Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
493s -
max time network
536s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
06/03/2025, 21:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://temp.sh/ennfh/trash_malware.zip
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
http://temp.sh/ennfh/trash_malware.zip
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral3
Sample
http://temp.sh/ennfh/trash_malware.zip
Resource
win11-20250217-en
Behavioral task
behavioral4
Sample
http://temp.sh/ennfh/trash_malware.zip
Resource
win7-20241010-en
General
-
Target
http://temp.sh/ennfh/trash_malware.zip
Malware Config
Signatures
-
UAC bypass 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Illerka.C.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mbrsetup.exe -
Windows security bypass 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" antivirus-platinum.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 3 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\Active Setup\Installed Components INSTALLER.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\Active Setup\Installed Components INSTALLER.exe Key created \REGISTRY\USER\S-1-5-21-2786730451-600132509-465537259-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2786730451-600132509-465537259-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" antivirus-platinum.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Possible privilege escalation attempt 2 IoCs
pid Process 1468 takeown.exe 2704 icacls.exe -
Executes dropped EXE 22 IoCs
pid Process 1148 svchost.exe 1480 taskhost.exe 776 svchost.exe 8 taskhost.exe 2208 svchost.exe 4408 taskhost.exe 4284 svchost.exe 3048 taskhost.exe 448 svchost.exe 2960 taskhost.exe 660 svchost.exe 2312 Free YouTube Downloader.exe 2176 302746537.exe 920 rhc7v5j0eap5.exe 2872 pphc3v5j0eap5.exe 3332 antivirus-platinum.exe 2332 mbrsetup.exe 3880 INSTALLER.exe 4236 AgentSvr.exe 3904 INSTALLER.exe 1852 AgentSvr.exe 3832 Box.exe -
Loads dropped DLL 29 IoCs
pid Process 4484 XPAntivirus2008.exe 4484 XPAntivirus2008.exe 3304 regsvr32.exe 1012 regsvr32.exe 4484 XPAntivirus2008.exe 920 rhc7v5j0eap5.exe 920 rhc7v5j0eap5.exe 920 rhc7v5j0eap5.exe 920 rhc7v5j0eap5.exe 3332 antivirus-platinum.exe 3880 INSTALLER.exe 1076 regsvr32.exe 340 regsvr32.exe 4040 regsvr32.exe 3576 regsvr32.exe 3640 regsvr32.exe 3768 regsvr32.exe 4188 regsvr32.exe 3904 INSTALLER.exe 1248 regsvr32.exe 1248 regsvr32.exe 2184 regsvr32.exe 2512 Bonzify.exe 1852 AgentSvr.exe 1852 AgentSvr.exe 1852 AgentSvr.exe 3832 Box.exe 4260 WerFault.exe 4672 WerFault.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1468 takeown.exe 2704 icacls.exe -
Windows security modification 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" antivirus-platinum.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2786730451-600132509-465537259-1000\Software\Microsoft\Windows\CurrentVersion\Run\Free Youtube Downloader = "C:\\Windows\\Free Youtube Downloader\\Free Youtube Downloader\\Free YouTube Downloader.exe" FreeYoutubeDownloader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2786730451-600132509-465537259-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiVirus Pro 2017 = "C:\\Users\\Admin\\Downloads\\trash_malware\\trash malware\\AntivirusPro2017.exe" AntivirusPro2017.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tv_enua = "RunDll32 advpack.dll,LaunchINFSection C:\\Windows\\INF\\tv_enua.inf, RemoveCabinet" INSTALLER.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SMrhc7v5j0eap5 = "C:\\Program Files (x86)\\rhc7v5j0eap5\\rhc7v5j0eap5.exe" XPAntivirus2008.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mbrsetup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mbrsetup.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: AntivirusPro2017.exe File opened (read-only) \??\M: AntivirusPro2017.exe File opened (read-only) \??\N: AntivirusPro2017.exe File opened (read-only) \??\Q: AntivirusPro2017.exe File opened (read-only) \??\Y: AntivirusPro2017.exe File opened (read-only) \??\Z: AntivirusPro2017.exe File opened (read-only) \??\G: AntivirusPro2017.exe File opened (read-only) \??\H: AntivirusPro2017.exe File opened (read-only) \??\I: AntivirusPro2017.exe File opened (read-only) \??\O: AntivirusPro2017.exe File opened (read-only) \??\P: AntivirusPro2017.exe File opened (read-only) \??\X: AntivirusPro2017.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\E: AntivirusPro2017.exe File opened (read-only) \??\J: AntivirusPro2017.exe File opened (read-only) \??\L: AntivirusPro2017.exe File opened (read-only) \??\R: AntivirusPro2017.exe File opened (read-only) \??\T: AntivirusPro2017.exe File opened (read-only) \??\W: AntivirusPro2017.exe File opened (read-only) \??\S: AntivirusPro2017.exe File opened (read-only) \??\U: AntivirusPro2017.exe File opened (read-only) \??\V: AntivirusPro2017.exe File opened (read-only) \??\D: explorer.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 AntivirusPro2017.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msvcp50.dll INSTALLER.exe File created C:\Windows\SysWOW64\pphc3v5j0eap5.exe rhc7v5j0eap5.exe File opened for modification C:\Windows\SysWOW64\SETC792.tmp INSTALLER.exe File created C:\Windows\SysWOW64\SETC792.tmp INSTALLER.exe -
resource yara_rule behavioral3/files/0x001a00000002af6c-867.dat upx behavioral3/memory/2176-877-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral3/memory/3332-938-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral3/memory/2176-941-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral3/memory/3332-947-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Drops file in Program Files directory 35 IoCs
description ioc Process File created C:\Program Files (x86)\rhc7v5j0eap5\database.dat XPAntivirus2008.exe File created C:\Program Files\7-Zip\7z.exe Zika.exe File created C:\Program Files\7-Zip\7zG.dll.sys.exe Zika.exe File opened for modification C:\Program Files\7-Zip\7zG.exe Zika.exe File created C:\Program Files\7-Zip\Uninstall.dll.sys.exe Zika.exe File created C:\Program Files (x86)\rhc7v5j0eap5\MFC71ENU.DLL XPAntivirus2008.exe File created C:\Program Files (x86)\rhc7v5j0eap5\msvcr71.dll XPAntivirus2008.exe File created C:\Program Files\7-Zip\Uninstall.exe\:Zone.Identifier:$DATA Zika.exe File created C:\Program Files (x86)\rhc7v5j0eap5\rhc7v5j0eap5.exe XPAntivirus2008.exe File created C:\Program Files (x86)\rhc7v5j0eap5\Uninstall.exe XPAntivirus2008.exe File opened for modification C:\Program Files\SwitchAssert.exe Zika.exe File opened for modification C:\Program Files\7-Zip\7z.dll.sys.exe Zika.exe File created C:\Program Files\7-Zip\7zFM.dll.sys.exe Zika.exe File created C:\Program Files\7-Zip\7zFM.exe Zika.exe File created C:\Program Files (x86)\rhc7v5j0eap5\MFC71.dll XPAntivirus2008.exe File opened for modification C:\Program Files\SwitchAssert.dll.sys.exe Zika.exe File created C:\Program Files\SwitchAssert.exe Zika.exe File created C:\Program Files\SwitchAssert.exe\:Zone.Identifier:$DATA Zika.exe File created C:\Program Files\7-Zip\7zFM.exe\:Zone.Identifier:$DATA Zika.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe Zika.exe File created C:\Program Files (x86)\rhc7v5j0eap5\msvcp71.dll XPAntivirus2008.exe File created C:\Program Files (x86)\rhc7v5j0eap5\license.txt XPAntivirus2008.exe File created C:\Program Files\7-Zip\7z.dll.sys.exe Zika.exe File created C:\Program Files\7-Zip\7z.exe\:Zone.Identifier:$DATA Zika.exe File created C:\Program Files\7-Zip\7zG.exe Zika.exe File opened for modification C:\Program Files\7-Zip\7zFM.dll.sys.exe Zika.exe File opened for modification C:\Program Files\7-Zip\Uninstall.dll.sys.exe Zika.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File created C:\Program Files (x86)\rhc7v5j0eap5\rhc7v5j0eap5.exe.local XPAntivirus2008.exe File created C:\Program Files\SwitchAssert.dll.sys.exe Zika.exe File opened for modification C:\Program Files\7-Zip\7z.exe Zika.exe File opened for modification C:\Program Files\7-Zip\7zG.dll.sys.exe Zika.exe File created C:\Program Files\7-Zip\7zG.exe\:Zone.Identifier:$DATA Zika.exe File created C:\Program Files\7-Zip\Uninstall.exe Zika.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe Zika.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Uninstall.ini FreeYoutubeDownloader.exe File opened for modification C:\Windows\COMCTL32.OCX AntivirusPlatinum.exe File opened for modification C:\Windows\INF\SETC236.tmp INSTALLER.exe File opened for modification C:\Windows\INF\agtinst.inf INSTALLER.exe File opened for modification C:\Windows\lhsp\tv\SETC78D.tmp INSTALLER.exe File created C:\Windows\msagent\SETC222.tmp INSTALLER.exe File created C:\Windows\lhsp\help\SETC78F.tmp INSTALLER.exe File created C:\Windows\msagent\SETC220.tmp INSTALLER.exe File created C:\Windows\lhsp\tv\SETC78E.tmp INSTALLER.exe File opened for modification C:\Windows\lhsp\tv\tvenuax.dll INSTALLER.exe File created C:\Windows\msagent\SETC234.tmp INSTALLER.exe File created C:\Windows\INF\SETC236.tmp INSTALLER.exe File created C:\Windows\msagent\intl\SETC239.tmp INSTALLER.exe File created C:\Windows\302746537.exe AntivirusPlatinum.exe File opened for modification C:\Windows\msagent\SETC234.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\AgentSR.dll INSTALLER.exe File opened for modification C:\Windows\help\SETC238.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\intl\Agt0409.dll INSTALLER.exe File created C:\Windows\__tmp_rar_sfx_access_check_240912765 AntivirusPlatinum.exe File created C:\Windows\antivirus-platinum.exe AntivirusPlatinum.exe File created C:\Windows\MSCOMCTL.OCX AntivirusPlatinum.exe File opened for modification C:\Windows\MSCOMCTL.OCX AntivirusPlatinum.exe File opened for modification C:\Windows\msagent\AgentDp2.dll INSTALLER.exe File created C:\Windows\msagent\SETC235.tmp INSTALLER.exe File opened for modification C:\Windows\lhsp\tv\SETC78E.tmp INSTALLER.exe File opened for modification C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe FreeYoutubeDownloader.exe File opened for modification C:\Windows\msagent\SETC235.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\SETC23A.tmp INSTALLER.exe File created C:\Windows\lhsp\tv\SETC78D.tmp INSTALLER.exe File opened for modification C:\Windows\lhsp\tv\tv_enua.dll INSTALLER.exe File opened for modification C:\Windows\INF\SETC791.tmp INSTALLER.exe File created C:\Windows\notepad.dll.sys.exe Zika.exe File created C:\Windows\msagent\SETC21F.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\SETC220.tmp INSTALLER.exe File created C:\Windows\msagent\SETC221.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\AgentSvr.exe INSTALLER.exe File created C:\Windows\finalDestruction.bin Bonzify.exe File opened for modification C:\Windows\msagent\SETC223.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\SETC224.tmp INSTALLER.exe File created C:\Windows\msagent\SETC224.tmp INSTALLER.exe File opened for modification C:\Windows\help\Agt0409.hlp INSTALLER.exe File opened for modification C:\Windows\lhsp\help\SETC78F.tmp INSTALLER.exe File opened for modification C:\Windows\lhsp\help\tv_enua.hlp INSTALLER.exe File created C:\Windows\executables.bin Bonzify.exe File opened for modification C:\Windows\msagent\AgentMPx.dll INSTALLER.exe File opened for modification C:\Windows\msagent\SETC237.tmp INSTALLER.exe File opened for modification C:\Windows\fonts\SETC790.tmp INSTALLER.exe File opened for modification C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Uninstall.exe FreeYoutubeDownloader.exe File opened for modification C:\Windows\msagent\AgentCtl.dll INSTALLER.exe File opened for modification C:\Windows\msagent\AgentDPv.dll INSTALLER.exe File opened for modification C:\Windows\msagent\AgentAnm.dll INSTALLER.exe File created C:\Windows\help\SETC238.tmp INSTALLER.exe File created C:\Windows\fonts\SETC790.tmp INSTALLER.exe File opened for modification C:\Windows\antivirus-platinum.exe AntivirusPlatinum.exe File opened for modification C:\Windows\msagent\SETC21F.tmp INSTALLER.exe File created C:\Windows\msagent\SETC223.tmp INSTALLER.exe File created C:\Windows\msagent\SETC237.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\mslwvtts.dll INSTALLER.exe File created C:\Windows\msagent\chars\Bonzi.acs Bonzify.exe File opened for modification C:\Windows\302746537.exe AntivirusPlatinum.exe File opened for modification C:\Windows\msagent\AgtCtl15.tlb INSTALLER.exe File created C:\Windows\INF\SETC791.tmp INSTALLER.exe File opened for modification C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe FreeYoutubeDownloader.exe File opened for modification C:\windows\antivirus-platinum.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4672 3832 WerFault.exe 174 -
System Location Discovery: System Language Discovery 1 TTPs 53 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icons.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhc7v5j0eap5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mbrsetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grpconv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AgentSvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Box.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zika.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FreeYoutubeDownloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antivirus-platinum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language INSTALLER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pphc3v5j0eap5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bonzify.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XPAntivirus2008.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 302746537.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AgentSvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AntivirusPro2017.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grpconv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IconDance.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language INSTALLER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Illerka.C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HappyAntivirus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AntivirusPlatinum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks SCSI registry key(s) 3 TTPs 58 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchHost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchHost.exe -
Kills process with taskkill 1 IoCs
pid Process 4776 taskkill.exe -
Modifies Control Panel 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2786730451-600132509-465537259-1000\Control Panel\International wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2786730451-600132509-465537259-1000\Control Panel\International\s1159 = "Bolbi" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2786730451-600132509-465537259-1000\Control Panel\International\s2359 = "Bolbi" wscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-2786730451-600132509-465537259-1000\Control Panel\Accessibility\MinimumHitRadius = "0" Box.exe Set value (data) \REGISTRY\USER\S-1-5-21-2786730451-600132509-465537259-1000\Control Panel\Desktop\WindowMetrics\SmCaptionFont = f4ffffff0000000000000000000000009001000001000001000005005300650067006f006500200055004900000000000000ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000 Box.exe Set value (data) \REGISTRY\USER\S-1-5-21-2786730451-600132509-465537259-1000\Control Panel\Input Method\Hot Keys\00000071\Target IME = 00000000 Box.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main antivirus-platinum.exe Key created \REGISTRY\USER\S-1-5-21-2786730451-600132509-465537259-1000\Software\Microsoft\Internet Explorer\Main antivirus-platinum.exe Set value (str) \REGISTRY\USER\S-1-5-21-2786730451-600132509-465537259-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "YOUR PC MAY BE INFECTED WITH SPYWARE OR OTHER MALICIOUS ITEMS" antivirus-platinum.exe Key created \REGISTRY\USER\S-1-5-21-2786730451-600132509-465537259-1000\Software\Microsoft\Internet Explorer\GPU SearchHost.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://secureservices2010.webs.com/scan" antivirus-platinum.exe Set value (str) \REGISTRY\USER\S-1-5-21-2786730451-600132509-465537259-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://secureservices2010.webs.com/scan" antivirus-platinum.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@%SystemRoot%\System32\dusmsvc.dll,-1 = "Data Usage" Box.exe Set value (int) \REGISTRY\USER\S-1-5-19\Control Panel\Accessibility\Keyboard Response\Last Valid Wait = "1000" Box.exe Set value (str) \REGISTRY\USER\S-1-5-20\AppEvents\EventLabels\Maximize\DispFileName = "@mmres.dll,-5833" Box.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WindowMetrics\ScrollWidth = "-255" Box.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\LowIcon = "inetcpl.cpl#005423" Box.exe Set value (str) \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\Notification.Looping.Call3\.Current\ = "%SystemRoot%\\media\\Ring03.wav" Box.exe Set value (str) \REGISTRY\USER\S-1-5-20\AppEvents\EventLabels\MessageNudge\DispFileName = "@mmres.dll,-5866" Box.exe Set value (str) \REGISTRY\USER\S-1-5-20\AppEvents\EventLabels\MoveMenuItem\DispFileName = "@ieframe.dll,-10322" Box.exe Set value (int) \REGISTRY\USER\S-1-5-20\AppEvents\EventLabels\Notification.Looping.Call5\ExcludeFromCPL = "1" Box.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Wisp\Pen\SysEventParameters\DblTime = "300" Box.exe Set value (int) \REGISTRY\USER\.DEFAULT\Control Panel\International\User Profile\ShowShiftLock = "1" Box.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@%systemroot%\system32\tokenbroker.dll,-100 = "Web Account Manager" Box.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@%systemroot%\System32\drivers\ws2ifsl.sys,-1000 = "Winsock IFS Driver" Box.exe Set value (data) \REGISTRY\USER\S-1-5-19\Control Panel\PowerCfg\PowerPolicies\2\Policies = 01000000020000000100000000000000020000000100000000000000000000008403000032320302040000000400000000000000000000000000000000000000000000002c0100000101505064640000 Box.exe Set value (str) \REGISTRY\USER\S-1-5-20\Control Panel\Mouse\MouseSensitivity = "10" Box.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@%windir%\system32\TimeBrokerServer.dll,-1001 = "Time Broker" Box.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\PushNotifications\Backup\Windows.SystemToast.EnterpriseDataProtection\Setting = "s:tickle,s:lock:toast,s:tile,s:lock:badge,s:banner,s:lock:tile,s:toast,s:badge,s:audio,s:voip,s:listenerEnabled,c:toast,c:ringing" Box.exe Set value (str) \REGISTRY\USER\S-1-5-20\AppEvents\EventLabels\Navigating\ = "Start Navigation" Box.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35053A22-8589-11D1-B16A-00C0F0283628} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5BE8BDD-7DE6-11D0-91FE-00C04FD701A5}\ = "IAgentCtlSpeechInput" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\LWVFile\DefaultIcon regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A7B93C8B-7B81-11D0-AC5F-00C04FD97575}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" AgentSvr.exe Set value (int) \REGISTRY\USER\S-1-5-21-2786730451-600132509-465537259-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "14035" SearchHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{58DA8D8F-9D6A-101B-AFC0-4210102A8DA7}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6B7E6392-850A-101B-AFC0-4210102A8DA7}\1.3\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0713E8AF-850A-101B-AFC0-4210102A8DA7} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.Toolbar regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BDD1F053-858B-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F5BE8BD2-7DE6-11D0-91FE-00C04FD701A5}\InprocServer32\ = "C:\\Windows\\msagent\\AgentCtl.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ED94440-E5E8-101B-B9B5-444553540000}\MiscStatus\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0713E953-850A-101B-AFC0-4210102A8DA7}\TypeLib\ = "{6B7E6392-850A-101B-AFC0-4210102A8DA7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0FA9F4D5-A173-11D1-AA62-00C04FA34D72}\ = "Microsoft Agent Voice Command Module Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{58DA8D8F-9D6A-101B-AFC0-4210102A8DA7}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0713E8B1-850A-101B-AFC0-4210102A8DA7}\ = "IColumnHeader10" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BF877896-E026-11CF-8E74-00A0C90F26F8}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{373FF7F1-EB8B-11CD-8820-08002B2F4F5A}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A62C8-C33B-11D1-84FE-00C04FA34A14}\InprocServer32\ = "C:\\Windows\\msagent\\AgentPsh.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{58DA8D93-9D6A-101B-AFC0-4210102A8DA7}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9ED94442-E5E8-101B-B9B5-444553540000}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0713E944-850A-101B-AFC0-4210102A8DA7} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BF877890-E026-11CF-8E74-00A0C90F26F8} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DA8D94-9D6A-101B-AFC0-4210102A8DA7}\ProxyStubClsid32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C27CCE32-8596-11D1-B16A-00C0F0283628} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D45FD31B-5C6E-11D1-9EC1-00C04FD7081F}\InprocServer32\ = "C:\\Windows\\msagent\\AgentCtl.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A7B93C80-7B81-11D0-AC5F-00C04FD97575}\TypeLib\Version = "2.0" AgentSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6E17E82-DF38-11CF-8E74-00A0C90F26F8}\ = "IListView11" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C74190B5-8589-11D1-B16A-00C0F0283628}\ = "ITreeViewEvents" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C8A3DC00-8593-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A7B93C8F-7B81-11D0-AC5F-00C04FD97575} AgentSvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ED94444-E5E8-101B-B9B5-444553540000}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{373FF7F0-EB8B-11CD-8820-08002B2F4F5A}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F5BE8BE1-7DE6-11D0-91FE-00C04FD701A5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8B77181C-D3EF-11D1-8500-00C04FA34A14}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A7B93C73-7B81-11D0-AC5F-00C04FD97575}\2.0\HELPDIR\ = "C:\\Windows\\msagent\\" AgentSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\COMCTL.Slider\CurVer\ = "COMCTL.Slider.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{612A8625-0FB3-11CE-8747-524153480004}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58DA8D91-9D6A-101B-AFC0-4210102A8DA7}\TypeLib\Version = "1.3" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6E17E86-DF38-11CF-8E74-00A0C90F26F8}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{373FF7F1-EB8B-11CD-8820-08002B2F4F5A}\TypeLib\Version = "1.3" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C74190B5-8589-11D1-B16A-00C0F0283628}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F5BE8BE8-7DE6-11D0-91FE-00C04FD701A5} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8B77181C-D3EF-11D1-8500-00C04FA34A14}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{612A8624-0FB3-11CE-8747-524153480004}\ = "Microsoft Toolbar Control, version 5.0 (SP2)" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0713E8D2-850A-101B-AFC0-4210102A8DA7}\ProgID\ = "COMCTL.ProgCtrl.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0713E8A1-850A-101B-AFC0-4210102A8DA7}\TypeLib\ = "{6B7E6392-850A-101B-AFC0-4210102A8DA7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6E17E80-DF38-11CF-8E74-00A0C90F26F8}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EC0AB1C0-6CAB-11CF-8998-00AA00688B10}\TypeLib\ = "{6B7E6392-850A-101B-AFC0-4210102A8DA7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DD9DA664-8594-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{58DA8D8F-9D6A-101B-AFC0-4210102A8DA7}\MiscStatus regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2334D2B3-713E-11CF-8AE5-00AA00C00905}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9ED94441-E5E8-101B-B9B5-444553540000}\TypeLib\Version = "1.3" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6B7E6391-850A-101B-AFC0-4210102A8DA7}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0713E8D1-850A-101B-AFC0-4210102A8DA7}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0713E8A4-850A-101B-AFC0-4210102A8DA7}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F4D83604-895E-11D0-B0A6-000000000000} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C27CCE3F-8596-11D1-B16A-00C0F0283628} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0713E8A1-850A-101B-AFC0-4210102A8DA7}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EFB6595-857C-11D1-B16A-00C0F0283628}\ = "ITabStripEvents" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F08DF952-8592-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F08DF953-8592-11D1-B16A-00C0F0283628}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F5BE8BC2-7DE6-11D0-91FE-00C04FD701A5}\1.5\HELPDIR\ = "C:\\Windows\\msagent\\" AgentSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A7B93C85-7B81-11D0-AC5F-00C04FD97575}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" AgentSvr.exe -
NTFS ADS 46 IoCs
description ioc Process File created C:\Users\Admin\Downloads\trash_malware\trash malware\Interop.WMPLib.dll\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\stupidy fuckity malware.bat\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Circles.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\PixelateScreen.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\AxInterop.WMPLib.dll\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Bolbi.vbs\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Circles.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Blur.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\gaben64.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\SOCIAL CREDIT TEST.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\sweeney64.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\ColorChange.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\gaben64.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\mbrsetup.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\SOCIAL CREDIT TEST.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\AxInterop.WMPLib.dll\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Bolbi.vbs\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Illerka.C.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\RotateScreen.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Interop.WMPLib.dll\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\RotateScreen.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\stupidy fuckity malware.bat\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Trippy.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Trojan.VBS.Bolbi v2.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Trojan.VBS.Bolbi v2.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Program Files\7-Zip\Uninstall.exe\:Zone.Identifier:$DATA Zika.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\FreeYoutubeDownloader.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\PixelateScreen.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\putin.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\sweeney64.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Trippy.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\ColorChange.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Program Files\SwitchAssert.exe\:Zone.Identifier:$DATA Zika.exe File created C:\Program Files\7-Zip\7zG.exe\:Zone.Identifier:$DATA Zika.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Jigsaw.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\FreeYoutubeDownloader.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Jigsaw.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\putin.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\WannaCrypt0r.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\WannaCrypt0r.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\XPAntivirus2008.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Program Files\7-Zip\7zFM.exe\:Zone.Identifier:$DATA Zika.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\AntivirusPlatinum.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Program Files\7-Zip\7z.exe\:Zone.Identifier:$DATA Zika.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Blur.exe\:Zone.Identifier:$DATA Illerka.C.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2156 Illerka.C.exe 2156 Illerka.C.exe 2156 Illerka.C.exe 2156 Illerka.C.exe 2156 Illerka.C.exe 2156 Illerka.C.exe 2156 Illerka.C.exe 2156 Illerka.C.exe 2156 Illerka.C.exe 2156 Illerka.C.exe 2156 Illerka.C.exe 2156 Illerka.C.exe 2156 Illerka.C.exe 2156 Illerka.C.exe 2156 Illerka.C.exe 2156 Illerka.C.exe 2156 Illerka.C.exe 2156 Illerka.C.exe 2156 Illerka.C.exe 920 rhc7v5j0eap5.exe 920 rhc7v5j0eap5.exe 2332 mbrsetup.exe 2332 mbrsetup.exe 2332 mbrsetup.exe 2332 mbrsetup.exe 2332 mbrsetup.exe 2332 mbrsetup.exe 2332 mbrsetup.exe 2332 mbrsetup.exe 2332 mbrsetup.exe 2332 mbrsetup.exe 2332 mbrsetup.exe 2332 mbrsetup.exe 2332 mbrsetup.exe 2332 mbrsetup.exe 2332 mbrsetup.exe 2332 mbrsetup.exe 2332 mbrsetup.exe 2332 mbrsetup.exe 2332 mbrsetup.exe 2332 mbrsetup.exe 2332 mbrsetup.exe 2512 Bonzify.exe 2512 Bonzify.exe 4116 explorer.exe 4116 explorer.exe 2512 Bonzify.exe 2512 Bonzify.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 920 rhc7v5j0eap5.exe 4116 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2576 firefox.exe Token: SeDebugPrivilege 2576 firefox.exe Token: SeDebugPrivilege 2576 firefox.exe Token: SeDebugPrivilege 2576 firefox.exe Token: SeDebugPrivilege 2576 firefox.exe Token: SeDebugPrivilege 2576 firefox.exe Token: SeDebugPrivilege 2576 firefox.exe Token: SeDebugPrivilege 4076 Zika.exe Token: SeDebugPrivilege 2156 Illerka.C.exe Token: SeDebugPrivilege 4776 taskkill.exe Token: SeDebugPrivilege 920 rhc7v5j0eap5.exe Token: SeDebugPrivilege 2332 mbrsetup.exe Token: 33 1852 AgentSvr.exe Token: SeIncBasePriorityPrivilege 1852 AgentSvr.exe Token: 33 1480 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1480 AUDIODG.EXE Token: SeShutdownPrivilege 4116 explorer.exe Token: SeCreatePagefilePrivilege 4116 explorer.exe Token: SeShutdownPrivilege 4116 explorer.exe Token: SeCreatePagefilePrivilege 4116 explorer.exe Token: SeShutdownPrivilege 4116 explorer.exe Token: SeCreatePagefilePrivilege 4116 explorer.exe Token: SeShutdownPrivilege 4116 explorer.exe Token: SeCreatePagefilePrivilege 4116 explorer.exe Token: SeShutdownPrivilege 4116 explorer.exe Token: SeCreatePagefilePrivilege 4116 explorer.exe Token: SeShutdownPrivilege 4116 explorer.exe Token: SeCreatePagefilePrivilege 4116 explorer.exe Token: SeShutdownPrivilege 4116 explorer.exe Token: SeCreatePagefilePrivilege 4116 explorer.exe Token: SeShutdownPrivilege 4116 explorer.exe Token: SeCreatePagefilePrivilege 4116 explorer.exe Token: SeShutdownPrivilege 4116 explorer.exe Token: SeCreatePagefilePrivilege 4116 explorer.exe Token: SeShutdownPrivilege 4116 explorer.exe Token: SeCreatePagefilePrivilege 4116 explorer.exe Token: SeShutdownPrivilege 4116 explorer.exe Token: SeCreatePagefilePrivilege 4116 explorer.exe Token: SeShutdownPrivilege 4116 explorer.exe Token: SeCreatePagefilePrivilege 4116 explorer.exe Token: SeShutdownPrivilege 4116 explorer.exe Token: SeCreatePagefilePrivilege 4116 explorer.exe Token: SeShutdownPrivilege 4116 explorer.exe Token: SeCreatePagefilePrivilege 4116 explorer.exe Token: SeShutdownPrivilege 4116 explorer.exe Token: SeCreatePagefilePrivilege 4116 explorer.exe Token: SeShutdownPrivilege 4116 explorer.exe Token: SeCreatePagefilePrivilege 4116 explorer.exe Token: SeShutdownPrivilege 4116 explorer.exe Token: SeCreatePagefilePrivilege 4116 explorer.exe Token: SeShutdownPrivilege 4116 explorer.exe Token: SeCreatePagefilePrivilege 4116 explorer.exe Token: SeShutdownPrivilege 4116 explorer.exe Token: SeCreatePagefilePrivilege 4116 explorer.exe Token: SeShutdownPrivilege 4116 explorer.exe Token: SeCreatePagefilePrivilege 4116 explorer.exe Token: 33 1852 AgentSvr.exe Token: SeIncBasePriorityPrivilege 1852 AgentSvr.exe Token: 33 1852 AgentSvr.exe Token: SeIncBasePriorityPrivilege 1852 AgentSvr.exe Token: SeShutdownPrivilege 4116 explorer.exe Token: SeCreatePagefilePrivilege 4116 explorer.exe Token: 33 1852 AgentSvr.exe Token: SeIncBasePriorityPrivilege 1852 AgentSvr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2576 firefox.exe 2576 firefox.exe 2576 firefox.exe 2576 firefox.exe 2576 firefox.exe 2576 firefox.exe 2576 firefox.exe 2576 firefox.exe 2576 firefox.exe 2576 firefox.exe 2576 firefox.exe 2576 firefox.exe 2576 firefox.exe 2576 firefox.exe 2576 firefox.exe 2576 firefox.exe 2576 firefox.exe 2576 firefox.exe 2576 firefox.exe 2576 firefox.exe 2576 firefox.exe 2784 AntivirusPro2017.exe 2784 AntivirusPro2017.exe 2784 AntivirusPro2017.exe 2312 Free YouTube Downloader.exe 2476 HappyAntivirus.exe 920 rhc7v5j0eap5.exe 2784 AntivirusPro2017.exe 2784 AntivirusPro2017.exe 2784 AntivirusPro2017.exe 920 rhc7v5j0eap5.exe 1852 AgentSvr.exe 1852 AgentSvr.exe 920 rhc7v5j0eap5.exe 920 rhc7v5j0eap5.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2784 AntivirusPro2017.exe 2784 AntivirusPro2017.exe 2784 AntivirusPro2017.exe 2312 Free YouTube Downloader.exe 2476 HappyAntivirus.exe 920 rhc7v5j0eap5.exe 2784 AntivirusPro2017.exe 2784 AntivirusPro2017.exe 2784 AntivirusPro2017.exe 920 rhc7v5j0eap5.exe 1852 AgentSvr.exe 1852 AgentSvr.exe 920 rhc7v5j0eap5.exe 920 rhc7v5j0eap5.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe 4116 explorer.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 2576 firefox.exe 2576 firefox.exe 2576 firefox.exe 2576 firefox.exe 2784 AntivirusPro2017.exe 2784 AntivirusPro2017.exe 920 rhc7v5j0eap5.exe 920 rhc7v5j0eap5.exe 920 rhc7v5j0eap5.exe 3332 antivirus-platinum.exe 920 rhc7v5j0eap5.exe 4116 explorer.exe 704 SearchHost.exe 3328 StartMenuExperienceHost.exe 4116 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3784 wrote to memory of 2576 3784 firefox.exe 80 PID 3784 wrote to memory of 2576 3784 firefox.exe 80 PID 3784 wrote to memory of 2576 3784 firefox.exe 80 PID 3784 wrote to memory of 2576 3784 firefox.exe 80 PID 3784 wrote to memory of 2576 3784 firefox.exe 80 PID 3784 wrote to memory of 2576 3784 firefox.exe 80 PID 3784 wrote to memory of 2576 3784 firefox.exe 80 PID 3784 wrote to memory of 2576 3784 firefox.exe 80 PID 3784 wrote to memory of 2576 3784 firefox.exe 80 PID 3784 wrote to memory of 2576 3784 firefox.exe 80 PID 3784 wrote to memory of 2576 3784 firefox.exe 80 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 4184 2576 firefox.exe 81 PID 2576 wrote to memory of 2884 2576 firefox.exe 82 PID 2576 wrote to memory of 2884 2576 firefox.exe 82 PID 2576 wrote to memory of 2884 2576 firefox.exe 82 PID 2576 wrote to memory of 2884 2576 firefox.exe 82 PID 2576 wrote to memory of 2884 2576 firefox.exe 82 PID 2576 wrote to memory of 2884 2576 firefox.exe 82 PID 2576 wrote to memory of 2884 2576 firefox.exe 82 PID 2576 wrote to memory of 2884 2576 firefox.exe 82 -
System policy modification 1 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDrives = "67108863" antivirus-platinum.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mbrsetup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticecaption = "ATTENTION!" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticetext = "Your PC has been wrecked by Bolbi!" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer antivirus-platinum.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1228 attrib.exe
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "http://temp.sh/ennfh/trash_malware.zip"1⤵
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url http://temp.sh/ennfh/trash_malware.zip2⤵
- Checks processor information in registry
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1936 -parentBuildID 20240401114208 -prefsHandle 1876 -prefMapHandle 1852 -prefsLen 27661 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5df94961-80b5-4abb-8023-0ae47196617b} 2576 "\\.\pipe\gecko-crash-server-pipe.2576" gpu3⤵PID:4184
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2364 -parentBuildID 20240401114208 -prefsHandle 2356 -prefMapHandle 2352 -prefsLen 28581 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1ae3d486-1acd-4ae5-9e98-1cf288b51e1f} 2576 "\\.\pipe\gecko-crash-server-pipe.2576" socket3⤵
- Checks processor information in registry
PID:2884
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2624 -childID 1 -isForBrowser -prefsHandle 2644 -prefMapHandle 2812 -prefsLen 22746 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7514922b-30dd-4aeb-92d9-4a464b250fe3} 2576 "\\.\pipe\gecko-crash-server-pipe.2576" tab3⤵PID:2716
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3640 -childID 2 -isForBrowser -prefsHandle 3632 -prefMapHandle 3628 -prefsLen 33071 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {79897d63-4a13-466d-a765-ab19f0f2b2bb} 2576 "\\.\pipe\gecko-crash-server-pipe.2576" tab3⤵PID:1288
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4856 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4840 -prefMapHandle 4624 -prefsLen 33071 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cedc7b39-63a1-462d-b5e3-d782fa2dfe0c} 2576 "\\.\pipe\gecko-crash-server-pipe.2576" utility3⤵
- Checks processor information in registry
PID:2868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5448 -childID 3 -isForBrowser -prefsHandle 4256 -prefMapHandle 5428 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d7c599b-63be-4738-843f-70898f816a1d} 2576 "\\.\pipe\gecko-crash-server-pipe.2576" tab3⤵PID:3416
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5672 -childID 4 -isForBrowser -prefsHandle 5592 -prefMapHandle 5596 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9e0dd28d-88b6-432a-8eb6-291241e8194e} 2576 "\\.\pipe\gecko-crash-server-pipe.2576" tab3⤵PID:2708
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5764 -childID 5 -isForBrowser -prefsHandle 5572 -prefMapHandle 5820 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7852ef29-0323-4fa8-a536-e56cd6dcd44b} 2576 "\\.\pipe\gecko-crash-server-pipe.2576" tab3⤵PID:2796
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2616 -childID 6 -isForBrowser -prefsHandle 2664 -prefMapHandle 3008 -prefsLen 27226 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6d8ad992-b4c8-43e9-90c0-ffe5bdac9655} 2576 "\\.\pipe\gecko-crash-server-pipe.2576" tab3⤵PID:3404
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:920
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\trash_malware\trash malware\stupidy fuckity malware.bat" "1⤵PID:2764
-
C:\Windows\system32\msg.exemsg * you did a mistake...2⤵PID:4748
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\Zika.exeZika.exe2⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.exe"C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.exe" -extract C:\Program Files\SwitchAssert.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.rc, icongroup,,3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1148
-
-
C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.rc, C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.res3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1480
-
-
C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.exe"C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.exe" -extract C:\Program Files\7-Zip\7z.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.rc, icongroup,,3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:776
-
-
C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.rc, C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.res3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:8
-
-
C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.exe"C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.exe" -extract C:\Program Files\7-Zip\7zFM.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.rc, icongroup,,3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2208
-
-
C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.rc, C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.res3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4408
-
-
C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.exe"C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.exe" -extract C:\Program Files\7-Zip\7zG.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.rc, icongroup,,3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4284
-
-
C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.rc, C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.res3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.exe"C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.exe" -extract C:\Program Files\7-Zip\Uninstall.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.rc, icongroup,,3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:448
-
-
C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.rc, C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.res3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.exe"C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.exe" -addoverwrite C:\Program Files\7-Zip\Uninstall.exe", "C:\Program Files\7-Zip\Uninstall.exe, C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.res, icongroup,,3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:660
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\trash_malware\trash malware\Bolbi.vbs"2⤵PID:4000
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\Downloads\trash_malware\trash malware\Bolbi.vbs" /elevated3⤵
- Modifies Control Panel
- System policy modification
PID:3648
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\IconDance.exeIconDance.exe2⤵
- System Location Discovery: System Language Discovery
PID:1624
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\Illerka.C.exeIllerka.C.exe2⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\FreeYoutubeDownloader.exeFreeYoutubeDownloader.exe2⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2720 -
C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe"C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2312 -
C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies data under HKEY_USERS
PID:3832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 12405⤵
- Loads dropped DLL
- Program crash
PID:4672
-
-
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\XPAntivirus2008.exeXPAntivirus2008.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4484 -
C:\Windows\SysWOW64\wscript.exewscript //B C:\Users\Admin\AppData\Local\Temp\pin.vbs "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Antivirus XP 2008" "Antivirus XP 2008.lnk"3⤵
- System Location Discovery: System Language Discovery
PID:4040
-
-
C:\Windows\SysWOW64\wscript.exewscript //B C:\Users\Admin\AppData\Local\Temp\pin.vbs "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Antivirus XP 2008" "Register Antivirus XP 2008.lnk"3⤵
- System Location Discovery: System Language Discovery
PID:2036
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ocob.bat "C:\Users\Admin\Downloads\trash_malware\trash malware\XPAntivirus2008.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1672
-
-
C:\Program Files (x86)\rhc7v5j0eap5\rhc7v5j0eap5.exe"C:\Program Files (x86)\rhc7v5j0eap5\rhc7v5j0eap5.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:920 -
C:\Windows\SysWOW64\pphc3v5j0eap5.exe"C:\Windows\system32\pphc3v5j0eap5.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2872
-
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\AntivirusPro2017.exeAntivirusPro2017.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2784
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\HappyAntivirus.exeHappyAntivirus.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2476
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\AntivirusPlatinum.exeAntivirusPlatinum.exe2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1236 -
C:\WINDOWS\302746537.exe"C:\WINDOWS\302746537.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\114D.tmp\302746537.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:1104 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s c:\windows\comctl32.ocx5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3304
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s c:\windows\mscomctl.ocx5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1012
-
-
\??\c:\windows\antivirus-platinum.exec:\windows\antivirus-platinum.exe5⤵
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3332
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h c:\windows\antivirus-platinum.exe5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1228
-
-
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\icons.exeicons.exe2⤵
- System Location Discovery: System Language Discovery
PID:5004
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\Bonzify.exeBonzify.exe2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\KillAgent.bat"3⤵
- System Location Discovery: System Language Discovery
PID:4888 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im AgentSvr.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4776
-
-
C:\Windows\SysWOW64\takeown.exetakeown /r /d y /f C:\Windows\MsAgent4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:1468
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\MsAgent /c /t /grant "everyone":(f)4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2704
-
-
-
C:\Users\Admin\AppData\Local\Temp\INSTALLER.exeINSTALLER.exe /q3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3880 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentCtl.dll"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1076
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentDPv.dll"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:340
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\mslwvtts.dll"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4040
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentDP2.dll"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3576
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentMPx.dll"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3640
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentSR.dll"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3768
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentPsh.dll"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4188
-
-
C:\Windows\msagent\AgentSvr.exe"C:\Windows\msagent\AgentSvr.exe" /regserver4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4236
-
-
C:\Windows\SysWOW64\grpconv.exegrpconv.exe -o4⤵
- System Location Discovery: System Language Discovery
PID:2060
-
-
-
C:\Users\Admin\AppData\Local\Temp\INSTALLER.exeINSTALLER.exe /q3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3904 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\lhsp\tv\tv_enua.dll4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1248
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\lhsp\tv\tvenuax.dll4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2184
-
-
C:\Windows\SysWOW64\grpconv.exegrpconv.exe -o4⤵
- System Location Discovery: System Language Discovery
PID:3160
-
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\mbrsetup.exe"C:\Users\Admin\Downloads\trash_malware\trash malware\mbrsetup.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2332
-
-
C:\Windows\msagent\AgentSvr.exeC:\Windows\msagent\AgentSvr.exe -Embedding1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1852
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004BC 0x00000000000004E01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1480
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4116
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:3328
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3832 -ip 38321⤵
- Loads dropped DLL
PID:4260
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39f7855 /state1:0x41c64e6d1⤵PID:4216
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000148 0000008c1⤵PID:3832
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1AppInit DLLs
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1AppInit DLLs
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
8Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.0MB
MD504b88c7067b53a9bdf844cd1cb4b9c30
SHA17d081a1053cd9ef3d593f5ef9a27303824b779f5
SHA256d42b135a1e70b6f7d0d98c340f4b529f722953cf57e573bb21a078f50f2016b9
SHA512566f36f804d3027daab0e01f6d816b0420ba21fc276f2fabda4d0ed37b0e830704dcba8ccc3d30a7023c69f8ad3da0b9b58a49a26b3bb239d8ae0762bc157a42
-
Filesize
549KB
MD50b24892597dcb0257cdb78b5ed165218
SHA15fe5d446406ff1e34d2fe3ee347769941636e323
SHA256707f415d7d581edd9bce99a0429ad4629d3be0316c329e8b9ebd576f7ab50b71
SHA51224ea9e0f10a283e67850070976c81ae4b2d4d9bb92c6eb41b2557ad3ae02990287531a619cf57cd257011c6770d4c25dd19c3c0e46447eb4d0984d50d869e56f
-
Filesize
963KB
MD5004d7851f74f86704152ecaaa147f0ce
SHA145a9765c26eb0b1372cb711120d90b5f111123b3
SHA256028cf2158df45889e9a565c9ce3c6648fb05c286b97f39c33317163e35d6f6be
SHA51216ebda34803977a324f5592f947b32f5bb2362dd520dc2e97088d12729024498ddfa6800694d37f2e6e5c6fc8d4c6f603414f0c033df9288efc66a2c39b5ec29
-
Filesize
5.6MB
MD540228458ca455d28e33951a2f3844209
SHA186165eb8eb3e99b6efa25426508a323be0e68a44
SHA2561a904494bb7a21512af6013fe65745e7898cdd6fadac8cb58be04e02346ed95f
SHA512da62cc244f9924444c7cb4fdbd46017c65e6130d639f6696f7930d867017c211df8b18601bfdaaee65438cee03977848513d7f08987b9b945f3f05241f55ec39
-
Filesize
692KB
MD54159ff3f09b72e504e25a5f3c7ed3a5b
SHA1b79ab2c83803e1d6da1dcd902f41e45d6cd26346
SHA2560163ec83208b4902a2846de998a915de1b9e72aba33d98d5c8a14a8fbf0f6101
SHA51248f54f0ab96be620db392b4c459a49a0fa8fbe95b1c1b7df932de565cf5f77adfaae98ef1e5998f326172b5ae4ffa9896aeac0f7b98568fcde6f7b1480df4e2d
-
Filesize
14KB
MD55dfdda860ba69df0ae0ab193cf22a4ad
SHA1631c3b573b87688a9c5c5f9268fa826b315acb22
SHA2562ffa1c010889dc2c03dfef2271343ac6032c3966530c383b92d3dfd99a3aadc5
SHA512ba844e4157d1da80879d89d52155e10f02682f34d92a5a7a57fb1d723cac66b01ff3aace379072780c01720419fd21f1f25279f6587950e9ed4c43688c284a95
-
Filesize
5.6MB
MD528cab2224580a30e19000b0148499752
SHA1c7a717b2c014cf16333a74fafa77ad9f2a459198
SHA256497fb02861144fb4abeec83f3dab727675ea91c827b6492e5633992ad2db61c7
SHA5127d26a529a321f764bcdc269223dab89e71e2034b7f06e7700255c3c48a8f7eb0248c96f61524811e5631d16b18a51eb98e496977cd8ed9eac1f136c0f811ae1d
-
Filesize
82B
MD54b8cbdf2780f2a8407e5f0d734ee908d
SHA1a5ee1e7fb8b7ec54537f282b3fddf491a8417b47
SHA256770445a34792447c2856712254b18adbaeaf3c1c66b56c3df7a1d2fc73984738
SHA51201a3278dba5a59fbcb13fdecf004969b979b91fa18fdad386e5aa23973fb66303cc3f85bf03879a01f6ad9f085d0ce5a544c1693c7133030871f9d653a71b570
-
Filesize
230KB
MD50edd97321de3fe148603eadd7a746af4
SHA1fa32a8e3bddbc6061eab62233c80fc9400e8bdd9
SHA2568f0ad4593609d723c870cf7dffefa4e86be5f42217499299e7bfd618e32d1180
SHA5126ac3ac951c4ed96e9e0b3e3ea2d93122154b3481d48591f7e5eaf06ba641fbdbc38cb7b5f4e47acb38fe3705bea81e2f23312ebe7e5954086a9b0c585481e235
-
Filesize
1KB
MD52a6fd455ca0480e1f4d5d7dca1abb363
SHA1fd1eeece1d77079fa7afe8e41889eac9fdc09199
SHA25659a31b0c6dfdbeb16b933616da379b8c5c992c33e06da024d9ad11dcde2d53a5
SHA512cddc4d3517748a9bb26a28d0e50211fa75825168100c79624987985ae1e6978d596d326e4a4bb3f85016d0b43f23b1267377bbe778be07acd86731ebb8ebbcb9
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Antivirus XP 2008\Register Antivirus XP 2008.lnk
Filesize1KB
MD52b393158a6aa75b04ae36efd8cc9be1d
SHA1079445fda3a3a9bf4681d1c831a62ba303d60f75
SHA256a61cc9b194b51bf86e3f31b866f8a95d95bd3a6f7a96efa028077fb3cdf89630
SHA5128cc48289f7782432eb1c13cf0d6c010d5d8de13dee1748fba40611619e648c388f111e5dbea4f470e3f83c2fa288579ef8d32b4168ac28f0d8ecc05dd7c526c7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD561b80e322ff36812cc3d96bafdafa93e
SHA1ca8ca0b580434f8d604db47ec6376d51a1acf0bc
SHA25675509de07f1ea9ea2e731aef27b97010c4fa0cdc4d5fe9420cdec89c33bd9c17
SHA5126ae235bced80972a1565f1a67061d597304c2f6cde94dd34ea247709382ec7c4daa2ee4ef8d991006d23627454849ff55982605eb633767590e4dbed7d2624f9
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\27KPFAUE\www.bing[1].xml
Filesize325B
MD5b13bd4ddc31ec0b715c2f395af60c2c2
SHA161f7708c620a6586864100a64894f31ffcd289aa
SHA2560408078a01c3bba6ae9e6bbe2885f7699b1baf2d1a9b8f0d45f6a67bb2128d18
SHA51220520a89460d1c25f8193800414ad73116d03ccc91461ab8b39184a886edf904f0cf14dba47c0a316d91137dd3caa4c03f0fc9501311f332c0bd29a4fd6fa4ca
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\27KPFAUE\www.bing[1].xml
Filesize15KB
MD5a276a2ce0182aa437375819b54693802
SHA12034dd9bda470fb317a794ad5ac66b78255dade7
SHA25635a0dc4cc4f103cefef078505ca2df2e74c6ddf6d63ec01c084c6643245e1bb4
SHA5123d9d86878d4529e58b40be52b1761c4a228cce2fcd29f483b188871ba3909af07cfb16d52e3cf16d09cde295b6544427cceb6bbb5e80f240adcffbb2d942ce9b
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\27KPFAUE\www.bing[1].xml
Filesize19KB
MD5762786b301657578d4a622f4ed3b8a92
SHA1252870aa55e0df62b8dabc11b715141e7ba734f2
SHA256759172fb6b239501764fffadf01dc341a32c16def76c091a1b3e0127e2dc2ec8
SHA512bb19f369402a0f2fcb6557e7279ca4e8370c96c05d746eec7035ad86a83613878fc4efb30af5bd45dea35b6a4321a42faf7553f88259bffd27abe631a17f97e2
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\27KPFAUE\www.bing[1].xml
Filesize9KB
MD543c9149bfd672138047974c6406fef37
SHA11a84a1dde9cadea097b7d4dc88456d4dfced79be
SHA256d11197856d6291584537693699050c10d27dd3809a5a5045c87b87355ef9ace1
SHA5123f5391de954ef19fd0b5508135a7db9a3cf01a8ae81ce4fbc95a1de70fbd3a1ad6587c06e8dcf258f34d7aac6a6b9423e686cc42b8cccb8434e08b7c2faa3a7d
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\27KPFAUE\www.bing[1].xml
Filesize10KB
MD5db5fc5820684f21e3da28868855dd28f
SHA1e1867bf828ca84736220cd423984a389b49fb034
SHA256d080c7740bb4f3959cb1ecc1d87ebcfd0a509690b9eae13110ae9b5a93bea06f
SHA512d034de791c036faead8a32207eea813543caaafa8e8c6cbc21b5cb690da0cc12b61e029b95342af7fc2369fadc53ab1115371a7e45220953e7a1f58d4432a1d4
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133857694617734781.txt
Filesize88KB
MD5314411f9b543b5bec804add4ee6b2dce
SHA1a584cb557d7592840c056d906fa89078021080d6
SHA25643e327f77d508eb79c789d78554757fcd782d6b52fdc27070933c35d547fc839
SHA5123a1471e573a25100281d305b4f317202d5b0428d0becd80ea6f99fee20d1fb92d17b9aa6bbe51f336b12a08002715e374d74e9ccc90a4500ad79d1605d36d9c6
-
Filesize
348B
MD57d8beb22dfcfacbbc2609f88a41c1458
SHA152ec2b10489736b963d39a9f84b66bafbf15685f
SHA2564aa9ed4b38514f117e6e4f326cb0a1be7f7b96199e21305e2bd6dce289d7baa2
SHA512a26cf9168cf7450435a9fe8942445511f6fda1087db52bd73e335d6f5b544fc892999019d9291d9dcc60c3656de49688f6d63282c97706e2db286f988e44fd94
-
Filesize
1KB
MD50e581dbc510cb867773d322c22275703
SHA1e77c65e5afa7147740b9153a536ac6e7fcb8a6e0
SHA256498446f91da7facd85ec64a4b009ebd3b37df82ed8ea72634f853887689cf6d9
SHA512ce16d74e3b90bd68f407b9269c755c53960d74b6234a775e05960ebfc3655098972bde2f2c6786060bb421de2e5fec889c1b3b3493215000e2e4af5fda6918e8
-
Filesize
23B
MD50242dcc2276a78bad128831c3658e05d
SHA17f1cbfe2bbe0a88839b5bb988d83aab24b6af559
SHA256efd2129c933ee2233bf7fc74e640c0b01d9aee82a9bd08088528fe366c2d77c8
SHA512ac308ec35d4b9e3c3b4e3ce57c1459158f2f82cf0999f4a7b99c58f2431c9e096c59f493285e4f0331430ab3cc22e4d17c35791e21b177384d0f770ab053eb79
-
Filesize
32B
MD545d02203801ec5cae86ed0a68727b0fa
SHA11b22a6df3fc0ef23c6c5312c937db7c8c0df6703
SHA2565e743f477333066c29c3742cc8f9f64a8cb9c54b71dbc8c69af5025d31f8c121
SHA5128da0bf59066223aab96595c9fbf8532baa34f1f9c2c0dee674d310a82677b6c7d6a1cc0bbaa75262b986d2b805b049ec3a2bfb25a9ae30fe6d02e32660f15e83
-
Filesize
1KB
MD52283046ca6c89d23349a4ed76964e188
SHA1786a12ad143db960a78ee4e926c6db0153da4245
SHA256ed680a08263dbb1e2a66f9d41e6f2bba9a5a6805ce178326d9af1d3316c9e135
SHA512f5fb87e4fc3d75471a31302f2c68fb6ac82d5fe691b81dafe3a11a17fcd9ca5cb5ee68b96d61ee306cded4ee371df4024fcc2beac882111825053ca3c2d8ab02
-
Filesize
861KB
MD566064dbdb70a5eb15ebf3bf65aba254b
SHA10284fd320f99f62aca800fb1251eff4c31ec4ed7
SHA2566a94dbda2dd1edcff2331061d65e1baf09d4861cc7ba590c5ec754f3ac96a795
SHA512b05c6c09ae7372c381fba591c3cb13a69a2451b9d38da1a95aac89413d7438083475d06796acb5440cd6ec65b030c9fa6cbdaa0d2fe91a926bae6499c360f17f
-
Filesize
206B
MD5b48b020c9c2caec91395e91dd63084fc
SHA19d19f13d305e96401c71ab5713e78b1361e8c863
SHA256a24d6e63a73c09eb70e1c64396971ed3c2fbdec55bbd5918b546ea8f83b97dcc
SHA512ded7ab614a47afec17e3fae1086e84820102b928a098460bdad03d085ceeb7642bfb093b3ef67da06ec84896ae130f432d1ce0105d30b90942bdeefd4dd3fa77
-
Filesize
291B
MD51f52db17f80c124651768699d3d1b860
SHA12d406c8618c081edb9f1c52a27209dec1d97efbb
SHA2561fc04ee98599501190512c0955db92aa999bc5d5560f1613c748186c69289c7b
SHA512c997e7ac2de050af1cdf5fe6260c7b6b5e526134d2308481286abee1298eb5a29652f5d71f191bf57dc102bebdbb7befe657da8ca05cec66c42ded403c65624c
-
Filesize
330B
MD586aae7a4d3a13c75b6dbc1df6dc15ba6
SHA1eb63c3ddcf0b705e1642e4606571294c79c5fb3d
SHA25607d2f7be8e428409947ccdacf4923949471a4f7f2365bc29b51023f5877a4670
SHA512cad63bf6128dcd50ca43323fe63488a4182625c452fba21fef493c7168d54dd9c77b0b2475e6996c4425c689a0b2a1197b2a88cf375fb37b79769ae21e510d65
-
Filesize
368B
MD5f38779b0e0901cc3ca0227afa23c2b11
SHA1ad18329b4d6da4d9c50e3fad838f728eefee452a
SHA256e4a48f24bbfed51077954f72f78c81bc1f3ccaa9c528ca19d814fa21a9fa9956
SHA5124ec1293f4de905c04a5f431fc3bf893ad0c5ee93f5d1de856248361ef6b2182c2f26df73ec65c059848383903702f542ac6cca4812d658210297e123cf1036ef
-
Filesize
412B
MD595e185c9f35253c766fd409ed9fdf9ef
SHA182e3274a524f8defcaa3f5ac18c25f2b7ec54da4
SHA256c4f56da20697c54fd3f0d59f7ca563be4f1cea72959a84bb91169463c641d459
SHA51297b2c38cda1f94ffcd1125dd8d307ca1c584e796abd161730a76455688c35821d4794c0d09ffe6d81cff161f5c135c11d8cf8f0c8f675ac0f4649c278abcbbf5
-
Filesize
411B
MD500281c9c151a2cc71957e5fe508ccb9b
SHA17fbcc231253c818736069a89092e742333b9def0
SHA2568dc2045dd81dc8274c2445daa71a858bb3adba4bebc522779d397d7df9492099
SHA512f6a0da702cedb437bfc5eccca2045c0f740a71614629c35cb5bcf134d9359f65a05100e60eb31c2bbc211984a1f4d6a2425ac47bb7cb59166c4ed73e58d1cdf6
-
Filesize
244B
MD58038f8d15477a4206219bb3403bebe0c
SHA13ad9f6b8c9ca835c53cbeb20c027dc6e67da4227
SHA256f9bbe4d97a3514d3fac776692df0eec1dc58d1d18aa0b6cebabed8079101669e
SHA5126e3ec1040e7322dc2c49f8c8dcbf4d9ffdd70ceadc5e7110739f9a527f7e94926d084929bc815ef9d2f454245e5906f05dec55aa05a1fb90a46b25f94c2f2d57
-
Filesize
246B
MD5b2a34bc949630ff72528f3b3d178670f
SHA14af85fcd27e72d1c3b6ca14d69a0142b7c125fc1
SHA25607eef2ff78f4574409072f66cb37d4ac70a5dd0144f154530223673ae3d0c26d
SHA512283b3d99fd78ff4a5b69180aa39f85ea37b889d8a805421c1030172496c43eaaf50694ffceaed581666fb4448a1039bb60bb8798ac339c25d3170d027dd8c3e0
-
Filesize
245B
MD5767888066400df872ed492fc3977de3f
SHA171af3fde52b893b084e7f99dd3e855bca91c32c1
SHA25636223bc20d9b22058d58510664bb200de1c92622e4282d5198d4cac711e9239e
SHA5124907ccef6aca834eefb3733f78e6cad9393b23145a561b35ff389a66148d5a28df2e7dfdf26debce9c493c96c03ea61be420e6e8d7cd958c070523631ae1b2b7
-
Filesize
251B
MD52505bcd31229a3beb5022ce3f14cedb1
SHA1d8cf8d9bb9317baa22fc9268b03aab85ae9b9d3d
SHA256a6cfdbdb626233abdde9806d9756d711866ef8cb390d6035a0f922998fa2ec6f
SHA5127f8d57205063c7bf0464a280bec1962282ab521ae42789ed380654e8fddaab11f379565753b0677039ee923c4acd23839bf51c469199b0566b42fc6132c1b50f
-
Filesize
289B
MD59ed10b7cd77392819c352e4dd36a97c8
SHA166cb643132e6a965f89a9f4735c66410f2ec143e
SHA2560e9f2b5d66e6f9fec435809c9d132c6addce6487e3b21ba88bafc0ed43b9d7bf
SHA5124dca1198d44617a671f8df54bba025144d4857ae3e21a246b6d3327c820722ea03bc1c587bee324c8c280c0c074430701b66630d3cbf8718f258f92fa33558e4
-
Filesize
335B
MD52db91ca5154ddd31c0ebfa848b8a8ea8
SHA1274b9d83734dccd2a1dd1bcb2f8e42f2c8342675
SHA256f254e4edba8d31d5eab3074d1a3afa44aa968ec0d42fb53738bf76a3b3a79388
SHA51281e9a0668508514d532a3aa0b6395befa75e6216796279ec2421fc9e49068bb199ee8a55c2e1060e459e76e012a45b5df653f4bb05839e917ffbc235f0ee8092
-
Filesize
4.1MB
MD5c6391727ae405fb9812a8ad2a7729402
SHA183693dc297392c6a28f7f16d23414c6d62921711
SHA256d98fbfca17f194400d19111e4813340e6666b254b99f833739b661a4d2d0217c
SHA5127a4e2ff93d853415d433f5e90b36959c78b77590aa1fa00753831eb4d01cb1a972bb9e39eb8dee5b216005e7709eacda51c0c410aacfe37fcdb163603fd36570
-
Filesize
44B
MD5dbfea325d1e00a904309a682051778ad
SHA1525562934d0866f2ba90b3c25ea005c8c5f1e9fb
SHA25615a3a3303b4a77272ddb04454333a4c06aa2a113f210ba4a03314026e0821e6d
SHA512cd853c67c2b1a44c3f592ff42d207b2251e8b9bc1eb22fc12cd710329069ef75abffccd169418c4f9bd008a40f2fbbfc6904519f27fd658f316309f94b8ff59c
-
Filesize
716B
MD5f515966525b6a041868fd228a940c19f
SHA17d7373749755b1c8bb4377bde376f9867b9b8f8c
SHA256870cd2fa48302fe69df91781bb6e9bab65a86b9916f204f185b248634711c55b
SHA512a06cb6f10df9a86483c3909c2bce33c7905c5a9d48113142d6cb946ded576ba2e57b63c01a5c674e0c95ddc359c5fb6bfa0ba928063332ec20cc365071780797
-
Filesize
716B
MD5fdaf8b4743cd0db88b950bd242b41b4c
SHA19c222aa5748dadf3438d8358abc72e1650a26346
SHA256e4a2ab93d143159e161e9f4300bbd1135e116ea2bf01472db163f8f2ce361398
SHA512a2317bdb68d607e14937f5f658dd011912e5b6be482af95c683c2b7be7c311fad6ddf686d61bd868712946d66139e3efec7648e809ba43886431c1aaf908e754
-
Filesize
716B
MD5c85ddff1120753e89c979be3dd4e81a2
SHA1d401ec1436012ddd70b5934d1dbee08cc8e9e4fc
SHA256a49f6760ba3765583b09a40e8ef8c319eff2038e9749cc177f4cc0e0647c661a
SHA5121899fd05471154162637c90b3af042c2eda270408aa0e1e33fb98494d7afc430b6d5c34149ed822541d32174b09e720d0da569af2f4eb2fc416720e23554dcde
-
Filesize
73KB
MD581e5c8596a7e4e98117f5c5143293020
SHA145b7fe0989e2df1b4dfd227f8f3b73b6b7df9081
SHA2567d126ed85df9705ec4f38bd52a73b621cf64dd87a3e8f9429a569f3f82f74004
SHA51205b1e9eef13f7c140eb21f6dcb705ee3aaafabe94857aa86252afa4844de231815078a72e63d43725f6074aa5fefe765feb93a6b9cd510ee067291526bb95ec6
-
Filesize
40KB
MD548c00a7493b28139cbf197ccc8d1f9ed
SHA1a25243b06d4bb83f66b7cd738e79fccf9a02b33b
SHA256905cb1a15eccaa9b79926ee7cfe3629a6f1c6b24bdd6cea9ccb9ebc9eaa92ff7
SHA512c0b0a410ded92adc24c0f347a57d37e7465e50310011a9d636c5224d91fbc5d103920ab5ef86f29168e325b189d2f74659f153595df10eef3a9d348bb595d830
-
Filesize
160KB
MD5237e13b95ab37d0141cf0bc585b8db94
SHA1102c6164c21de1f3e0b7d487dd5dc4c5249e0994
SHA256d19b6b7c57bcee7239526339e683f62d9c2f9690947d0a446001377f0b56103a
SHA5129d0a68a806be25d2eeedba8be1acc2542d44ecd8ba4d9d123543d0f7c4732e1e490bad31cad830f788c81395f6b21d5a277c0bed251c9854440a662ac36ac4cb
-
Filesize
60KB
MD5a334bbf5f5a19b3bdb5b7f1703363981
SHA16cb50b15c0e7d9401364c0fafeef65774f5d1a2c
SHA256c33beaba130f8b740dddb9980fe9012f9322ac6e94f36a6aa6086851c51b98de
SHA5121fa170f643054c0957ed1257c4d7778976c59748670afa877d625aaa006325404bc17c41b47be2906dd3f1e229870d54eb7aba4a412de5adedbd5387e24abf46
-
Filesize
64KB
MD57c5aefb11e797129c9e90f279fbdf71b
SHA1cb9d9cbfbebb5aed6810a4e424a295c27520576e
SHA256394a17150b8774e507b8f368c2c248c10fce50fc43184b744e771f0e79ecafed
SHA512df59a30704d62fa2d598a5824aa04b4b4298f6192a01d93d437b46c4f907c90a1bad357199c51a62beb87cd724a30af55a619baef9ecf2cba032c5290938022a
-
Filesize
60KB
MD54fbbaac42cf2ecb83543f262973d07c0
SHA1ab1b302d7cce10443dfc14a2eba528a0431e1718
SHA2566550582e41fc53b8a7ccdf9ac603216937c6ff2a28e9538610adb7e67d782ab5
SHA5124146999b4bec85bcd2774ac242cb50797134e5180a3b3df627106cdfa28f61aeea75a7530094a9b408bc9699572cae8cf998108bde51b57a6690d44f0b34b69e
-
Filesize
36KB
MD5b4ac608ebf5a8fdefa2d635e83b7c0e8
SHA1d92a2861d5d1eb67ab434ff2bd0a11029b3bd9a9
SHA2568414dfe399813b7426c235ba1e625bd2b5635c8140da0d0cfc947f6565fe415f
SHA5122c42daade24c3ff01c551a223ee183301518357990a9cb2cc2dd7bf411b7059ff8e0bf1d1aee2d268eca58db25902a8048050bdb3cb48ae8be1e4c2631e3d9b4
-
Filesize
60KB
MD59fafb9d0591f2be4c2a846f63d82d301
SHA11df97aa4f3722b6695eac457e207a76a6b7457be
SHA256e78e74c24d468284639faf9dcfdba855f3e4f00b2f26db6b2c491fa51da8916d
SHA512ac0d97833beec2010f79cb1fbdb370d3a812042957f4643657e15eed714b9117c18339c737d3fd95011f873cda46ae195a5a67ae40ff2a5bcbee54d1007f110a
-
Filesize
268KB
MD55c91bf20fe3594b81052d131db798575
SHA1eab3a7a678528b5b2c60d65b61e475f1b2f45baa
SHA256e8ce546196b6878a8c34da863a6c8a7e34af18fb9b509d4d36763734efa2d175
SHA512face50db7025e0eb2e67c4f8ec272413d13491f7438287664593636e3c7e3accaef76c3003a299a1c5873d388b618da9eaede5a675c91f4c1f570b640ac605d6
-
Filesize
28KB
MD50cbf0f4c9e54d12d34cd1a772ba799e1
SHA140e55eb54394d17d2d11ca0089b84e97c19634a7
SHA2566b0b57e5b27d901f4f106b236c58d0b2551b384531a8f3dad6c06ed4261424b1
SHA512bfdb6e8387ffbba3b07869cb3e1c8ca0b2d3336aa474bd19a35e4e3a3a90427e49b4b45c09d8873d9954d0f42b525ed18070b949c6047f4e4cdb096f9c5ae5d5
-
Filesize
8KB
MD5466d35e6a22924dd846a043bc7dd94b8
SHA135e5b7439e3d49cb9dc57e7ef895a3cd8d80fb10
SHA256e4ccf06706e68621bb69add3dd88fed82d30ad8778a55907d33f6d093ac16801
SHA51223b64ed68a8f1df4d942b5a08a6b6296ec5499a13bb48536e8426d9795771dbcef253be738bf6dc7158a5815f8dcc65feb92fadf89ea8054544bb54fc83aa247
-
Filesize
2KB
MD5e4a499b9e1fe33991dbcfb4e926c8821
SHA1951d4750b05ea6a63951a7667566467d01cb2d42
SHA25649e6b848f5a708d161f795157333d7e1c7103455a2f47f50895683ef6a1abe4d
SHA512a291bb986293197a16f75b2473297286525ac5674c08a92c87b5cc1f0f2e62254ea27d626b30898e7857281bdb502f188c365311c99bda5c2dd76da0c82c554a
-
Filesize
28KB
MD5f1656b80eaae5e5201dcbfbcd3523691
SHA16f93d71c210eb59416e31f12e4cc6a0da48de85b
SHA2563f8adc1e332dd5c252bbcf92bf6079b38a74d360d94979169206db34e6a24cd2
SHA512e9c216b9725bd419414155cfdd917f998aa41c463bc46a39e0c025aa030bc02a60c28ac00d03643c24472ffe20b8bbb5447c1a55ff07db3a41d6118b647a0003
-
Filesize
7KB
MD5b127d9187c6dbb1b948053c7c9a6811f
SHA1b3073c8cad22c87dd9b8f76b6ffd0c4d0a2010d9
SHA256bd1295d19d010d4866c9d6d87877913eee69e279d4d089e5756ba285f3424e00
SHA51288e447dd4db40e852d77016cfd24e09063490456c1426a779d33d8a06124569e26597bb1e46a3a2bbf78d9bffee46402c41f0ceb44970d92c69002880ddc0476
-
Filesize
52KB
MD5316999655fef30c52c3854751c663996
SHA1a7862202c3b075bdeb91c5e04fe5ff71907dae59
SHA256ea4ca740cd60d2c88280ff8115bf354876478ef27e9e676d8b66601b4e900ba0
SHA5125555673e9863127749fc240f09cf3fb46e2019b459ad198ba1dc356ba321c41e4295b6b2e2d67079421d7e6d2fb33542b81b0c7dae812fe8e1a87ded044edd44
-
Filesize
76KB
MD5e7cd26405293ee866fefdd715fc8b5e5
SHA16326412d0ea86add8355c76f09dfc5e7942f9c11
SHA256647f7534aaaedffa93534e4cb9b24bfcf91524828ff0364d88973be58139e255
SHA5121114c5f275ecebd5be330aa53ba24d2e7d38fc20bb3bdfa1b872288783ea87a7464d2ab032b542989dee6263499e4e93ca378f9a7d2260aebccbba7fe7f53999
-
Filesize
552KB
MD5497fd4a8f5c4fcdaaac1f761a92a366a
SHA181617006e93f8a171b2c47581c1d67fac463dc93
SHA25691cd76f9fa3b25008decb12c005c194bdf66c8d6526a954de7051bec9aae462a
SHA51273d11a309d8f1a6624520a0bf56d539cb07adee6d46f2049a86919f5ce3556dc031437f797e3296311fe780a8a11a1a37b4a404de337d009e9ed961f75664a25
-
Filesize
2KB
MD57210d5407a2d2f52e851604666403024
SHA1242fde2a7c6a3eff245f06813a2e1bdcaa9f16d9
SHA256337d2fb5252fc532b7bf67476b5979d158ca2ac589e49c6810e2e1afebe296af
SHA5121755a26fa018429aea00ebcc786bb41b0d6c4d26d56cd3b88d886b0c0773d863094797334e72d770635ed29b98d4c8c7f0ec717a23a22adef705a1ccf46b3f68
-
Filesize
4KB
MD54be7661c89897eaa9b28dae290c3922f
SHA14c9d25195093fea7c139167f0c5a40e13f3000f2
SHA256e5e9f7c8dbd47134815e155ed1c7b261805eda6fddea6fa4ea78e0e4fb4f7fb5
SHA5122035b0d35a5b72f5ea5d5d0d959e8c36fc7ac37def40fa8653c45a49434cbe5e1c73aaf144cbfbefc5f832e362b63d00fc3157ca8a1627c3c1494c13a308fc7f
-
Filesize
29KB
MD5c3e8aeabd1b692a9a6c5246f8dcaa7c9
SHA14567ea5044a3cef9cb803210a70866d83535ed31
SHA25638ae07eeb7909bda291d302848b8fe5f11849cf0d597f0e5b300bfed465aed4e
SHA512f74218681bd9d526b68876331b22080f30507898b6a6ebdf173490ca84b696f06f4c97f894cb6052e926b1eee4b28264db1ead28f3bc9f627b4569c1ddcd2d3e
-
Filesize
1.2MB
MD5ed98e67fa8cc190aad0757cd620e6b77
SHA10317b10cdb8ac080ba2919e2c04058f1b6f2f94d
SHA256e0beb19c3536561f603474e3d5e3c3dff341745d317bc4d1463e2abf182bb18d
SHA512ec9c3a71ca9324644d4a2d458e9ba86f90deb9137d0a35793e0932c2aa297877ed7f1ab75729fda96690914e047f1336f100b6809cbc7a33baa1391ed588d7f0
-
Filesize
11KB
MD580d09149ca264c93e7d810aac6411d1d
SHA196e8ddc1d257097991f9cc9aaf38c77add3d6118
SHA256382d745e10944b507a8d9c69ae2e4affd4acf045729a19ac143fa8d9613ccb42
SHA5128813303cd6559e2cc726921838293377e84f9b5902603dac69d93e217ff3153b82b241d51d15808641b5c4fb99613b83912e9deda9d787b4c8ccfbd6afa56bc9
-
Filesize
2KB
MD50a250bb34cfa851e3dd1804251c93f25
SHA1c10e47a593c37dbb7226f65ad490ff65d9c73a34
SHA25685189df1c141ef5d86c93b1142e65bf03db126d12d24e18b93dd4cc9f3e438ae
SHA5128e056f4aa718221afab91c4307ff87db611faa51149310d990db296f979842d57c0653cb23d53fea54a69c99c4e5087a2eb37daa794ba62e6f08a8da41255795
-
Filesize
40KB
MD51587bf2e99abeeae856f33bf98d3512e
SHA1aa0f2a25fa5fc9edb4124e9aa906a52eb787bea9
SHA256c9106198ecbd3a9cab8c2feff07f16d6bb1adfa19550148fc96076f0f28a37b0
SHA51243161c65f2838aa0e8a9be5f3f73d4a6c78ad8605a6503aae16147a73f63fe985b17c17aedc3a4d0010d5216e04800d749b2625182acc84b905c344f0409765a
-
Filesize
161B
MD5ea7df060b402326b4305241f21f39736
SHA17d58fb4c58e0edb2ddceef4d21581ff9d512fdc2
SHA256e4edc2cb6317ab19ee1a6327993e9332af35cfbebaff2ac7c3f71d43cfcbe793
SHA5123147615add5608d0dce7a8b6efbfb19263c51a2e495df72abb67c6db34f5995a27fde55b5af78bbd5a6468b4065942cad4a4d3cb28ab932aad9b0f835aafe4d0
-
Filesize
5KB
MD58b49e96b0bd0fe3822bd4f516ad543ab
SHA13d04d3a4377e2e1888cc2be333b129daa8d2894d
SHA256c25cbc60ff1ccca811239655636717c9ff4decb9190a557489389504b248d037
SHA51246826285f213137cedefe379ece413730a36dcde016e5ac114743cb011e587fde503df1d70ea0e6c4213993749ac4d246e4c3c980b02e01239b392d0f5892e26
-
Filesize
52KB
MD5819265cb9b45d837914f428373b06318
SHA10725f84eba20acdbd702b688ea61dee84e370b0c
SHA256dd2f2d8c0a7d767be40b0f83ac6339ec86068e4ba0f4cd0e3e5b99050dd84fcf
SHA512ae4dd3f773568072e86e694c72a08d06b9206cb704a22ced1a922bc04a61a504aee67fc32ffb4d39f9e75f74c533d409756d4d953eaf9ab89cc9fe11f702b30c
-
Filesize
3KB
MD56899249ce2f6ede73e6fcc40fb31338a
SHA1385e408274c8d250ccafed3fe7b329b2f3a0df13
SHA256d02a2c0c9917a5ff728400357aa231473cd20da01b538a0e19bc0c0b885ea212
SHA5120db15d8050a3d39a14ebe6b58ebd68f0241d3ee688988e1e2217e2c43a834dff0959ba050d7e458ab6dfb466c91a3109ead350fe58fb3daa0753f6ca1ed9d60d
-
Filesize
214B
MD514f51baaf9e518780594e20887e6fe36
SHA119f934f6a8cb11c53ae06f71457bfa643bb06576
SHA25699cc25682aa82e36757361afdd6e0436ff56cdc03993e6d60f20d052f8b9dbe5
SHA512d48e9a9e12a69fef2b6c324a9c2f1fb46d8eb931a4cde955f2c196c3ee78ac80dcfdb98cc17530854c3775db41de66b09b9ba498c550ac500ec40cdefe4caf81
-
Filesize
287B
MD53f764ed6ee61afced5405a2e3f62738b
SHA1ce56c02f451bdbf20a1003df87fc2692ca06d0ed
SHA25622804ed36ad186b3ab18605719c83e70b6244f60aba00e16ca8f97d80b5cc0e4
SHA5126ed1d6327b67b3c863f71ede1d8be2f24c51454aab25b104d474024bfafcd732ba84a63ea60b218ce0e97a740c2717f87f4a38fcf211e780d027d36f4bc1d859
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
57KB
MD5589d77eadb85bdf4c192665d565882a9
SHA14805582329ac6b80a045b82c04e1c9328565a13a
SHA2564aadc5a6fa4dfbaf3b4c635760fd55476de39ef37d27eacf5c8c6daf99230273
SHA51265d881ad2561acde5de4ceea1b1b634ddc44735b3139ab006c957f2543d33c59df6b371e1b5234f504f435595b7ac48330d9afe1fbc85fbed4acb485d1a61bb8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\522VE5162IWEXH3TC2FH.temp
Filesize7KB
MD574a1cb89829e2b8f531712f5c5fad240
SHA14197bb0783b8881d572fdd434c3282c855e0257a
SHA2562828bc482eec9f9c5e00f46c3ed28c57986e34b03a9f26f399f24f92cd6859fe
SHA51237b3741e3d14e766ae407ba7985b3fcc7d271b13b3d5dcdd29ea7b1162d8ad8a01a601c7e57456245f50c712cb9571aaafa0c4985accef8d5933e81b71239433
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\AlternateServices.bin
Filesize8KB
MD5677a2bd2c7b3d5eb8e99d662227811e8
SHA18c1fa316f14bf48b1f3622ee35d6caa08c75ad6a
SHA2563b7fb2e6fa6a8c9abc964f6069b0c2f97d1554ecade5fa73bd561b428b1421c7
SHA512229b0f7677a3ea2cb7462429c80ea9d3100e263f33919af87df2bd9a5ec62b03af5ed601687699fae60f9668b8e487fd61fac3794fe9507f921b48aec0471ad8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5638c070faf9c22cae8d06bbef491f62a
SHA15f8e0491c3e88f504c5d81b52fdb77f6164307d6
SHA2567764bb0cac8b07b470f924388bd0fcb2e8957e866e6615badac63d051849169d
SHA5120918a6ec6aef32f79510e34827539a564223da5425b3c2f5d2a0b63c0a0901e28c6f8d780702593179929cff68a9f6f670307f023f2674bc8cf5332a6c8ac713
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD57497882be8333275ab17e6803ce04788
SHA17c42613140e4ae5909c4d7f6660189f4788aa2d8
SHA2569c14bb91b2aac7bdaac2a7454a7a757758d455ea23c5e61d3ac54e972dde4575
SHA512ea2dfd628b6334ce1d437aa69c04a32b645410bd9330f697232e1ccd2f74f911cf511f24dc1613ccdab5954ae4f865cb196c6ed7c4618301c54d074a963aa834
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD573bc7da45fb1a269cdb0178c2e2da028
SHA1a9b666588af398b9c55da509bab1d22fb361f8b7
SHA256e6be5afc1e62e5474012d383c59af1e4dba7ad72d2f198529994d7d989531d6c
SHA51214e9ecf7c45646a662e32f4ae67cf7e237b5b197e7e431e804090aa67f7a0b65c9e66e89038e658fce47b96d85e1abc2d91ccd36c7fa8ff8f16c62ec3c989482
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD52f93ebb5b2a045e83ee3d170e7bc6e5a
SHA1e09fe71c4ae65a58aa8c8e8c97c5c1a7042a1855
SHA256a1445dea60e46a1b6e4f86ebacc29208a61ee6f5091f8cbe8d95048e17065bcc
SHA51265b08fbb6f6fba2c046016737f2b950cda90a52fd68ccfff5d192f6ef314c720593e774764d07581a710ce56199a7c1005345bdd7318ed565e896acbb12fc28f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5b92784a1d77e18fc07829a476f4abb20
SHA19c255fb6493557165c7ad663cda1090f3df5d225
SHA25604859fff370609a04802c6e13c6be91737364b195753aa2b4acc53881ac526c5
SHA5127a5d363bb4060d8b1719a86b0bbc72d64732699377fba3dd5f0c0671f4acdeda04231f0fa148883e9a1c512932ae1051d63a49f069a3a96ba72832b8408ba0a1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD569828a2d92f021417b87cbd0f661bd62
SHA1cf7b86eb1adfbb0bd298cf393a1f8fc9902af0ca
SHA256cfe7cf4c4c963bb994e3e9a3725ae6d4b4b8c04355bf16657a8be417964871a2
SHA512310acc436310823a815e3111901f61e98c5603853ef401cb1625f57d6f90732fa7674b64d1c3fb2b927940bc5fa2e6dec73fd4139740440169b698d51de9d4a3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\datareporting\glean\pending_pings\1bb8f84e-4bbc-4a0b-95d4-365ad887bddd
Filesize982B
MD5085306bff476e98dde185c38a477527d
SHA1c3ac67b41d5dcc7d891e6c66c27e86f38d8b1113
SHA256c2a3047a28de7d0d706b28d5020de33a6339c0df4cce658ee7aa7f87c1e3b6ff
SHA512dd27634ccd6964736f4820f93b862e50ebec4fd52fcc63dd9eb5e4ff28bd11b8d2b3d89696acef3d6fec155b85517f1df96a49a55c8f9eff2ad6babb3e48f91b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\datareporting\glean\pending_pings\b56d2e73-6919-4ad6-826b-6b3d4d592420
Filesize671B
MD5b71edabd0c6b79ac715c4c70af02f27b
SHA1d474329e1bc70bbefba89af3ebb0a2ca46b7dcdb
SHA256ac6fc81f27158d95a0fca31077ae0d2f3bff308a36180c4505df87ddfc98cdf0
SHA5122e5f959be5bb5d787a4d1cd9e1d7590ce2c8a319bd4116ee2619e03d2c148cff4ca495f748c685e22484a45206684f43697881d7337b955afdb491fc62fae057
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\datareporting\glean\pending_pings\c8e2ca57-5680-40e7-a86a-68b84b4f1c62
Filesize25KB
MD5ed17891c4ec906a4c964b8b56fdc1b56
SHA12258261d866cd0b6d8a53e1620987b1abb2f8112
SHA256517e6497487b7a211120df8a8fe3ad71a7c732e612870d0c9962eb8bfddd7c6f
SHA51248d0599186c81c04dd18a3315e118584ff2553f94b6923516299136e5f830369c97357951d6de5fa62e357c183c6c155c654220c86f2588c8c4cf0931690d8c6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5648b94001f60557c2877282722cca431
SHA1a22de9c1e3ab76b16d839a93ac8fb7ab2684dd9c
SHA25698b59d3f557063005982629dbdcb5861cbabb39fdadf8e0f4cab02bfa4d7b2b5
SHA51290ffc619c73f0468dc11932285a49b54344fa0d28c210f3d1ebc34df6ac131d79cf504c8fc334e35be9a66e8d90a6501ef18d26fc164890586154f0b0bfd0274
-
Filesize
10KB
MD5b329197dfcbf114b0e3ea7e07aa3a102
SHA1fbf4323ed86edc420fad4b72b8b6d5be8ac002df
SHA25637b6381d3494a08cf29e199585e5b121cd6686f7720592d762de62da170e47a8
SHA51216420e3447d513aa974479cd88263adda70750a3d7214d4269724981dc800bee7d67fc8e6ebcfadf2740badf11fd348e654a00a627ce9d08bdd8cec62d8e5259
-
Filesize
10KB
MD5cc3892544946f9f0ba157d9d78eee1fd
SHA1b367339339f0a2c05c5270b1b9c0ffa110d27188
SHA256f65358015c4818a2fd4ecde238bad7bdb508166f57d329078aab76579d9c0275
SHA5123748ac235591cb855b0271b3faf6efdde37c7ce74b3f0e59f1d2109b8d8193a8bc18af7ca1099418ee60dd6ca2d2457061f3b00fb1248f6ced695e15e2ce8f75
-
Filesize
10KB
MD5f1abae1969c6d2a5c443cf27513536f6
SHA1c1ff74462625b1cd981bcb89c3bf724de180069e
SHA2564941f1e52fd66930fadb8a21acbd7c1415571656adfce3adb7399f400bd07af0
SHA512d9d1bd37f73f7c5d9bf27d442f61993c4c5b695e3329dc3519254f9931bcca681240922d44f3954fd6603c1aa5a2c57896a297a232ea3a0fbbe527791b110b84
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD549c414480f9eb2f3084f098d68669bb2
SHA167375c2ab62281b38d52c44ef476d9284803172d
SHA25678cb02b6115d63c6f08973967afbc69e44a2929f4bbcc3193ba6dadc988a09b4
SHA5124a604d6f4a9c1432f59a42efabb5585b3309dcc783a333b7b48bf041d89b65503c2254af942c1d988f2fc1640eb28eec6ddd88de7a5d5f5fbaf494fcc71ef847
-
Filesize
38.0MB
MD51f071d1ad6adbca1695a514d9f953604
SHA10dd305399f173be003927957838f0b7957b80912
SHA2565fd84f4f2108568f61eb71479dc359425690f0a589ccf496000aed8f914e5b07
SHA512cc0f83bf25a7655f3eb4108f7beb222ea02532d4e9487c3c053c14f35a140f903139c183f9a74e04fac43c3040c64535e598686d2f08ff3b49b791b74e461557
-
Filesize
52KB
MD5c7c4f36c35198df7d2f23c217f4b89bf
SHA19fe2c415e97a8d836cb8b7822d94e8da58014035
SHA256022c37312348e74e6b20a1f37ba35aa11b5621567529dc18276a855625aa23ab
SHA512aaa72e56b57ce4a7629229ca88bdb095a18aeeeb947fb80a80a6646e01f99444399acdb49580c9c8d8d6a8757595865ae5e9b995597eebe7e70f6a625a8782de
-
Filesize
378KB
MD5c718a1cbf0e13674714c66694be02421
SHA1001d5370d3a7ee48db6caaecb1c213b5dfdf8e65
SHA256cde188d6c4d6e64d6abfdea1e113314f9cdf9417bca36eb7201e6b766e5f5a7f
SHA512ba0ddff47b618740dfcb63024435c36d895889dd3cf6b4559969283ba8100e8063f5c7767e56dfab67a2b5c96e4ae22e141e5b09e81be5cec9aa7ca7827b4b8a
-
Filesize
323KB
MD56515aac6d12e20b052187f256af73b96
SHA1e91df2fad020ff5f11c28256650d7e231de67b8b
SHA2564a36aecfb0ade38d252327f534058e3dd2e2209629631b9ad2b1c9cac86aed35
SHA512ad49c7f734c36eea304846328485b2866d403672511f9df8d4c60038aabbecce952ff5afaf4774eda8dfd7647f0ca1839d136e74dfc16ae43bacd537b453b4b9
-
Filesize
22KB
MD58703ff2e53c6fd3bc91294ef9204baca
SHA13dbb8f7f5dfe6b235486ab867a2844b1c2143733
SHA2563028a2b0e95143a4caa9bcd6ae794958e7469a20c6e673da067958cbf4310035
SHA512d5eb8a07457a78f9acd0f81d2f58bbf64b52183318b87c353a590cd2a3ac3a6ec9c1452bd52306c7cf99f19b6a897b16ceb8289a7d008c5ce3b07eda9b871204
-
Filesize
153KB
MD5f33a4e991a11baf336a2324f700d874d
SHA19da1891a164f2fc0a88d0de1ba397585b455b0f4
SHA256a87524035509ff7aa277788e1a9485618665b7da35044d70c41ec0f118f3dfd7
SHA512edf066968f31451e21c7c21d3f54b03fd5827a8526940c1e449aad7f99624577cbc6432deba49bb86e96ac275f5900dcef8d7623855eb3c808e084601ee1df20
-
Filesize
1.0MB
MD5714cf24fc19a20ae0dc701b48ded2cf6
SHA1d904d2fa7639c38ffb6e69f1ef779ca1001b8c18
SHA25609f126e65d90026c3f659ff41b1287671b8cc1aa16240fc75dae91079a6b9712
SHA512d375fd9b509e58c43355263753634368fa711f02a2235f31f7fa420d1ff77504d9a29bb70ae31c87671d50bd75d6b459379a1550907fbe5c37c60da835c60bc1
-
Filesize
595KB
MD5821511549e2aaf29889c7b812674d59b
SHA13b2fd80f634a3d62277e0508bedca9aae0c5a0d6
SHA256f59cdf89f0f522ce3662e09fa847bca9b277b006c415dcc0029b416c347db9c4
SHA5128b2e805b916e5fbfcccb0f4189372aea006789b3847b51018075187135e9b5db9098f704c1932623f356db0ee327e1539a9bf3729947e92844a26db46555e8cd