Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 14:38
Behavioral task
behavioral1
Sample
1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe
Resource
win10v2004-20250313-en
General
-
Target
1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe
-
Size
1.7MB
-
MD5
aaf6a5281734233732b8d9bc038ee684
-
SHA1
1585ef28a6ef1495e3ddecf8e382c046307e4335
-
SHA256
1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed
-
SHA512
f134b2553222e3254d6203bd316d02956a533e8b970d983822b586dd53d4e8b8bda4253d88f3200a9bad806841d9428179bc0146f62a9c134abc43827b153d1a
-
SSDEEP
49152:Wv9SvM4c6bEgejrfFG0A5g8homh6+y6W3qMqs4y4qT8p6C+Kx5:WEvM4c6bEgejrfFG0A5gWoHX6W6nhZqY
Malware Config
Signatures
-
Downloads MZ/PE file 8 IoCs
flow pid Process 95 5656 KB649B72C948965F2.exe 107 1864 KBB6D849BF664070C0.exe 144 3076 MailRuUpdater.exe 148 3792 MailRuUpdater.exe 148 3792 MailRuUpdater.exe 296 5656 KB649B72C948965F2.exe 84 5844 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe 85 5844 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe -
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation KBB6D849BF664070C0.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation amigo.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation amigo.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation amigo.exe -
Executes dropped EXE 31 IoCs
pid Process 3004 KB649B72C948965F2.exe 5656 KB649B72C948965F2.exe 1864 KBB6D849BF664070C0.exe 3432 mailruhomesearch.exe 4904 na_runner.exe 3892 mailruhomesearch.exe 3076 MailRuUpdater.exe 3792 MailRuUpdater.exe 772 MailRuUpdater.exe 2812 MailRuUpdater.exe 424 abe5-faa4-71ab-e78b 3472 mrupdsrv.exe 744 MailRuUpdater.exe 4376 MailRuUpdater.exe 4764 KB649B72C948965F2.exe 5676 setup.exe 6128 setup.exe 768 MailRuUpdater.exe 1668 MailRuUpdater.exe 2020 MailRuUpdater.exe 4340 amigo.exe 5908 amigo.exe 1544 amigo.exe 5792 amigo.exe 3256 amigo.exe 5176 amigo.exe 5940 amigo.exe 5880 updater.exe 6296 MailRuUpdater.exe 6392 MailRuUpdater.exe 6468 MailRuUpdater.exe -
Loads dropped DLL 12 IoCs
pid Process 4416 regsvr32.exe 4340 amigo.exe 5908 amigo.exe 1544 amigo.exe 4340 amigo.exe 5792 amigo.exe 3256 amigo.exe 5792 amigo.exe 5176 amigo.exe 5940 amigo.exe 5176 amigo.exe 5940 amigo.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/5844-0-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral2/memory/5844-4-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral2/memory/5844-8-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral2/memory/5844-11-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral2/memory/5844-7-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral2/memory/5844-9-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral2/memory/5844-12-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral2/memory/5844-3-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral2/memory/5844-14-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral2/memory/5844-15-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral2/memory/5844-17-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral2/memory/5844-18-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral2/memory/5844-19-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral2/memory/5844-20-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral2/memory/5844-22-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral2/memory/5844-23-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral2/memory/5844-24-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral2/memory/5844-25-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral2/memory/5844-26-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral2/memory/5844-255-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral2/memory/5844-611-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MailRuUpdater = "C:\\Users\\Admin\\AppData\\Local\\Mail.Ru\\MailRuUpdater.exe" na_runner.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MailRuUpdater = "C:\\Users\\Admin\\AppData\\Local\\Mail.Ru\\MailRuUpdater.exe" MailRuUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\amigo = "C:\\Users\\Admin\\AppData\\Local\\Amigo\\Application\\amigo.exe --no-startup-window" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MailRuUpdater = "C:\\Users\\Admin\\AppData\\Local\\Mail.Ru\\MailRuUpdater.exe" updater.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mailruhomesearch = "\"C:\\Users\\Admin\\AppData\\Local\\Mail.Ru\\Sputnik\\ptls\\mailruhomesearch.exe\" --pr_deferred" KBB6D849BF664070C0.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled 1 TTPs 15 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MailRuUpdater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MailRuUpdater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mailruhomesearch.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MailRuUpdater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mailruhomesearch.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MailRuUpdater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MailRuUpdater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA KBB6D849BF664070C0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MailRuUpdater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mrupdsrv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MailRuUpdater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA na_runner.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MailRuUpdater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MailRuUpdater.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\Q: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\V: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\X: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\H: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\O: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\P: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\R: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\U: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\W: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\Y: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\Z: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\K: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\M: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\N: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\E: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\G: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\J: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\L: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\S: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\T: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8E8F97CD-60B5-456F-A201-73065652D099} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8E8F97CD-60B5-456F-A201-73065652D099}\ = "MRSearchPlugin" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8E8F97CD-60B5-456F-A201-73065652D099}\NoExplorer = "1" regsvr32.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI mailruhomesearch.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol mailruhomesearch.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Mail.Ru\MailRuUpdater\us\336327ca85 MailRuUpdater.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Mail.Ru\MailRuUpdater\us\336327ca85 MailRuUpdater.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini mailruhomesearch.exe File created C:\Windows\System32\GroupPolicy\User\Registry.pol mailruhomesearch.exe File opened for modification C:\Windows\System32\GroupPolicy KBB6D849BF664070C0.exe File opened for modification C:\Windows\System32\GroupPolicy\User\Registry.pol KBB6D849BF664070C0.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini KBB6D849BF664070C0.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI KBB6D849BF664070C0.exe File opened for modification C:\Windows\System32\GroupPolicy\Machine\Registry.pol KBB6D849BF664070C0.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Mail.Ru\MailRuUpdater\us\336327ca85 MailRuUpdater.exe File opened for modification C:\Windows\System32\GroupPolicy mailruhomesearch.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Mail.Ru\Update Service\us\d9bf774acb mrupdsrv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Mail.Ru\MailRuUpdater\us\336327ca85 MailRuUpdater.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\uk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\az\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\en_US\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\si\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\ur\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\sl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\sv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\id\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\offscreendocument_main.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\ka\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\el\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\fa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\no\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\nl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\vi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\en_GB\messages.json msedge.exe File created C:\Program Files (x86)\Mail.Ru\Update Service\mrupdsrv.exe abe5-faa4-71ab-e78b File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\page_embed_script.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\ko\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\be\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\pt_PT\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\fi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\mr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\km\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\sk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\offscreendocument.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\te\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\fr_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\tr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\en\messages.json msedge.exe File opened for modification C:\Program Files (x86)\Mail.Ru\MailRuUpdater\MailRuUpdater.exe MailRuUpdater.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\bn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\et\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\pt_BR\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\gl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\mn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\ar\messages.json msedge.exe File opened for modification C:\Program Files (x86)\Mail.Ru\MailRuUpdater\MailRuUpdater.exe updater.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\lt\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\af\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\eu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\is\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\bg\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\fr\messages.json msedge.exe File opened for modification C:\Program Files (x86)\Mail.Ru\Update Service\mrupdsrv.exe abe5-faa4-71ab-e78b File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\zh_HK\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1388_918386692\128.png msedge.exe File created C:\Program Files (x86)\Mail.Ru\MailRuUpdater\MailRuUpdater.exe na_runner.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mailruhomesearch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MailRuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KBB6D849BF664070C0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MailRuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mrupdsrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MailRuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language na_runner.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KB649B72C948965F2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MailRuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amigo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MailRuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MailRuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amigo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amigo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amigo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MailRuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MailRuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KB649B72C948965F2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MailRuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MailRuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KB649B72C948965F2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mailruhomesearch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MailRuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amigo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language updater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abe5-faa4-71ab-e78b Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MailRuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amigo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amigo.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{68AE298D-7E8A-4F53-BE55-15D2B065F6C0}\Policy = "3" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{FFEBBF0A-C22C-4172-89FF-45215A135AC7}\FaviconURLFallback = "https://go.mail.ru/favicon.ico" KBB6D849BF664070C0.exe Key deleted \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Internet Explorer\User Preferences KBB6D849BF664070C0.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Microsoft\Internet Explorer\Main KBB6D849BF664070C0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{68AE298D-7E8A-4F53-BE55-15D2B065F6C0}\AppPath = "C:\\Users\\Admin\\AppData\\Local\\Mail.Ru" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Microsoft\Internet Explorer\Approved Extensions KBB6D849BF664070C0.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{FFEBBF0A-C22C-4172-89FF-45215A135AC7}" KBB6D849BF664070C0.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{68AE298D-7E8A-4F53-BE55-15D2B065F6C0} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{68AE298D-7E8A-4F53-BE55-15D2B065F6C0}\AppName = "mrkeeper.exe" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Microsoft\Internet Explorer\Approved Extensions regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Microsoft\Internet Explorer\SearchScopes\{FFEBBF0A-C22C-4172-89FF-45215A135AC7} KBB6D849BF664070C0.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{FFEBBF0A-C22C-4172-89FF-45215A135AC7}\URL = "https://go.mail.ru/distib/ep/?q={searchTerms}&fr=ntg&product_id=%7BE1AAD06B-A215-4838-8F63-2B5B5A0B2FB5%7D&gp=802861" KBB6D849BF664070C0.exe Set value (data) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Internet Explorer\Approved Extensions\{8E8F97CD-60B5-456F-A201-73065652D099} = 51667a6c4c1d3b1bdd88949382330308ba03384654109082 regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Internet Explorer\Approved Extensions\{8E8F97CD-60B5-456F-A201-73065652D099} = 51667a6c4c1d3b1bdd889f908b36040cbd09364655169483 KBB6D849BF664070C0.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{FFEBBF0A-C22C-4172-89FF-45215A135AC7}\DisplayName = "Поиск@Mail.Ru" KBB6D849BF664070C0.exe Set value (int) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{FFEBBF0A-C22C-4172-89FF-45215A135AC7}\ShowSearchSuggestions = "1" KBB6D849BF664070C0.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{FFEBBF0A-C22C-4172-89FF-45215A135AC7}\SuggestionsURL = "https://suggests.go.mail.ru/ie8?q={searchTerms}" KBB6D849BF664070C0.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Microsoft\Internet Explorer\SearchScopes KBB6D849BF664070C0.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Microsoft\Internet Explorer\Main MailRuUpdater.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "https://mail.ru/cnt/10445?gp=802851" KBB6D849BF664070C0.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876464437138828" msedge.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\.svg\OpenWithProgids\AmigoHTML.JMCGW4WCRMGT5DJ3V5JAJU3USU setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\.xhtml\OpenWithProgids\AmigoHTML.JMCGW4WCRMGT5DJ3V5JAJU3USU setup.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\.webp\OpenWithProgids setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8E8F97CD-60B5-456F-A201-73065652D099}\Name regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IESearchPlugin.MailRuBHO.1\CLSID\ = "{8E8F97CD-60B5-456F-A201-73065652D099}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8E8F97CD-60B5-456F-A201-73065652D099}\ = "[email protected]" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IESearchPlugin.MailRuBHO.1 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Moniker = "cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe" msedge.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\.htm\OpenWithProgids setup.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\.html setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\.xht\OpenWithProgids\AmigoHTML.JMCGW4WCRMGT5DJ3V5JAJU3USU setup.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\.webp setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (int) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949 msedge.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\.shtml\OpenWithProgids setup.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\.xhtml setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8E8F97CD-60B5-456F-A201-73065652D099}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Mail.Ru\\Sputnik\\ie_addon_dll.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IESearchPlugin.MailRuBHO\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IESearchPlugin.MailRuBHO\CurVer\ = "IESearchPlugin.MailRuBHO.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\AmigoHTML.JMCGW4WCRMGT5DJ3V5JAJU3USU setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\AmigoHTML.JMCGW4WCRMGT5DJ3V5JAJU3USU\AppUserModelId = "Amigo.JMCGW4WCRMGT5DJ3V5JAJU3USU" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\.htm\OpenWithProgids\AmigoHTML.JMCGW4WCRMGT5DJ3V5JAJU3USU setup.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (data) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (data) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (int) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\AmigoHTML.JMCGW4WCRMGT5DJ3V5JAJU3USU\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Amigo\\Application\\amigo.exe,0" setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IESearchPlugin.MailRuBHO.1\ = "[email protected]" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\AmigoHTML.JMCGW4WCRMGT5DJ3V5JAJU3USU\Application setup.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\.htm setup.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\.pdf setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8E8F97CD-60B5-456F-A201-73065652D099}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8E8F97CD-60B5-456F-A201-73065652D099}\Version\ = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8E8F97CD-60B5-456F-A201-73065652D099}\Name\ = "[email protected]" regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (int) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\DisplayName = "Chrome Sandbox" msedge.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IESearchPlugin.MailRuBHO\CLSID\ = "{8E8F97CD-60B5-456F-A201-73065652D099}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IESearchPlugin.MailRuBHO.1\CLSID regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe\Children msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1279544337-3716153908-718418795-1000\{B2A1E0E8-1879-4222-8126-30F23F8CA4D7} msedge.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\AmigoHTML.JMCGW4WCRMGT5DJ3V5JAJU3USU\shell setup.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\.html\OpenWithProgids setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\.webp\OpenWithProgids\AmigoHTML.JMCGW4WCRMGT5DJ3V5JAJU3USU setup.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (data) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 820074001c004346534616003100000000006d5a6f76120041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f400009000400efbe6d5a6f767c5acc742e00000069e1010000000100000000000000000000000000000012564c004100700070004400610074006100000042000000 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (data) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (data) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 50003100000000006d5a857c10004c6f63616c003c0009000400efbe6d5a6f767c5acc742e0000007ce10100000001000000000000000000000000000000b9dcec004c006f00630061006c00000014000000 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (data) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4e003100000000007c5acb74100054656d7000003a0009000400efbe6d5a6f767c5acb742e0000007de10100000001000000000000000000000000000000d9bd9000540065006d007000000014000000 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (int) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8E8F97CD-60B5-456F-A201-73065652D099}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 3432 mailruhomesearch.exe 3432 mailruhomesearch.exe 3432 mailruhomesearch.exe 3432 mailruhomesearch.exe 3432 mailruhomesearch.exe 3432 mailruhomesearch.exe 3432 mailruhomesearch.exe 3432 mailruhomesearch.exe 3432 mailruhomesearch.exe 3432 mailruhomesearch.exe 3432 mailruhomesearch.exe 3432 mailruhomesearch.exe 3432 mailruhomesearch.exe 3432 mailruhomesearch.exe 1864 KBB6D849BF664070C0.exe 3432 mailruhomesearch.exe 1864 KBB6D849BF664070C0.exe 3432 mailruhomesearch.exe 1864 KBB6D849BF664070C0.exe 1864 KBB6D849BF664070C0.exe 3432 mailruhomesearch.exe 3432 mailruhomesearch.exe 3432 mailruhomesearch.exe 3432 mailruhomesearch.exe 3432 mailruhomesearch.exe 3432 mailruhomesearch.exe 3432 mailruhomesearch.exe 3432 mailruhomesearch.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4764 KB649B72C948965F2.exe Token: SeIncBasePriorityPrivilege 4764 KB649B72C948965F2.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1388 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5844 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5844 wrote to memory of 3004 5844 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe 106 PID 5844 wrote to memory of 3004 5844 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe 106 PID 5844 wrote to memory of 3004 5844 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe 106 PID 3004 wrote to memory of 5656 3004 KB649B72C948965F2.exe 107 PID 3004 wrote to memory of 5656 3004 KB649B72C948965F2.exe 107 PID 3004 wrote to memory of 5656 3004 KB649B72C948965F2.exe 107 PID 5844 wrote to memory of 1864 5844 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe 108 PID 5844 wrote to memory of 1864 5844 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe 108 PID 5844 wrote to memory of 1864 5844 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe 108 PID 5236 wrote to memory of 3432 5236 cmd.exe 111 PID 5236 wrote to memory of 3432 5236 cmd.exe 111 PID 5236 wrote to memory of 3432 5236 cmd.exe 111 PID 1864 wrote to memory of 4904 1864 KBB6D849BF664070C0.exe 113 PID 1864 wrote to memory of 4904 1864 KBB6D849BF664070C0.exe 113 PID 1864 wrote to memory of 4904 1864 KBB6D849BF664070C0.exe 113 PID 3348 wrote to memory of 3892 3348 cmd.exe 119 PID 3348 wrote to memory of 3892 3348 cmd.exe 119 PID 3348 wrote to memory of 3892 3348 cmd.exe 119 PID 4904 wrote to memory of 3076 4904 na_runner.exe 118 PID 4904 wrote to memory of 3076 4904 na_runner.exe 118 PID 4904 wrote to memory of 3076 4904 na_runner.exe 118 PID 1192 wrote to memory of 772 1192 cmd.exe 121 PID 1192 wrote to memory of 772 1192 cmd.exe 121 PID 1192 wrote to memory of 772 1192 cmd.exe 121 PID 5844 wrote to memory of 1388 5844 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe 123 PID 5844 wrote to memory of 1388 5844 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe 123 PID 3076 wrote to memory of 2812 3076 MailRuUpdater.exe 124 PID 3076 wrote to memory of 2812 3076 MailRuUpdater.exe 124 PID 3076 wrote to memory of 2812 3076 MailRuUpdater.exe 124 PID 3792 wrote to memory of 424 3792 MailRuUpdater.exe 126 PID 3792 wrote to memory of 424 3792 MailRuUpdater.exe 126 PID 3792 wrote to memory of 424 3792 MailRuUpdater.exe 126 PID 1388 wrote to memory of 1600 1388 msedge.exe 125 PID 1388 wrote to memory of 1600 1388 msedge.exe 125 PID 1388 wrote to memory of 4260 1388 msedge.exe 128 PID 1388 wrote to memory of 4260 1388 msedge.exe 128 PID 1864 wrote to memory of 4416 1864 KBB6D849BF664070C0.exe 129 PID 1864 wrote to memory of 4416 1864 KBB6D849BF664070C0.exe 129 PID 1864 wrote to memory of 4416 1864 KBB6D849BF664070C0.exe 129 PID 1388 wrote to memory of 3360 1388 msedge.exe 130 PID 1388 wrote to memory of 3360 1388 msedge.exe 130 PID 1388 wrote to memory of 3360 1388 msedge.exe 130 PID 1388 wrote to memory of 3360 1388 msedge.exe 130 PID 1388 wrote to memory of 3360 1388 msedge.exe 130 PID 1388 wrote to memory of 3360 1388 msedge.exe 130 PID 1388 wrote to memory of 3360 1388 msedge.exe 130 PID 1388 wrote to memory of 3360 1388 msedge.exe 130 PID 1388 wrote to memory of 3360 1388 msedge.exe 130 PID 1388 wrote to memory of 3360 1388 msedge.exe 130 PID 1388 wrote to memory of 3360 1388 msedge.exe 130 PID 1388 wrote to memory of 3360 1388 msedge.exe 130 PID 1388 wrote to memory of 3360 1388 msedge.exe 130 PID 1388 wrote to memory of 3360 1388 msedge.exe 130 PID 1388 wrote to memory of 3360 1388 msedge.exe 130 PID 1388 wrote to memory of 3360 1388 msedge.exe 130 PID 1388 wrote to memory of 3360 1388 msedge.exe 130 PID 1388 wrote to memory of 3360 1388 msedge.exe 130 PID 1388 wrote to memory of 3360 1388 msedge.exe 130 PID 1388 wrote to memory of 3360 1388 msedge.exe 130 PID 1388 wrote to memory of 3360 1388 msedge.exe 130 PID 1388 wrote to memory of 3360 1388 msedge.exe 130 PID 1388 wrote to memory of 3360 1388 msedge.exe 130 PID 1388 wrote to memory of 3360 1388 msedge.exe 130 PID 1388 wrote to memory of 3360 1388 msedge.exe 130 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System mrupdsrv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe"C:\Users\Admin\AppData\Local\Temp\1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe"1⤵
- Downloads MZ/PE file
- Checks computer location settings
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5844 -
C:\Users\Admin\AppData\Local\Temp\KB649B72C948965F2.exe"C:\Users\Admin\AppData\Local\Temp\KB649B72C948965F2.exe" --silent --make_default=1 --rfr=800479 --ua_rfr=CHANNEL_800479 "--partner_new_url=http://horses.jacketrescue.ru/v_install?sid=16045&guid=$__GUID&sig=$__SIG&ovr=$__OVR&amigo=1&label=800479&aux=66668674" "--partner_firstonline_url=http://horses.jacketrescue.ru/v_touch?guid=$__GUID&sig=$__SIG"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\loader_ldir_3004_30688\KB649B72C948965F2.exeC:\Users\Admin\AppData\Local\Temp\loader_ldir_3004_30688\KB649B72C948965F2.exe --silent --rfr=800479 --ua_rfr=CHANNEL_800479 --partner_new_url=http://horses.jacketrescue.ru/v_install?sid=16045&guid=$__GUID&sig=$__SIG&ovr=$__OVR&amigo=1&label=800479&aux=66668674 --cp3⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5656 -
C:\Users\Admin\AppData\Local\Temp\mini_loader_scoped_dir_1743172825\KB649B72C948965F2.exe"C:\Users\Admin\AppData\Local\Temp\mini_loader_scoped_dir_1743172825\KB649B72C948965F2.exe" --silent --rfr=800479 --ua_rfr=CHANNEL_800479 --partner_new_url=http://horses.jacketrescue.ru/v_install?sid=16045&guid=$__GUID&sig=$__SIG&ovr=$__OVR&amigo=1&label=800479&aux=66668674 --ext_params=masterid={9CE8767A-0E1A-464F-AF66-919A5CF35FEF}&tcvsts=-2 --ils=124⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\CR_D9F61.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\CR_D9F61.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\CR_D9F61.tmp\CHROME.PACKED.7Z" --silent --rfr=800479 --ua_rfr=CHANNEL_800479 --partner_new_url=http://horses.jacketrescue.ru/v_install?sid=16045&guid=$__GUID&sig=$__SIG&ovr=$__OVR&amigo=1&label=800479&aux=66668674 --ext_params=masterid={9CE8767A-0E1A-464F-AF66-919A5CF35FEF}&tcvsts=-2 --ils=125⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5676 -
C:\Users\Admin\AppData\Local\Temp\CR_D9F61.tmp\setup.exeC:\Users\Admin\AppData\Local\Temp\CR_D9F61.tmp\setup.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Amigo\User Data\Crashpad" --url=https://webrowser.amigo.mail.ru/amcr --annotation=ProductName=Amigo --annotation=Version=61.0.3163.114 --annotation=bid={3E880DD3-A3B3-4169-BF16-A89BB0E33DF1} --annotation=plat=Win32 --initial-client-data=0x2d0,0x2d4,0x2d8,0x2c8,0x2dc,0xdfdde0,0xdfddf0,0xdfde006⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6128
-
-
C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe"C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe" --make-default-browser6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4340 -
C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exeC:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe --type=crashpad-handler /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Amigo\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Amigo\User Data" --url=https://webrowser.amigo.mail.ru/amcr --annotation=ProductName=Amigo --annotation=Version=61.0.3163.114 --annotation=bid={3E880DD3-A3B3-4169-BF16-A89BB0E33DF1} --annotation=plat=Win32 --initial-client-data=0x178,0x17c,0x180,0x170,0x184,0x71db72bc,0x71db72cc,0x71db72dc7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5908 -
C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exeC:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe --type=crashpad-handler /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Amigo\User Data\Crashpad" --url=https://webrowser.amigo.mail.ru/amcr --annotation=ProductName=Amigo --annotation=Version=61.0.3163.114 --annotation=bid={3E880DD3-A3B3-4169-BF16-A89BB0E33DF1} --annotation=plat=Win32 --initial-client-data=0x1fc,0x200,0x204,0x1f4,0x208,0xa9db34,0xa9db44,0xa9db548⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1544
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\mini_loader_scoped_dir_1743172825\updater.exe"C:\Users\Admin\AppData\Local\Temp\mini_loader_scoped_dir_1743172825\updater.exe" --install4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:5880 -
C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe"C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe"5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:6296
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\KBB6D849BF664070C0.exe"C:\Users\Admin\AppData\Local\Temp\KBB6D849BF664070C0.exe" "--silent" "--without-updater" "--rfr=hp.1:802811,dse.1:802821,vbm.1:802831,hp.2:802851,dse.2:802861,vbm.2:802871,any.2:802801,any:802841" "--pay_browser_class=0" "--install_callback=http://horses.jacketrescue.ru/v_install?aux=66668674&hash=juQFvcSND95z96IC&sig=6c46d97dabf7647e884878d2b8b3c47a&guid={guid}&browser={browser}&{component}=1&browserclass1={browserClass1}&browserclass2={browserClass2}&paid={paid}&pb={paidBrowser}&pa={paidAction}&ibc={installBrowserClass}&pbc={payBrowserClass}&ur={unpaidActionReason}&sid=16045&label_dse=802821&label_hp=802811&label_vbm=802831&label_ndef=802801&label_dse_ndef=802861&label_hp_ndef=802851&label_vbm_ndef=802871" "--partner_product_online=http://horses.jacketrescue.ru/affect?guid={guid}&sid=16045&homesearch=1&label=811008&label_dse=802821&label_hp=802811&label_vbm=802831&label_ndef=802801&label_dse_ndef=802861&label_hp_ndef=802851&label_vbm_ndef=802871"2⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\a433-4ec1-91e4-c8ea\na_runner.exe"C:\Users\Admin\AppData\Local\Temp\a433-4ec1-91e4-c8ea\na_runner.exe" --install3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe"C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater\us\2d0cd78004_d\MailRuUpdater.exe"C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater\us\2d0cd78004_d\MailRuUpdater.exe" --update-installation5⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2812 -
C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe"C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe"6⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:768
-
-
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Mail.Ru\Sputnik\ie_addon_dll.dll"3⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:4416
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://yadi.sk/d/cDublKYKrDrpe2⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2c8,0x2cc,0x2d0,0x2c4,0x2f0,0x7ff81ecaf208,0x7ff81ecaf214,0x7ff81ecaf2203⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1696,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=2484 /prefetch:33⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2456,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=2452 /prefetch:23⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1924,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=2604 /prefetch:83⤵PID:5252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3424,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=3440 /prefetch:13⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3428,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=3480 /prefetch:13⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4892,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=4764 /prefetch:13⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4160,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=3916 /prefetch:13⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaFoundationServiceBroker --lang=en-US --service-sandbox-type=mf_cdm --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5080,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=5092 /prefetch:83⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4932,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=4908 /prefetch:83⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4132,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=4968 /prefetch:83⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5592,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=5552 /prefetch:83⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4936,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=4580 /prefetch:83⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4936,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=4580 /prefetch:83⤵PID:5460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6300,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=6320 /prefetch:83⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6464,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=152 /prefetch:83⤵PID:1052
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Mail.Ru\Sputnik\ptls\mailruhomesearch.exe" --pr_deferred1⤵
- Suspicious use of WriteProcessMemory
PID:5236 -
C:\Users\Admin\AppData\Local\Mail.Ru\Sputnik\ptls\mailruhomesearch.exeC:\Users\Admin\AppData\Local\Mail.Ru\Sputnik\ptls\mailruhomesearch.exe --pr_deferred2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3432
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Mail.Ru\Sputnik\ptls\mailruhomesearch.exe" --pr_deferred1⤵
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Mail.Ru\Sputnik\ptls\mailruhomesearch.exeC:\Users\Admin\AppData\Local\Mail.Ru\Sputnik\ptls\mailruhomesearch.exe --pr_deferred2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:3892
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exeC:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:772
-
-
C:\Program Files (x86)\Mail.Ru\MailRuUpdater\MailRuUpdater.exe"C:\Program Files (x86)\Mail.Ru\MailRuUpdater\MailRuUpdater.exe" --s1⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\TEMP\abe5-faa4-71ab-e78b"C:\Windows\TEMP\abe5-faa4-71ab-e78b" --install2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:424
-
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Mail.Ru\MailRuUpdater\us\336327ca85_d\MailRuUpdater.exe"C:\Windows\system32\config\systemprofile\AppData\Local\Mail.Ru\MailRuUpdater\us\336327ca85_d\MailRuUpdater.exe" --us2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:744
-
-
C:\Program Files (x86)\Mail.Ru\Update Service\mrupdsrv.exe"C:\Program Files (x86)\Mail.Ru\Update Service\mrupdsrv.exe" --s1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- System policy modification
PID:3472
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:1480
-
C:\Program Files (x86)\Mail.Ru\MailRuUpdater\MailRuUpdater.exe"C:\Program Files (x86)\Mail.Ru\MailRuUpdater\MailRuUpdater.exe" --s1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4376
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe1⤵PID:1268
-
C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exeC:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1668
-
-
C:\Program Files (x86)\Mail.Ru\MailRuUpdater\MailRuUpdater.exe"C:\Program Files (x86)\Mail.Ru\MailRuUpdater\MailRuUpdater.exe" --s1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2020
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:5932
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:5700
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe --no-startup-window1⤵PID:3296
-
C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exeC:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe --no-startup-window2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5792 -
C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exeC:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Amigo\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Amigo\User Data" --url=https://webrowser.amigo.mail.ru/amcr --annotation=ProductName=Amigo --annotation=Version=61.0.3163.114 --annotation=bid={3E880DD3-A3B3-4169-BF16-A89BB0E33DF1} --annotation=plat=Win32 --initial-client-data=0x174,0x178,0x17c,0x16c,0x180,0x71db72bc,0x71db72cc,0x71db72dc3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3256
-
-
C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe"C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe" --type=renderer --field-trial-handle=2572,10090588024159454636,3126127013451398276,131072 --service-pipe-token=4C67DAA9C8F9F3A61C13549C2B5F5281 --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --blink-settings=disallowFetchForDocWrittenScriptsInMainFrame=false,disallowFetchForDocWrittenScriptsInMainFrameOnSlowConnections=true,cssExternalScannerNoPreload=false,cssExternalScannerPreload=true --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-checker-imaging --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553 --disable-accelerated-video-decode --disable-gpu-compositing --enable-gpu-async-worker-context --service-request-channel-token=4C67DAA9C8F9F3A61C13549C2B5F5281 --renderer-client-id=2 --mojo-platform-channel-handle=2592 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5176
-
-
C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe"C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe" --type=renderer --field-trial-handle=2572,10090588024159454636,3126127013451398276,131072 --service-pipe-token=E71783069165DDF2066F5949D20940B0 --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --blink-settings=disallowFetchForDocWrittenScriptsInMainFrame=false,disallowFetchForDocWrittenScriptsInMainFrameOnSlowConnections=true,cssExternalScannerNoPreload=false,cssExternalScannerPreload=true --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-checker-imaging --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553 --disable-accelerated-video-decode --disable-gpu-compositing --enable-gpu-async-worker-context --service-request-channel-token=E71783069165DDF2066F5949D20940B0 --renderer-client-id=3 --mojo-platform-channel-handle=2616 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5940
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe1⤵PID:6256
-
C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exeC:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6468
-
-
C:\Program Files (x86)\Mail.Ru\MailRuUpdater\MailRuUpdater.exe"C:\Program Files (x86)\Mail.Ru\MailRuUpdater\MailRuUpdater.exe" --s1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:6392
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38B
MD5ad87679f4cda36b861356b304dc7e205
SHA10a57e6db402d41a7627f64bcd7eb08087fbfcb9c
SHA25691a3f3d9492679b8aeec08bf6d4e34dbb38bf2ba2afbb668de685cee642d3454
SHA5124c8b038ba1e83d328d16a3b5d7a0e7987c3d37e78e55c8b2b17c2d3ce5cefaa8c17aa843aad2ba5e5723e0613dd8a3bbede007248bce818cce407352ef6e6510
-
Filesize
1.1MB
MD512f74a11190a321695764da85c0b177a
SHA1fbde96e731468a5309f2446b3f6d82d2522b2394
SHA256b591dc2642c069cbaaeebeec23ae476aaefbbc178b47f255f6eaadf10d59f9f1
SHA512a9ef056acbb6d5b4fe7bcacbdbf226900873ab6ad8cdb1539c7b3afd39ae19b1bedfeb87dfb5dcfc9abcd5029a4dc443f33602b59599619423090b21a9d2d77a
-
Filesize
40B
MD5d6456255670c917212a220bd9f4d88b3
SHA1a3b25e56567813498691ba28275870294f1a4f62
SHA256a50363f51b513d64a2905f8d48cfcd132b0162d15d632a1387391fbcf3fad626
SHA5128da5c8af586084931bbf3a1a3c1f801a2badebbfed12e0521f607d39137d9d23d3c3f3d86f4972d80249c9c657162f1dd9c742328c7672a56ba16a91f3d8e570
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
1KB
MD5fcf86ef6aace5652a003e8014b841795
SHA1c569bc1c88fd85bf958db278d19f0718ae847ac1
SHA256c1e236bbde996328f5e743010921bafcdfe7e2f8ff593782eb1ac23ca8d7f15e
SHA512f46d747298eea97343cdd0f3309a64e1a4f3ca04d75d1de2bf12bd99a31e6aec4dc517f1311a288f2a4bd9017b6475dc862f342a1c568aa8bbded164a841ccd3
-
Filesize
462B
MD548292af00c9372ae4cbea3635ac14dcb
SHA181b4f69098e2489d9bf5e0d5a217ab541048443c
SHA256ae8dedb11b8cbb1c1169d47fc05aa22d57da37eabf9441ccdda5d491ad79cb03
SHA512b6a022c2efce89530e8fbb4e266a4596f1978cadbc66e67bc700455cb9e89cd859b4de0b791e9e925cb49a32442898719b8debee932063854e16f627780b8213
-
Filesize
20KB
MD55228081fec57e37ee0c25bfdd6dcccdb
SHA1bc00c8b8d25595752a99c72fe332a75f0a02438f
SHA25652d1dae25a74045ac48a35f1109d4f1bb1044fa2a06dc53c07d6f453fd4de93b
SHA512a5d46ecd04e066968190663c5395dcc2449b984da8785caeaebef54be94bfa80af634ddd74052317fb22ddd106074acb7d3162aef8f583dac01bb788cc73f268
-
Filesize
22KB
MD5e81840e2843afc8c06d5e0c0ebcf811b
SHA1d1ed963e26b2fea7bfb46e47a8cb59b64ffdee33
SHA25626d5c0dbb2aa14ad7575275d107cd843b9683d4c06e6ff33407b51692f41fba1
SHA512f575e1d31e77c7b6e9ca9f0f4d791f128464b99dd238800e0ec215b69a606cffd2bb7118fe8fbccfea44cdf85455b44f629f88cf1da61a2f11f0082a80714336
-
Filesize
906KB
MD52fd24b550e262ef2b91162f4728729d2
SHA1c23b96e45c0b1df122e1c8f0b93d7afdb1ebc5b7
SHA2563891ff2d5620b4ee5326dcfdd50e1a34def8397579c7dbec45b296dd5727d25f
SHA512699929912292d98796e71bcf9bcc4c7f6eef01cdde55ebcd588ffa426f3e9351c94f7a22dcd30ff1d11b8b7e31abad14caf10350ddbf8583adc55d175804bdd2
-
Filesize
119KB
MD5c2df4f0f3adda04947da9bd726d204f7
SHA1078968b4176ca246f24bcdaef27e911afb6ed853
SHA2567348f49b7e1db7c43c770ccfbf47330c7b8fd93efe90ca30a1e7a3cb653d05d1
SHA512b4e487f8d8482003a23d00c460f5cf398c3884f7fd5813b728495e8aa28c2123a7e6a8090585ad419ad378b3d55eebee3061b1b14024771e827b74794761abdb
-
Filesize
3.1MB
MD5fdb8415567c0748a3bd4ffb9ac783cb7
SHA1dbc51b3b102a1fd0fffa2dd5d2809c6e385d6a82
SHA25692025c595d1a8e503aed2725ef9e64ef4ea919307c2694ffd564993ee4b64d43
SHA5124335ed11f768209edff90f4611b7ea9ec3ca40daa39eea98cd6cf62bf4a51e1d94d2aa3b3d42b51abb834d2954aaccf84006c6d2af3065b8f35f3b505f3674c2
-
Filesize
1.5MB
MD58c1c71d39137c7a7b2b9bdfe6eefe73c
SHA18845700f12df281d7bed6b456a340ec1f115bdaf
SHA2561d297d91948c568edf3214eff94460c7dcf5c32a96bbee1f5adf47c3754ced63
SHA5129ed389072316f8cc066ecab71fc7fdea9268f7d8665960ed7a0f52d98a665fb343dbdd6756db7636e5e178b6706f7978546c85a72b667c9dee2c4eef9c8d0e3c
-
Filesize
80B
MD5792a9fc55b2bbfa570da0db95deec48f
SHA114eb596253b91e0552e70c9c3abd8f28e457c96a
SHA25658c22be22619c315ddc8fd3cfec581107b148990126808d4923cb9bbce61c4fb
SHA5126970fe039bffe7b057c990de0a0e445263cf5a8ebb63e89e61330633030f2650aad791437fb36e6ba7a9935036d337797df0155a1cc0461e10c70e54da40b9de
-
Filesize
16B
MD5b66b3b7a2cba885e9e021b75a4386e7b
SHA193b4900984e5f66220e1adde63a3bd2d7a7146ba
SHA25687a4d21eaf85b2a10dbb8b58629bd9f8e84c7ccc3d3b653519b680f7d8db865f
SHA512a908f6ca99c0f9410eeecf4317ecc69ebc37f39410ccc74986f80bcdb1a3bcf9f3e129c6db815f6a593cd30b281a6679d7dd38094b3e43682277733160c73e24
-
C:\Users\Admin\AppData\Local\Mail.Ru\Tmp\DeferredTasks\{04B81C27-80C0-4347-B783-F592D68E0F61}\p0cbb3eb170cb947ca46cb5d2affcb83a
Filesize56KB
MD53afbcad27cbf5b5b0c2084ac6366f689
SHA1e950119cc2d5adde0a9f3b80a8075bbb3a293b27
SHA25607e5a914348b102a2109b48141e58f0de0cba2e1c1303d741cf0bfb13b007bc8
SHA512574c6a0fea304f6413c30453afd0b737328a4af51108a9dc91260d29a2ee46cb181b7ce823db7db385f736e1a44e4f66840c6eabf2aa091d416830bb106576f3
-
C:\Users\Admin\AppData\Local\Mail.Ru\Tmp\DeferredTasks\{04B81C27-80C0-4347-B783-F592D68E0F61}\p1a9ab46e4d48da3660c62918298ecaad
Filesize446KB
MD5c110516fac153caf1dc6955e69570ff0
SHA1620deb10f4baef53e36a0d35fc1a84434359ff79
SHA256b562a0f6b5f721c13a531a56ab4005738a621b14285b556611341cbf61e2cba8
SHA512e9b14ad32091533807404d31a1bb1f54b1cc1a3ecc69ccd56c1e7ee970afa2d03bfd595bbca00cdbd3231efa88f07125db2e05e80d50f970e5ac4cd3218059ca
-
Filesize
8KB
MD51c2f617b2b4aaff8713422dbbadcbd1b
SHA16397e5c99ffe9d497c4249e7291e6aefbaae6edd
SHA2565b40e51b10c420178cd2026f72f28bb78de6367ad15340dbfea3b8ae4e635f1a
SHA51278e103a9f66d58c5b2dddb29ba8476f46ddacc47ef492c68eb0fd02dffb905508593bd4f3048163b0e925768b33f0a702402d948f0310b1b7121c39ac7aa4949
-
Filesize
280B
MD5998db8a9f40f71e2f3d9e19aac4db4a9
SHA1dade0e68faef54a59d68ae8cb3b8314b6947b6d7
SHA2561b28744565eb600485d9800703f2fb635ecf4187036c12d47f86bbd1e078e06b
SHA5120e66fd26a11507f78fb1b173fd50555dbd95b0d330e095cdd93206757c6af2780ece914a11a23cd4c840636a59470f44c6db35fa392303fb583806264e652016
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5e7c29df59bbd07aa309e4527ee7a5867
SHA10f6bcdfb2c97b3a4cc9275f36dd0bd412827dc94
SHA25653b107a6c8aeedcd2931abade81da4a852a8dbc9bc622624a820a2d9f2fc359b
SHA512015cbffc2172347854ef0be62f538762961172b761a015dc1f6269259ed1ad9a78d9666666c7a07a33fdabc2220011cde2847ba10698978f3c9451bd70fff4da
-
Filesize
36KB
MD5f12eafd52132a80bfb18f96a470180b2
SHA175b79228de2735c2d2b93ea4d7679b6612484bfe
SHA256dcbbb2f8c59dbc62fcbdd140d6696117424f8bbe83be39d3a4fd95be3ce023a9
SHA5126593c9b9b6ead74b6d14020b4bd09a6914bdeac89b2c921c7b28e468244ed7778b7f083f4b5319adcc151d13d70e63ea4555580e46d33af92d9eeeb99a803df1
-
Filesize
22KB
MD53fcf711264e1ac5bc02d78ed3fa30d3f
SHA1319676f54b311525f48f62be4d02ee98474ad829
SHA2563c5a44d5c39fc76fb46c9baa535c580cc28f60a4358f051faf63b96497a2d5f8
SHA51226a702d402564cb84feb0fc4d5eb8498e3d9111c6f784869e840c0c0ec3fac00c2c7055fcef3c792e4c09a0e21f8e1ebb870b829c0fe9be83d077785653af777
-
Filesize
40KB
MD5765e94cb41f3698bd2bf898e8c822756
SHA1f70d895628062d7446f96ff66f580cfafe5a6e21
SHA25668b7306aec276a43a9f2a9c8904bbe5d92856f1619c3d25e56210063e7e26e47
SHA51205f0b81128afa763204234cca5a271993af06f893871f4b28fb296bfe8f860623e9aba9092fd79a02da9c1b66d723ec73f86f615ff3efb83173d64a23526bcde
-
Filesize
40KB
MD54c60fd3a81e858965e7e637962c318d4
SHA1efcc8d7b7e212d626fc7d0371076f06424e86bb5
SHA25631c40bd7d3acaec962f95d9286a750fcd1b42c7aa240b9b9b2b1ec9607755c0c
SHA5121801f35e93b4548b595f5e08af6cf9df930beca937040ecf92bb0693afdde566e87fff350cfff366c5fb2cca95fe1dc4850250a9a1bdbdef91e31a170e832b4b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5e404073e008f20a2548ef807b1a2daf4
SHA17072e1bf27137039cc4d61269ae4f5fb6ce137c3
SHA256a6cd7f0262fa4c0ac030fc772751752b6e340f7223f31a3713d0f5d787836b99
SHA5124ceaa92a4b7fdf8088bcda2b7994c1ff97ea1d43889425fbded2363e0877d8a2d0b790d43ad5c2df8c90220bdd8543b3d1f6079113318e586d021afbe6c7fc12
-
Filesize
1.3MB
MD58947cdcbfb2f5a63052218d9a73768d8
SHA18b5b653c6985bdf3c9ef6aaf8b6dd2773c61d99e
SHA25665532f8a9ac33b6f146c86497710acbe18516c14498919e7b610c21f296c9d6a
SHA51214c1f5c8cd6f4c7f620a2b8e30da49a462b15abefa3171a828087a8ba035b1af72156a556272c6d3609cc4141ccaa0ed4641cafe5d73a44a2efcb7fb46a210ae
-
Filesize
554KB
MD5b2b97b5f2ffe8603788a49b7105baa82
SHA198b854520f4fe748a9ae54c8abe710f99da6acbc
SHA256fe03edbc99e3728745e19e800195fbd795476cd503903eef3714eee5e675f760
SHA512207608bd5529aaeab90b800beacdea9e2700c7a22117e2866c8809f3018d1f42694c50fe379e6d355db49dc93206f340b998d4b9ae2d30cab95fdebdfe549c56
-
Filesize
2.0MB
MD5a29c9f523b47027fb97190b908c18979
SHA1203ca880efa5e1c883f37ad56a4b0e832b813a15
SHA25625ceeaed228c2d7c08bad41362ad6619c243324ad8a0e05c75d3672e96373bed
SHA5122d5383fd32060064843ff66be6f0477d36bb8eb0d348305700563fbb737ceddc14e0589ec78f922e9baa96e00c1487512f32fe92951229d5277db3701936d8c3
-
Filesize
3.5MB
MD5feb798265c24beb577cb5bcd43cbd158
SHA10b13b0b60367a77cdc55a8db5c31dd7c1f1f7162
SHA256d9be17d76dfb9d90246512ce89dd7aab7cf1cf94d6145429a84094614aba65e4
SHA512157024ad7e3b1ea71c6e398105506d7a3df9c8758b092fae014fa4757ff16e0b69168b2a798e92a372dbe46a3a9a4f0a4276c7e9deec9221d5ffb7dfbeeea35d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\f89e6cf52ab5ce33.customDestinations-ms
Filesize3KB
MD564ce30726793f84bec8922463063bcdc
SHA15a272de17d3d4894c698c88ca4085f48447aff58
SHA256fc7d0ed08b709d956a00e70f59db21e1ece4f37620481536854c34182bc7c06b
SHA512f19a2aaa71a4103a3d92ba4dcd2c8d63696c5bfa996e64497959ab5290188739e283fb2051b40d3bd26795d5a84babea04f64aab5764549dede219bf027c4c2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i4m4r9gt.Admin\extension-settings.json_7bda-5198-4ba6-94a5
Filesize74B
MD50ccb05b7ff75571fbc6b6c06fab4fd64
SHA1556d8267382b3949bdf5c6e24b9a3968abc5fe3e
SHA25615d9daf10a173c7e83a2048dca1409dcf1018c858fdb7a5181afb700e9d7d0d8
SHA51226c2cb090970893defd2bb94101a1ca5b3863427af21b283cad07ad68f26eef62cea826099ed0f5bd140efd3ee350f94632f5c182ca85cc2a772b96a0b5cde04
-
Filesize
11B
MD5ec3584f3db838942ec3669db02dc908e
SHA18dceb96874d5c6425ebb81bfee587244c89416da
SHA25677c7c10b4c860d5ddf4e057e713383e61e9f21bcf0ec4cfbbc16193f2e28f340
SHA51235253883bb627a49918e7415a6ba6b765c86b516504d03a1f4fd05f80902f352a7a40e2a67a6d1b99a14b9b79dab82f3ac7a67c512ccf6701256c13d0096855e
-
Filesize
64B
MD5b0e1e196a038f53974d53068372a31c2
SHA1805249bb1b8f91a45f9078f7c17413cf08593dc4
SHA256ad4d15ea28d1ff68ff16a6a07a0397e4b3d88e5edd7eef49e7a4693b033c5a01
SHA512cb45eaa58f647b88dd935ddc846be61498bc5a93c61f2e6b1841f964b2ddc4eadf6be2f5e83e5e0f89d38a86c090008c3de775439b1c8a8ce4f97962e80b2439
-
Filesize
27B
MD59c8e76303ee302398994934472ef48d0
SHA1ef956dea9a073e9e52a303d676570d1ee30c346e
SHA256a7068000f0ddd40085d2afe795eb08ac08e3a4dc6d536d6f91b905e85b12e005
SHA512727275f162e04e9ea8d5055c84e30a5f21d74e897249856414f7e76da9758a3e240b76b8f4cdd19a23b7d944faa1a236ac3a192f0654daf733eb022a9c799d4c
-
Filesize
8B
MD58e1b08222f20e45a3e8db04c569f9cb7
SHA1a6ac68fbadf96faba3af7000a7514790157f930f
SHA2565bb1f21f806938a043563024b13b33d74a2b95b767c5f81bde8456e9d0413a89
SHA512414d30dec0fce6b4e3ab52c50f064262e0df00cf9dbbeacca271a0991555371a37cfffdd0486c07a9096838942a69cdbefea4a4399ef2848139678daff589c31
-
Filesize
1.3MB
MD5602cd1f0dd54e83de1413705aa378803
SHA15015b921285a070a586be12c8663680a9e84dd2b
SHA2568eeef659d4d3e827474b4c769436807eafedf58dc923054338cb5385dc8d3998
SHA5125ba07ae618103ba84d7b4e10b15aa7f72fd42e80a5598f2ca361b4afe3ddce5c83dc44b64ba076020838f758a95dc2b148a9374155ff6c92d7d065355f657477