfb7519bbf5
SHA1c40351ce9b24db273eecffbb708e7702080e2e80
SHA2569d9ea630863a3aabaf5d8552b467cfdd5339419d18197221f12dc5c9879f899b
SHA512f92b3b003b5abc0ca2fc487efb6ed352f5b08742e2cd235ca5ec0ca57c2d1fbd2fdebfb6dc92931389108b91102a9c7a9a7c4812cedf28758803f3e373563bb8
-
Filesize
193KB
MD5ef8d5785ac8669f5fd54e22f52770e6b
SHA14c94ae7ef233be33a56c0a5d9b8e2211d5d5792c
SHA256a614884ea627da1925131ebf41e8ae202caeac0fe543b86384f5eb2bfaf1aa75
SHA512ab3b140bd6531f22e994606820e6511442c23d9015b1e1a38aaed43aa42ba29a996511151d0b3a383c05c2b11f670e52cdd7f507ad1a1ad8cebea57fb22ade5a
-
Filesize
325KB
MD50616ea42b68a8f5f2f01bcd985bdcbc7
SHA188d6aae1f17b00f4391e0e7b17e98c494be73ba1
SHA256ea27c65491119eee5c8e87ce3d470783580db8fc5bd141c496768d7d0cce779a
SHA512ce4657908615c4837084c75d806c083b8f7e63965a2e7866b8c96de7c0278a0857235b74cd9443769968165db250eba042a5b05927febff5bb70bebb7dcbd814