Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2025, 14:38

General

  • Target

    1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe

  • Size

    1.7MB

  • MD5

    aaf6a5281734233732b8d9bc038ee684

  • SHA1

    1585ef28a6ef1495e3ddecf8e382c046307e4335

  • SHA256

    1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed

  • SHA512

    f134b2553222e3254d6203bd316d02956a533e8b970d983822b586dd53d4e8b8bda4253d88f3200a9bad806841d9428179bc0146f62a9c134abc43827b153d1a

  • SSDEEP

    49152:Wv9SvM4c6bEgejrfFG0A5g8homh6+y6W3qMqs4y4qT8p6C+Kx5:WEvM4c6bEgejrfFG0A5gWoHX6W6nhZqY

Malware Config

Signatures

  • Downloads MZ/PE file 8 IoCs
  • A potential corporate email address has been identified in the URL: [email protected]
  • A potential corporate email address has been identified in the URL: [email protected]
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 31 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • VMProtect packed file 21 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 15 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 15 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 33 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 19 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe
    "C:\Users\Admin\AppData\Local\Temp\1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe"
    1⤵
    • Downloads MZ/PE file
    • Checks computer location settings
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5844
    • C:\Users\Admin\AppData\Local\Temp\KB649B72C948965F2.exe
      "C:\Users\Admin\AppData\Local\Temp\KB649B72C948965F2.exe" --silent --make_default=1 --rfr=800479 --ua_rfr=CHANNEL_800479 "--partner_new_url=http://horses.jacketrescue.ru/v_install?sid=16045&guid=$__GUID&sig=$__SIG&ovr=$__OVR&amigo=1&label=800479&aux=66668674" "--partner_firstonline_url=http://horses.jacketrescue.ru/v_touch?guid=$__GUID&sig=$__SIG"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3004
      • C:\Users\Admin\AppData\Local\Temp\loader_ldir_3004_30688\KB649B72C948965F2.exe
        C:\Users\Admin\AppData\Local\Temp\loader_ldir_3004_30688\KB649B72C948965F2.exe --silent --rfr=800479 --ua_rfr=CHANNEL_800479 --partner_new_url=http://horses.jacketrescue.ru/v_install?sid=16045&guid=$__GUID&sig=$__SIG&ovr=$__OVR&amigo=1&label=800479&aux=66668674 --cp
        3⤵
        • Downloads MZ/PE file
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5656
        • C:\Users\Admin\AppData\Local\Temp\mini_loader_scoped_dir_1743172825\KB649B72C948965F2.exe
          "C:\Users\Admin\AppData\Local\Temp\mini_loader_scoped_dir_1743172825\KB649B72C948965F2.exe" --silent --rfr=800479 --ua_rfr=CHANNEL_800479 --partner_new_url=http://horses.jacketrescue.ru/v_install?sid=16045&guid=$__GUID&sig=$__SIG&ovr=$__OVR&amigo=1&label=800479&aux=66668674 --ext_params=masterid={9CE8767A-0E1A-464F-AF66-919A5CF35FEF}&tcvsts=-2 --ils=12
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4764
          • C:\Users\Admin\AppData\Local\Temp\CR_D9F61.tmp\setup.exe
            "C:\Users\Admin\AppData\Local\Temp\CR_D9F61.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\CR_D9F61.tmp\CHROME.PACKED.7Z" --silent --rfr=800479 --ua_rfr=CHANNEL_800479 --partner_new_url=http://horses.jacketrescue.ru/v_install?sid=16045&guid=$__GUID&sig=$__SIG&ovr=$__OVR&amigo=1&label=800479&aux=66668674 --ext_params=masterid={9CE8767A-0E1A-464F-AF66-919A5CF35FEF}&tcvsts=-2 --ils=12
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            PID:5676
            • C:\Users\Admin\AppData\Local\Temp\CR_D9F61.tmp\setup.exe
              C:\Users\Admin\AppData\Local\Temp\CR_D9F61.tmp\setup.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Amigo\User Data\Crashpad" --url=https://webrowser.amigo.mail.ru/amcr --annotation=ProductName=Amigo --annotation=Version=61.0.3163.114 --annotation=bid={3E880DD3-A3B3-4169-BF16-A89BB0E33DF1} --annotation=plat=Win32 --initial-client-data=0x2d0,0x2d4,0x2d8,0x2c8,0x2dc,0xdfdde0,0xdfddf0,0xdfde00
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:6128
            • C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe
              "C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe" --make-default-browser
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:4340
              • C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe
                C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe --type=crashpad-handler /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Amigo\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Amigo\User Data" --url=https://webrowser.amigo.mail.ru/amcr --annotation=ProductName=Amigo --annotation=Version=61.0.3163.114 --annotation=bid={3E880DD3-A3B3-4169-BF16-A89BB0E33DF1} --annotation=plat=Win32 --initial-client-data=0x178,0x17c,0x180,0x170,0x184,0x71db72bc,0x71db72cc,0x71db72dc
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:5908
                • C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe
                  C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe --type=crashpad-handler /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Amigo\User Data\Crashpad" --url=https://webrowser.amigo.mail.ru/amcr --annotation=ProductName=Amigo --annotation=Version=61.0.3163.114 --annotation=bid={3E880DD3-A3B3-4169-BF16-A89BB0E33DF1} --annotation=plat=Win32 --initial-client-data=0x1fc,0x200,0x204,0x1f4,0x208,0xa9db34,0xa9db44,0xa9db54
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:1544
        • C:\Users\Admin\AppData\Local\Temp\mini_loader_scoped_dir_1743172825\updater.exe
          "C:\Users\Admin\AppData\Local\Temp\mini_loader_scoped_dir_1743172825\updater.exe" --install
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          PID:5880
          • C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe
            "C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe"
            5⤵
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • System Location Discovery: System Language Discovery
            PID:6296
    • C:\Users\Admin\AppData\Local\Temp\KBB6D849BF664070C0.exe
      "C:\Users\Admin\AppData\Local\Temp\KBB6D849BF664070C0.exe" "--silent" "--without-updater" "--rfr=hp.1:802811,dse.1:802821,vbm.1:802831,hp.2:802851,dse.2:802861,vbm.2:802871,any.2:802801,any:802841" "--pay_browser_class=0" "--install_callback=http://horses.jacketrescue.ru/v_install?aux=66668674&hash=juQFvcSND95z96IC&sig=6c46d97dabf7647e884878d2b8b3c47a&guid={guid}&browser={browser}&{component}=1&browserclass1={browserClass1}&browserclass2={browserClass2}&paid={paid}&pb={paidBrowser}&pa={paidAction}&ibc={installBrowserClass}&pbc={payBrowserClass}&ur={unpaidActionReason}&sid=16045&label_dse=802821&label_hp=802811&label_vbm=802831&label_ndef=802801&label_dse_ndef=802861&label_hp_ndef=802851&label_vbm_ndef=802871" "--partner_product_online=http://horses.jacketrescue.ru/affect?guid={guid}&sid=16045&homesearch=1&label=811008&label_dse=802821&label_hp=802811&label_vbm=802831&label_ndef=802801&label_dse_ndef=802861&label_hp_ndef=802851&label_vbm_ndef=802871"
      2⤵
      • Downloads MZ/PE file
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1864
      • C:\Users\Admin\AppData\Local\Temp\a433-4ec1-91e4-c8ea\na_runner.exe
        "C:\Users\Admin\AppData\Local\Temp\a433-4ec1-91e4-c8ea\na_runner.exe" --install
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4904
        • C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe
          "C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe"
          4⤵
          • Downloads MZ/PE file
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of WriteProcessMemory
          PID:3076
          • C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater\us\2d0cd78004_d\MailRuUpdater.exe
            "C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater\us\2d0cd78004_d\MailRuUpdater.exe" --update-installation
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            PID:2812
            • C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe
              "C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe"
              6⤵
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • System Location Discovery: System Language Discovery
              PID:768
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Mail.Ru\Sputnik\ie_addon_dll.dll"
        3⤵
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:4416
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://yadi.sk/d/cDublKYKrDrpe
      2⤵
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1388
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2c8,0x2cc,0x2d0,0x2c4,0x2f0,0x7ff81ecaf208,0x7ff81ecaf214,0x7ff81ecaf220
        3⤵
          PID:1600
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1696,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=2484 /prefetch:3
          3⤵
            PID:4260
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2456,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=2452 /prefetch:2
            3⤵
              PID:3360
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1924,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=2604 /prefetch:8
              3⤵
                PID:5252
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3424,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=3440 /prefetch:1
                3⤵
                  PID:1728
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3428,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=3480 /prefetch:1
                  3⤵
                    PID:3140
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4892,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=4764 /prefetch:1
                    3⤵
                      PID:1704
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4160,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=3916 /prefetch:1
                      3⤵
                        PID:3716
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaFoundationServiceBroker --lang=en-US --service-sandbox-type=mf_cdm --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5080,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=5092 /prefetch:8
                        3⤵
                          PID:4668
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4932,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=4908 /prefetch:8
                          3⤵
                            PID:4160
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4132,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=4968 /prefetch:8
                            3⤵
                              PID:2324
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5592,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=5552 /prefetch:8
                              3⤵
                                PID:3452
                              • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4936,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=4580 /prefetch:8
                                3⤵
                                  PID:3140
                                • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4936,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=4580 /prefetch:8
                                  3⤵
                                    PID:5460
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6300,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=6320 /prefetch:8
                                    3⤵
                                      PID:3240
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6464,i,17579604328770180019,8807339819996384083,262144 --variations-seed-version --mojo-platform-channel-handle=152 /prefetch:8
                                      3⤵
                                        PID:1052
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Mail.Ru\Sputnik\ptls\mailruhomesearch.exe" --pr_deferred
                                    1⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:5236
                                    • C:\Users\Admin\AppData\Local\Mail.Ru\Sputnik\ptls\mailruhomesearch.exe
                                      C:\Users\Admin\AppData\Local\Mail.Ru\Sputnik\ptls\mailruhomesearch.exe --pr_deferred
                                      2⤵
                                      • Executes dropped EXE
                                      • Checks whether UAC is enabled
                                      • Drops file in System32 directory
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:3432
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Mail.Ru\Sputnik\ptls\mailruhomesearch.exe" --pr_deferred
                                    1⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:3348
                                    • C:\Users\Admin\AppData\Local\Mail.Ru\Sputnik\ptls\mailruhomesearch.exe
                                      C:\Users\Admin\AppData\Local\Mail.Ru\Sputnik\ptls\mailruhomesearch.exe --pr_deferred
                                      2⤵
                                      • Executes dropped EXE
                                      • Checks whether UAC is enabled
                                      • System Location Discovery: System Language Discovery
                                      PID:3892
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe
                                    1⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:1192
                                    • C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe
                                      C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe
                                      2⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      PID:772
                                  • C:\Program Files (x86)\Mail.Ru\MailRuUpdater\MailRuUpdater.exe
                                    "C:\Program Files (x86)\Mail.Ru\MailRuUpdater\MailRuUpdater.exe" --s
                                    1⤵
                                    • Downloads MZ/PE file
                                    • Executes dropped EXE
                                    • Checks whether UAC is enabled
                                    • Drops file in System32 directory
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of WriteProcessMemory
                                    PID:3792
                                    • C:\Windows\TEMP\abe5-faa4-71ab-e78b
                                      "C:\Windows\TEMP\abe5-faa4-71ab-e78b" --install
                                      2⤵
                                      • Executes dropped EXE
                                      • Drops file in Program Files directory
                                      • System Location Discovery: System Language Discovery
                                      PID:424
                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Mail.Ru\MailRuUpdater\us\336327ca85_d\MailRuUpdater.exe
                                      "C:\Windows\system32\config\systemprofile\AppData\Local\Mail.Ru\MailRuUpdater\us\336327ca85_d\MailRuUpdater.exe" --us
                                      2⤵
                                      • Executes dropped EXE
                                      • Checks whether UAC is enabled
                                      • System Location Discovery: System Language Discovery
                                      PID:744
                                  • C:\Program Files (x86)\Mail.Ru\Update Service\mrupdsrv.exe
                                    "C:\Program Files (x86)\Mail.Ru\Update Service\mrupdsrv.exe" --s
                                    1⤵
                                    • Executes dropped EXE
                                    • Checks whether UAC is enabled
                                    • Drops file in System32 directory
                                    • System Location Discovery: System Language Discovery
                                    • System policy modification
                                    PID:3472
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                    1⤵
                                      PID:1480
                                    • C:\Program Files (x86)\Mail.Ru\MailRuUpdater\MailRuUpdater.exe
                                      "C:\Program Files (x86)\Mail.Ru\MailRuUpdater\MailRuUpdater.exe" --s
                                      1⤵
                                      • Executes dropped EXE
                                      • Checks whether UAC is enabled
                                      • Drops file in System32 directory
                                      • System Location Discovery: System Language Discovery
                                      PID:4376
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe
                                      1⤵
                                        PID:1268
                                        • C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe
                                          C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe
                                          2⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          PID:1668
                                      • C:\Program Files (x86)\Mail.Ru\MailRuUpdater\MailRuUpdater.exe
                                        "C:\Program Files (x86)\Mail.Ru\MailRuUpdater\MailRuUpdater.exe" --s
                                        1⤵
                                        • Executes dropped EXE
                                        • Checks whether UAC is enabled
                                        • Drops file in System32 directory
                                        • System Location Discovery: System Language Discovery
                                        PID:2020
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start
                                        1⤵
                                          PID:5932
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start
                                            2⤵
                                              PID:5700
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe --no-startup-window
                                            1⤵
                                              PID:3296
                                              • C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe
                                                C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe --no-startup-window
                                                2⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • System Location Discovery: System Language Discovery
                                                PID:5792
                                                • C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe
                                                  C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Amigo\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Amigo\User Data" --url=https://webrowser.amigo.mail.ru/amcr --annotation=ProductName=Amigo --annotation=Version=61.0.3163.114 --annotation=bid={3E880DD3-A3B3-4169-BF16-A89BB0E33DF1} --annotation=plat=Win32 --initial-client-data=0x174,0x178,0x17c,0x16c,0x180,0x71db72bc,0x71db72cc,0x71db72dc
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3256
                                                • C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe
                                                  "C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe" --type=renderer --field-trial-handle=2572,10090588024159454636,3126127013451398276,131072 --service-pipe-token=4C67DAA9C8F9F3A61C13549C2B5F5281 --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --blink-settings=disallowFetchForDocWrittenScriptsInMainFrame=false,disallowFetchForDocWrittenScriptsInMainFrameOnSlowConnections=true,cssExternalScannerNoPreload=false,cssExternalScannerPreload=true --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-checker-imaging --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553 --disable-accelerated-video-decode --disable-gpu-compositing --enable-gpu-async-worker-context --service-request-channel-token=4C67DAA9C8F9F3A61C13549C2B5F5281 --renderer-client-id=2 --mojo-platform-channel-handle=2592 /prefetch:1
                                                  3⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • System Location Discovery: System Language Discovery
                                                  PID:5176
                                                • C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe
                                                  "C:\Users\Admin\AppData\Local\Amigo\Application\amigo.exe" --type=renderer --field-trial-handle=2572,10090588024159454636,3126127013451398276,131072 --service-pipe-token=E71783069165DDF2066F5949D20940B0 --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --blink-settings=disallowFetchForDocWrittenScriptsInMainFrame=false,disallowFetchForDocWrittenScriptsInMainFrameOnSlowConnections=true,cssExternalScannerNoPreload=false,cssExternalScannerPreload=true --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-checker-imaging --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553 --disable-accelerated-video-decode --disable-gpu-compositing --enable-gpu-async-worker-context --service-request-channel-token=E71783069165DDF2066F5949D20940B0 --renderer-client-id=3 --mojo-platform-channel-handle=2616 /prefetch:1
                                                  3⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • System Location Discovery: System Language Discovery
                                                  PID:5940
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe
                                              1⤵
                                                PID:6256
                                                • C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe
                                                  C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater.exe
                                                  2⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  PID:6468
                                              • C:\Program Files (x86)\Mail.Ru\MailRuUpdater\MailRuUpdater.exe
                                                "C:\Program Files (x86)\Mail.Ru\MailRuUpdater\MailRuUpdater.exe" --s
                                                1⤵
                                                • Executes dropped EXE
                                                • Checks whether UAC is enabled
                                                • Drops file in System32 directory
                                                • System Location Discovery: System Language Discovery
                                                PID:6392

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\ProgramData\Mail.Ru\Id

                                                Filesize

                                                38B

                                                MD5

                                                ad87679f4cda36b861356b304dc7e205

                                                SHA1

                                                0a57e6db402d41a7627f64bcd7eb08087fbfcb9c

                                                SHA256

                                                91a3f3d9492679b8aeec08bf6d4e34dbb38bf2ba2afbb668de685cee642d3454

                                                SHA512

                                                4c8b038ba1e83d328d16a3b5d7a0e7987c3d37e78e55c8b2b17c2d3ce5cefaa8c17aa843aad2ba5e5723e0613dd8a3bbede007248bce818cce407352ef6e6510

                                              • C:\Users\Admin\AppData\Local\Amigo\Temp\source5676_2143\Chrome-bin\amigo.exe

                                                Filesize

                                                1.1MB

                                                MD5

                                                12f74a11190a321695764da85c0b177a

                                                SHA1

                                                fbde96e731468a5309f2446b3f6d82d2522b2394

                                                SHA256

                                                b591dc2642c069cbaaeebeec23ae476aaefbbc178b47f255f6eaadf10d59f9f1

                                                SHA512

                                                a9ef056acbb6d5b4fe7bcacbdbf226900873ab6ad8cdb1539c7b3afd39ae19b1bedfeb87dfb5dcfc9abcd5029a4dc443f33602b59599619423090b21a9d2d77a

                                              • C:\Users\Admin\AppData\Local\Amigo\User Data\Crashpad\settings.dat

                                                Filesize

                                                40B

                                                MD5

                                                d6456255670c917212a220bd9f4d88b3

                                                SHA1

                                                a3b25e56567813498691ba28275870294f1a4f62

                                                SHA256

                                                a50363f51b513d64a2905f8d48cfcd132b0162d15d632a1387391fbcf3fad626

                                                SHA512

                                                8da5c8af586084931bbf3a1a3c1f801a2badebbfed12e0521f607d39137d9d23d3c3f3d86f4972d80249c9c657162f1dd9c742328c7672a56ba16a91f3d8e570

                                              • C:\Users\Admin\AppData\Local\Amigo\User Data\Default\data_reduction_proxy_leveldb\000002.dbtmp

                                                Filesize

                                                16B

                                                MD5

                                                206702161f94c5cd39fadd03f4014d98

                                                SHA1

                                                bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                SHA256

                                                1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                SHA512

                                                0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                              • C:\Users\Admin\AppData\Local\Amigo\User Data\Default\fcc28307-a820-4a85-8091-c92c003531d1.tmp

                                                Filesize

                                                1B

                                                MD5

                                                5058f1af8388633f609cadb75a75dc9d

                                                SHA1

                                                3a52ce780950d4d969792a2559cd519d7ee8c727

                                                SHA256

                                                cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                SHA512

                                                0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                              • C:\Users\Admin\AppData\Local\Amigo\User Data\Local State

                                                Filesize

                                                1KB

                                                MD5

                                                fcf86ef6aace5652a003e8014b841795

                                                SHA1

                                                c569bc1c88fd85bf958db278d19f0718ae847ac1

                                                SHA256

                                                c1e236bbde996328f5e743010921bafcdfe7e2f8ff593782eb1ac23ca8d7f15e

                                                SHA512

                                                f46d747298eea97343cdd0f3309a64e1a4f3ca04d75d1de2bf12bd99a31e6aec4dc517f1311a288f2a4bd9017b6475dc862f342a1c568aa8bbded164a841ccd3

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Bookmarks

                                                Filesize

                                                462B

                                                MD5

                                                48292af00c9372ae4cbea3635ac14dcb

                                                SHA1

                                                81b4f69098e2489d9bf5e0d5a217ab541048443c

                                                SHA256

                                                ae8dedb11b8cbb1c1169d47fc05aa22d57da37eabf9441ccdda5d491ad79cb03

                                                SHA512

                                                b6a022c2efce89530e8fbb4e266a4596f1978cadbc66e67bc700455cb9e89cd859b4de0b791e9e925cb49a32442898719b8debee932063854e16f627780b8213

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Favicons

                                                Filesize

                                                20KB

                                                MD5

                                                5228081fec57e37ee0c25bfdd6dcccdb

                                                SHA1

                                                bc00c8b8d25595752a99c72fe332a75f0a02438f

                                                SHA256

                                                52d1dae25a74045ac48a35f1109d4f1bb1044fa2a06dc53c07d6f453fd4de93b

                                                SHA512

                                                a5d46ecd04e066968190663c5395dcc2449b984da8785caeaebef54be94bfa80af634ddd74052317fb22ddd106074acb7d3162aef8f583dac01bb788cc73f268

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                Filesize

                                                22KB

                                                MD5

                                                e81840e2843afc8c06d5e0c0ebcf811b

                                                SHA1

                                                d1ed963e26b2fea7bfb46e47a8cb59b64ffdee33

                                                SHA256

                                                26d5c0dbb2aa14ad7575275d107cd843b9683d4c06e6ff33407b51692f41fba1

                                                SHA512

                                                f575e1d31e77c7b6e9ca9f0f4d791f128464b99dd238800e0ec215b69a606cffd2bb7118fe8fbccfea44cdf85455b44f629f88cf1da61a2f11f0082a80714336

                                              • C:\Users\Admin\AppData\Local\Mail.Ru\GoChromiumNativeHost\native_host_app.exe

                                                Filesize

                                                906KB

                                                MD5

                                                2fd24b550e262ef2b91162f4728729d2

                                                SHA1

                                                c23b96e45c0b1df122e1c8f0b93d7afdb1ebc5b7

                                                SHA256

                                                3891ff2d5620b4ee5326dcfdd50e1a34def8397579c7dbec45b296dd5727d25f

                                                SHA512

                                                699929912292d98796e71bcf9bcc4c7f6eef01cdde55ebcd588ffa426f3e9351c94f7a22dcd30ff1d11b8b7e31abad14caf10350ddbf8583adc55d175804bdd2

                                              • C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater\prodmon

                                                Filesize

                                                119KB

                                                MD5

                                                c2df4f0f3adda04947da9bd726d204f7

                                                SHA1

                                                078968b4176ca246f24bcdaef27e911afb6ed853

                                                SHA256

                                                7348f49b7e1db7c43c770ccfbf47330c7b8fd93efe90ca30a1e7a3cb653d05d1

                                                SHA512

                                                b4e487f8d8482003a23d00c460f5cf398c3884f7fd5813b728495e8aa28c2123a7e6a8090585ad419ad378b3d55eebee3061b1b14024771e827b74794761abdb

                                              • C:\Users\Admin\AppData\Local\Mail.Ru\MailRuUpdater\us\2d0cd78004_d\MailRuUpdater.exe

                                                Filesize

                                                3.1MB

                                                MD5

                                                fdb8415567c0748a3bd4ffb9ac783cb7

                                                SHA1

                                                dbc51b3b102a1fd0fffa2dd5d2809c6e385d6a82

                                                SHA256

                                                92025c595d1a8e503aed2725ef9e64ef4ea919307c2694ffd564993ee4b64d43

                                                SHA512

                                                4335ed11f768209edff90f4611b7ea9ec3ca40daa39eea98cd6cf62bf4a51e1d94d2aa3b3d42b51abb834d2954aaccf84006c6d2af3065b8f35f3b505f3674c2

                                              • C:\Users\Admin\AppData\Local\Mail.Ru\Sputnik\ie_addon_dll.dll

                                                Filesize

                                                1.5MB

                                                MD5

                                                8c1c71d39137c7a7b2b9bdfe6eefe73c

                                                SHA1

                                                8845700f12df281d7bed6b456a340ec1f115bdaf

                                                SHA256

                                                1d297d91948c568edf3214eff94460c7dcf5c32a96bbee1f5adf47c3754ced63

                                                SHA512

                                                9ed389072316f8cc066ecab71fc7fdea9268f7d8665960ed7a0f52d98a665fb343dbdd6756db7636e5e178b6706f7978546c85a72b667c9dee2c4eef9c8d0e3c

                                              • C:\Users\Admin\AppData\Local\Mail.Ru\Tmp\DeferredTasks\metadata

                                                Filesize

                                                80B

                                                MD5

                                                792a9fc55b2bbfa570da0db95deec48f

                                                SHA1

                                                14eb596253b91e0552e70c9c3abd8f28e457c96a

                                                SHA256

                                                58c22be22619c315ddc8fd3cfec581107b148990126808d4923cb9bbce61c4fb

                                                SHA512

                                                6970fe039bffe7b057c990de0a0e445263cf5a8ebb63e89e61330633030f2650aad791437fb36e6ba7a9935036d337797df0155a1cc0461e10c70e54da40b9de

                                              • C:\Users\Admin\AppData\Local\Mail.Ru\Tmp\DeferredTasks\metadata

                                                Filesize

                                                16B

                                                MD5

                                                b66b3b7a2cba885e9e021b75a4386e7b

                                                SHA1

                                                93b4900984e5f66220e1adde63a3bd2d7a7146ba

                                                SHA256

                                                87a4d21eaf85b2a10dbb8b58629bd9f8e84c7ccc3d3b653519b680f7d8db865f

                                                SHA512

                                                a908f6ca99c0f9410eeecf4317ecc69ebc37f39410ccc74986f80bcdb1a3bcf9f3e129c6db815f6a593cd30b281a6679d7dd38094b3e43682277733160c73e24

                                              • C:\Users\Admin\AppData\Local\Mail.Ru\Tmp\DeferredTasks\{04B81C27-80C0-4347-B783-F592D68E0F61}\p0cbb3eb170cb947ca46cb5d2affcb83a

                                                Filesize

                                                56KB

                                                MD5

                                                3afbcad27cbf5b5b0c2084ac6366f689

                                                SHA1

                                                e950119cc2d5adde0a9f3b80a8075bbb3a293b27

                                                SHA256

                                                07e5a914348b102a2109b48141e58f0de0cba2e1c1303d741cf0bfb13b007bc8

                                                SHA512

                                                574c6a0fea304f6413c30453afd0b737328a4af51108a9dc91260d29a2ee46cb181b7ce823db7db385f736e1a44e4f66840c6eabf2aa091d416830bb106576f3

                                              • C:\Users\Admin\AppData\Local\Mail.Ru\Tmp\DeferredTasks\{04B81C27-80C0-4347-B783-F592D68E0F61}\p1a9ab46e4d48da3660c62918298ecaad

                                                Filesize

                                                446KB

                                                MD5

                                                c110516fac153caf1dc6955e69570ff0

                                                SHA1

                                                620deb10f4baef53e36a0d35fc1a84434359ff79

                                                SHA256

                                                b562a0f6b5f721c13a531a56ab4005738a621b14285b556611341cbf61e2cba8

                                                SHA512

                                                e9b14ad32091533807404d31a1bb1f54b1cc1a3ecc69ccd56c1e7ee970afa2d03bfd595bbca00cdbd3231efa88f07125db2e05e80d50f970e5ac4cd3218059ca

                                              • C:\Users\Admin\AppData\Local\Mail.Ru\Tmp\DeferredTasks\{04B81C27-80C0-4347-B783-F592D68E0F61}_c

                                                Filesize

                                                8KB

                                                MD5

                                                1c2f617b2b4aaff8713422dbbadcbd1b

                                                SHA1

                                                6397e5c99ffe9d497c4249e7291e6aefbaae6edd

                                                SHA256

                                                5b40e51b10c420178cd2026f72f28bb78de6367ad15340dbfea3b8ae4e635f1a

                                                SHA512

                                                78e103a9f66d58c5b2dddb29ba8476f46ddacc47ef492c68eb0fd02dffb905508593bd4f3048163b0e925768b33f0a702402d948f0310b1b7121c39ac7aa4949

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                280B

                                                MD5

                                                998db8a9f40f71e2f3d9e19aac4db4a9

                                                SHA1

                                                dade0e68faef54a59d68ae8cb3b8314b6947b6d7

                                                SHA256

                                                1b28744565eb600485d9800703f2fb635ecf4187036c12d47f86bbd1e078e06b

                                                SHA512

                                                0e66fd26a11507f78fb1b173fd50555dbd95b0d330e095cdd93206757c6af2780ece914a11a23cd4c840636a59470f44c6db35fa392303fb583806264e652016

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\MANIFEST-000001

                                                Filesize

                                                41B

                                                MD5

                                                5af87dfd673ba2115e2fcf5cfdb727ab

                                                SHA1

                                                d5b5bbf396dc291274584ef71f444f420b6056f1

                                                SHA256

                                                f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                SHA512

                                                de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\DualEngine\SiteList-Enterprise.json

                                                Filesize

                                                2B

                                                MD5

                                                99914b932bd37a50b983c5e7c90ae93b

                                                SHA1

                                                bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                SHA256

                                                44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                SHA512

                                                27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\File System\000\t\Paths\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                46295cac801e5d4857d09837238a6394

                                                SHA1

                                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                SHA256

                                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                SHA512

                                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\HubApps

                                                Filesize

                                                107KB

                                                MD5

                                                40e2018187b61af5be8caf035fb72882

                                                SHA1

                                                72a0b7bcb454b6b727bf90da35879b3e9a70621e

                                                SHA256

                                                b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5

                                                SHA512

                                                a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

                                                Filesize

                                                2B

                                                MD5

                                                d751713988987e9331980363e24189ce

                                                SHA1

                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                SHA256

                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                SHA512

                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries

                                                Filesize

                                                40B

                                                MD5

                                                20d4b8fa017a12a108c87f540836e250

                                                SHA1

                                                1ac617fac131262b6d3ce1f52f5907e31d5f6f00

                                                SHA256

                                                6028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d

                                                SHA512

                                                507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                16KB

                                                MD5

                                                e7c29df59bbd07aa309e4527ee7a5867

                                                SHA1

                                                0f6bcdfb2c97b3a4cc9275f36dd0bd412827dc94

                                                SHA256

                                                53b107a6c8aeedcd2931abade81da4a852a8dbc9bc622624a820a2d9f2fc359b

                                                SHA512

                                                015cbffc2172347854ef0be62f538762961172b761a015dc1f6269259ed1ad9a78d9666666c7a07a33fdabc2220011cde2847ba10698978f3c9451bd70fff4da

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                Filesize

                                                36KB

                                                MD5

                                                f12eafd52132a80bfb18f96a470180b2

                                                SHA1

                                                75b79228de2735c2d2b93ea4d7679b6612484bfe

                                                SHA256

                                                dcbbb2f8c59dbc62fcbdd140d6696117424f8bbe83be39d3a4fd95be3ce023a9

                                                SHA512

                                                6593c9b9b6ead74b6d14020b4bd09a6914bdeac89b2c921c7b28e468244ed7778b7f083f4b5319adcc151d13d70e63ea4555580e46d33af92d9eeeb99a803df1

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\Logs\sync_diagnostic.log

                                                Filesize

                                                22KB

                                                MD5

                                                3fcf711264e1ac5bc02d78ed3fa30d3f

                                                SHA1

                                                319676f54b311525f48f62be4d02ee98474ad829

                                                SHA256

                                                3c5a44d5c39fc76fb46c9baa535c580cc28f60a4358f051faf63b96497a2d5f8

                                                SHA512

                                                26a702d402564cb84feb0fc4d5eb8498e3d9111c6f784869e840c0c0ec3fac00c2c7055fcef3c792e4c09a0e21f8e1ebb870b829c0fe9be83d077785653af777

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                40KB

                                                MD5

                                                765e94cb41f3698bd2bf898e8c822756

                                                SHA1

                                                f70d895628062d7446f96ff66f580cfafe5a6e21

                                                SHA256

                                                68b7306aec276a43a9f2a9c8904bbe5d92856f1619c3d25e56210063e7e26e47

                                                SHA512

                                                05f0b81128afa763204234cca5a271993af06f893871f4b28fb296bfe8f860623e9aba9092fd79a02da9c1b66d723ec73f86f615ff3efb83173d64a23526bcde

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                40KB

                                                MD5

                                                4c60fd3a81e858965e7e637962c318d4

                                                SHA1

                                                efcc8d7b7e212d626fc7d0371076f06424e86bb5

                                                SHA256

                                                31c40bd7d3acaec962f95d9286a750fcd1b42c7aa240b9b9b2b1ec9607755c0c

                                                SHA512

                                                1801f35e93b4548b595f5e08af6cf9df930beca937040ecf92bb0693afdde566e87fff350cfff366c5fb2cca95fe1dc4850250a9a1bdbdef91e31a170e832b4b

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                Filesize

                                                152KB

                                                MD5

                                                dd9bf8448d3ddcfd067967f01e8bf6d7

                                                SHA1

                                                d7829475b2bd6a3baa8fabfaf39af57c6439b35e

                                                SHA256

                                                fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                SHA512

                                                65347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de

                                              • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres

                                                Filesize

                                                2KB

                                                MD5

                                                e404073e008f20a2548ef807b1a2daf4

                                                SHA1

                                                7072e1bf27137039cc4d61269ae4f5fb6ce137c3

                                                SHA256

                                                a6cd7f0262fa4c0ac030fc772751752b6e340f7223f31a3713d0f5d787836b99

                                                SHA512

                                                4ceaa92a4b7fdf8088bcda2b7994c1ff97ea1d43889425fbded2363e0877d8a2d0b790d43ad5c2df8c90220bdd8543b3d1f6079113318e586d021afbe6c7fc12

                                              • C:\Users\Admin\AppData\Local\Temp\CR_D9F61.tmp\setup.exe

                                                Filesize

                                                1.3MB

                                                MD5

                                                8947cdcbfb2f5a63052218d9a73768d8

                                                SHA1

                                                8b5b653c6985bdf3c9ef6aaf8b6dd2773c61d99e

                                                SHA256

                                                65532f8a9ac33b6f146c86497710acbe18516c14498919e7b610c21f296c9d6a

                                                SHA512

                                                14c1f5c8cd6f4c7f620a2b8e30da49a462b15abefa3171a828087a8ba035b1af72156a556272c6d3609cc4141ccaa0ed4641cafe5d73a44a2efcb7fb46a210ae

                                              • C:\Users\Admin\AppData\Local\Temp\KB649B72C948965F2.exe

                                                Filesize

                                                554KB

                                                MD5

                                                b2b97b5f2ffe8603788a49b7105baa82

                                                SHA1

                                                98b854520f4fe748a9ae54c8abe710f99da6acbc

                                                SHA256

                                                fe03edbc99e3728745e19e800195fbd795476cd503903eef3714eee5e675f760

                                                SHA512

                                                207608bd5529aaeab90b800beacdea9e2700c7a22117e2866c8809f3018d1f42694c50fe379e6d355db49dc93206f340b998d4b9ae2d30cab95fdebdfe549c56

                                              • C:\Users\Admin\AppData\Local\Temp\KBB6D849BF664070C0.exe

                                                Filesize

                                                2.0MB

                                                MD5

                                                a29c9f523b47027fb97190b908c18979

                                                SHA1

                                                203ca880efa5e1c883f37ad56a4b0e832b813a15

                                                SHA256

                                                25ceeaed228c2d7c08bad41362ad6619c243324ad8a0e05c75d3672e96373bed

                                                SHA512

                                                2d5383fd32060064843ff66be6f0477d36bb8eb0d348305700563fbb737ceddc14e0589ec78f922e9baa96e00c1487512f32fe92951229d5277db3701936d8c3

                                              • C:\Users\Admin\AppData\Local\Temp\a433-4ec1-91e4-c8ea\na_runner.exe

                                                Filesize

                                                3.5MB

                                                MD5

                                                feb798265c24beb577cb5bcd43cbd158

                                                SHA1

                                                0b13b0b60367a77cdc55a8db5c31dd7c1f1f7162

                                                SHA256

                                                d9be17d76dfb9d90246512ce89dd7aab7cf1cf94d6145429a84094614aba65e4

                                                SHA512

                                                157024ad7e3b1ea71c6e398105506d7a3df9c8758b092fae014fa4757ff16e0b69168b2a798e92a372dbe46a3a9a4f0a4276c7e9deec9221d5ffb7dfbeeea35d

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\f89e6cf52ab5ce33.customDestinations-ms

                                                Filesize

                                                3KB

                                                MD5

                                                64ce30726793f84bec8922463063bcdc

                                                SHA1

                                                5a272de17d3d4894c698c88ca4085f48447aff58

                                                SHA256

                                                fc7d0ed08b709d956a00e70f59db21e1ece4f37620481536854c34182bc7c06b

                                                SHA512

                                                f19a2aaa71a4103a3d92ba4dcd2c8d63696c5bfa996e64497959ab5290188739e283fb2051b40d3bd26795d5a84babea04f64aab5764549dede219bf027c4c2b

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i4m4r9gt.Admin\extension-settings.json_7bda-5198-4ba6-94a5

                                                Filesize

                                                74B

                                                MD5

                                                0ccb05b7ff75571fbc6b6c06fab4fd64

                                                SHA1

                                                556d8267382b3949bdf5c6e24b9a3968abc5fe3e

                                                SHA256

                                                15d9daf10a173c7e83a2048dca1409dcf1018c858fdb7a5181afb700e9d7d0d8

                                                SHA512

                                                26c2cb090970893defd2bb94101a1ca5b3863427af21b283cad07ad68f26eef62cea826099ed0f5bd140efd3ee350f94632f5c182ca85cc2a772b96a0b5cde04

                                              • C:\Windows\SysWOW64\GroupPolicy\gpt.ini

                                                Filesize

                                                11B

                                                MD5

                                                ec3584f3db838942ec3669db02dc908e

                                                SHA1

                                                8dceb96874d5c6425ebb81bfee587244c89416da

                                                SHA256

                                                77c7c10b4c860d5ddf4e057e713383e61e9f21bcf0ec4cfbbc16193f2e28f340

                                                SHA512

                                                35253883bb627a49918e7415a6ba6b765c86b516504d03a1f4fd05f80902f352a7a40e2a67a6d1b99a14b9b79dab82f3ac7a67c512ccf6701256c13d0096855e

                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Mail.Ru\MailRuUpdater\us\336327ca85

                                                Filesize

                                                64B

                                                MD5

                                                b0e1e196a038f53974d53068372a31c2

                                                SHA1

                                                805249bb1b8f91a45f9078f7c17413cf08593dc4

                                                SHA256

                                                ad4d15ea28d1ff68ff16a6a07a0397e4b3d88e5edd7eef49e7a4693b033c5a01

                                                SHA512

                                                cb45eaa58f647b88dd935ddc846be61498bc5a93c61f2e6b1841f964b2ddc4eadf6be2f5e83e5e0f89d38a86c090008c3de775439b1c8a8ce4f97962e80b2439

                                              • C:\Windows\System32\GroupPolicy\GPT.INI

                                                Filesize

                                                27B

                                                MD5

                                                9c8e76303ee302398994934472ef48d0

                                                SHA1

                                                ef956dea9a073e9e52a303d676570d1ee30c346e

                                                SHA256

                                                a7068000f0ddd40085d2afe795eb08ac08e3a4dc6d536d6f91b905e85b12e005

                                                SHA512

                                                727275f162e04e9ea8d5055c84e30a5f21d74e897249856414f7e76da9758a3e240b76b8f4cdd19a23b7d944faa1a236ac3a192f0654daf733eb022a9c799d4c

                                              • C:\Windows\System32\GroupPolicy\User\Registry.pol

                                                Filesize

                                                8B

                                                MD5

                                                8e1b08222f20e45a3e8db04c569f9cb7

                                                SHA1

                                                a6ac68fbadf96faba3af7000a7514790157f930f

                                                SHA256

                                                5bb1f21f806938a043563024b13b33d74a2b95b767c5f81bde8456e9d0413a89

                                                SHA512

                                                414d30dec0fce6b4e3ab52c50f064262e0df00cf9dbbeacca271a0991555371a37cfffdd0486c07a9096838942a69cdbefea4a4399ef2848139678daff589c31

                                              • C:\Windows\TEMP\abe5-faa4-71ab-e78b

                                                Filesize

                                                1.3MB

                                                MD5

                                                602cd1f0dd54e83de1413705aa378803

                                                SHA1

                                                5015b921285a070a586be12c8663680a9e84dd2b

                                                SHA256

                                                8eeef659d4d3e827474b4c769436807eafedf58dc923054338cb5385dc8d3998

                                                SHA512

                                                5ba07ae618103ba84d7b4e10b15aa7f72fd42e80a5598f2ca361b4afe3ddce5c83dc44b64ba076020838f758a95dc2b148a9374155ff6c92d7d065355f657477

                                              • memory/744-411-0x0000000000820000-0x0000000000B3F000-memory.dmp

                                                Filesize

                                                3.1MB

                                              • memory/3432-395-0x0000000000560000-0x0000000000767000-memory.dmp

                                                Filesize

                                                2.0MB

                                              • memory/3892-583-0x00000000009A0000-0x0000000000BA7000-memory.dmp

                                                Filesize

                                                2.0MB

                                              • memory/5176-1237-0x0000000001160000-0x0000000001161000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/5844-25-0x0000000000400000-0x000000000090A000-memory.dmp

                                                Filesize

                                                5.0MB

                                              • memory/5844-23-0x0000000000400000-0x000000000090A000-memory.dmp

                                                Filesize

                                                5.0MB

                                              • memory/5844-255-0x0000000000400000-0x000000000090A000-memory.dmp

                                                Filesize

                                                5.0MB

                                              • memory/5844-9-0x0000000000400000-0x000000000090A000-memory.dmp

                                                Filesize

                                                5.0MB

                                              • memory/5844-12-0x0000000000400000-0x000000000090A000-memory.dmp

                                                Filesize

                                                5.0MB

                                              • memory/5844-11-0x0000000000400000-0x000000000090A000-memory.dmp

                                                Filesize

                                                5.0MB

                                              • memory/5844-8-0x0000000000400000-0x000000000090A000-memory.dmp

                                                Filesize

                                                5.0MB

                                              • memory/5844-3-0x0000000000400000-0x000000000090A000-memory.dmp

                                                Filesize

                                                5.0MB

                                              • memory/5844-7-0x0000000000400000-0x000000000090A000-memory.dmp

                                                Filesize

                                                5.0MB

                                              • memory/5844-611-0x0000000000400000-0x000000000090A000-memory.dmp

                                                Filesize

                                                5.0MB

                                              • memory/5844-26-0x0000000000400000-0x000000000090A000-memory.dmp

                                                Filesize

                                                5.0MB

                                              • memory/5844-13-0x00000000026A0000-0x00000000026C9000-memory.dmp

                                                Filesize

                                                164KB

                                              • memory/5844-24-0x0000000000400000-0x000000000090A000-memory.dmp

                                                Filesize

                                                5.0MB

                                              • memory/5844-0-0x0000000000400000-0x000000000090A000-memory.dmp

                                                Filesize

                                                5.0MB

                                              • memory/5844-22-0x0000000000400000-0x000000000090A000-memory.dmp

                                                Filesize

                                                5.0MB

                                              • memory/5844-20-0x0000000000400000-0x000000000090A000-memory.dmp

                                                Filesize

                                                5.0MB

                                              • memory/5844-19-0x0000000000400000-0x000000000090A000-memory.dmp

                                                Filesize

                                                5.0MB

                                              • memory/5844-6-0x0000000000AC0000-0x0000000000AC1000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/5844-18-0x0000000000400000-0x000000000090A000-memory.dmp

                                                Filesize

                                                5.0MB

                                              • memory/5844-4-0x0000000000400000-0x000000000090A000-memory.dmp

                                                Filesize

                                                5.0MB

                                              • memory/5844-17-0x0000000000400000-0x000000000090A000-memory.dmp

                                                Filesize

                                                5.0MB

                                              • memory/5844-15-0x0000000000400000-0x000000000090A000-memory.dmp

                                                Filesize

                                                5.0MB

                                              • memory/5844-2-0x00000000026A0000-0x00000000026C9000-memory.dmp

                                                Filesize

                                                164KB

                                              • memory/5844-10-0x0000000000401000-0x00000000004AF000-memory.dmp

                                                Filesize

                                                696KB

                                              • memory/5844-14-0x0000000000400000-0x000000000090A000-memory.dmp

                                                Filesize

                                                5.0MB

                                              • memory/5844-1-0x00000000026A0000-0x00000000026C9000-memory.dmp

                                                Filesize

                                                164KB

                                              • memory/5940-1238-0x00000000015A0000-0x00000000015A1000-memory.dmp

                                                Filesize

                                                4KB