Everything.exe
- File Path:
C:\Program Files\Everything\Everything.exe
- Description: Everything
Screenshot
Hashes
Type | Hash |
---|---|
MD5 | 241931B176498EA29A29C6C05DCC0194 |
SHA1 | 7F0034829EBE4FB0DE4E2BE776DF9BB88C54F138 |
SHA256 | 71BE6DA3F9E4D7B9F965BBE5C77AB77C22C09557683D271E452EB2B9F4ED588A |
SHA384 | 8D29800F7E656661A53681343EB7F75C6DD1A37EAD8C6CE18C1339632DD1D6DBD69BBAC789830592AB6A81D0F2C955BF |
SHA512 | A507BF259E191D405DE5359FE429C3137FC45A7C782E0B20EB20FE4DCE19B914FE61DBD879BC9C288F7532502BB73F4F7A88FE81EF3ABEE0067FB219BAD07015 |
SSDEEP | 49152:YorYL8OnAKgReoL6lZBaDcXi5tiQSRdMli+OAFwSZAttKr8:Yoco5cAsJyFwSZAtko |
IMP | 1AEDACFB186F381089A405C6FF922BAB |
PESHA1 | 1EAC32914CA1BC29D25919BB06A9A1C3068AC367 |
PE256 | 91FF6AE3CE3DFD116BDD4A7997CA9AF5380DB5135FCA111924E7D3090BEE37D0 |
Runtime Data
Window Title:
Everything
Open Handles:
Path | Type |
---|---|
(R-D) C:\Windows\Fonts\StaticCache.dat | File |
(R-D) C:\Windows\System32\en-US\windows.storage.dll.mui | File |
(R-D) C:\Windows\SystemResources\imageres.dll.mun | File |
(RW-) C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.488_none_ca04af081b815d21 | File |
(RW-) C:\xCyclopedia | File |
\BaseNamedObjects__ComCatalogCache__ | Section |
\BaseNamedObjects\NLS_CodePage_1252_3_2_0_0 | Section |
\BaseNamedObjects\NLS_CodePage_437_3_2_0_0 | Section |
\BaseNamedObjects\windows_shell_global_counters | Section |
\Sessions\1\BaseNamedObjects\1accHWNDInterface:1807f4 | Section |
\Sessions\1\BaseNamedObjects\windows_shell_global_counters | Section |
\Sessions\1\Windows\Theme2547664911 | Section |
\Windows\Theme3854699184 | Section |
Loaded Modules:
Path |
---|
C:\Program Files\Everything\Everything.exe |
C:\Windows\System32\ADVAPI32.dll |
C:\Windows\System32\combase.dll |
C:\Windows\System32\comdlg32.dll |
C:\Windows\System32\GDI32.dll |
C:\Windows\System32\gdi32full.dll |
C:\Windows\SYSTEM32\iertutil.dll |
C:\Windows\System32\IMM32.DLL |
C:\Windows\System32\KERNEL32.DLL |
C:\Windows\System32\KERNELBASE.dll |
C:\Windows\System32\msvcp_win.dll |
C:\Windows\System32\msvcrt.dll |
C:\Windows\SYSTEM32\ntdll.dll |
C:\Windows\System32\ole32.dll |
C:\Windows\System32\psapi.dll |
C:\Windows\System32\RPCRT4.dll |
C:\Windows\System32\sechost.dll |
C:\Windows\System32\shcore.dll |
C:\Windows\System32\SHELL32.dll |
C:\Windows\System32\SHLWAPI.dll |
C:\Windows\System32\ucrtbase.dll |
C:\Windows\system32\urlmon.dll |
C:\Windows\System32\USER32.dll |
C:\Windows\system32\uxtheme.dll |
C:\Windows\System32\win32u.dll |
C:\Windows\System32\WS2_32.dll |
C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.488_none_ca04af081b815d21\COMCTL32.dll |
Signature
- Status: Signature verified.
- Serial:
0554D03D517345589F62CA21C7789A22
- Thumbprint:
D729CE691A8FC342ED6B0F607C7457B05B5AACF9
- Issuer: CN=DigiCert SHA2 Assured ID Code Signing CA, OU=www.digicert.com, O=DigiCert Inc, C=US
- Subject: CN=voidtools, O=voidtools, L=Wilmington, S=South Australia, C=AU
File Metadata
- Original Filename: Everything.exe
- Product Name: Everything
- Company Name: voidtools
- File Version: 1.4.1.992
- Product Version: 1.4.1.992
- Language: English (United States)
- Legal Copyright: Copyright 2020 voidtools
- Machine Type: 64-bit
File Scan
- VirusTotal Detections: 0/68
- VirusTotal Link: https://www.virustotal.com/gui/file/71be6da3f9e4d7b9f965bbe5c77ab77c22c09557683d271e452eb2b9f4ed588a/detection/
Possible Misuse
The following table contains possible examples of Everything.exe
being misused. While Everything.exe
is not inherently malicious, its legitimate functionality can be abused for malicious purposes.
Source | Source File | Example | License |
---|---|---|---|
sigma | proc_creation_lnx_network_service_scanning.yml | - '/telnet' # could be wget, curl, ssh, many things. basically everything that is able to do network connection. consider fine tuning |
DRL 1.0 |
sigma | registry_event_asep_reg_keys_modification_currentversion.yml | - 'C:\Program Files\Everything\Everything.exe' |
DRL 1.0 |
atomic-red-team | T1098.001.md | # in the context of an ART test (and not a real attack), we don’t need to keep access for too long. In case the cleanup command isn’t called, it’s better to ensure that everything expires after 1 day so it doesn’t leave this backdoor open for too long | MIT License. © 2018 Red Canary |
atomic-red-team | T1114.001.md | Search through local Outlook installation, extract mail, compress the contents, and saves everything to a directory for later exfiltration. | MIT License. © 2018 Red Canary |
atomic-red-team | T1176.md | <blockquote>Adversaries may abuse Internet browser extensions to establish persistent access to victim systems. Browser extensions or plugins are small programs that can add functionality and customize aspects of Internet browsers. They can be installed directly or through a browser’s app store and generally have access and permissions to everything that the browser can access.(Citation: Wikipedia Browser Extension)(Citation: Chrome Extensions Definition) | MIT License. © 2018 Red Canary |
atomic-red-team | T1548.002.md | REM will tell it to ignore everything after %windir% and treat it just as a NOTE. Therefore just executing cmd with admin privs. | MIT License. © 2018 Red Canary |
signature-base | airbnb_binaryalert.yar | $s3 = “-cmdfile local.bat #will execute everything from local.bat” ascii wide | CC BY-NC 4.0 |
signature-base | apt_eqgrp.yar | $s4 = “Not everything is set yet” fullword ascii | CC BY-NC 4.0 |
signature-base | apt_eqgrp_apr17.yar | $x4 = “[!] nothing looks vulnerable, trying everything” fullword ascii | CC BY-NC 4.0 |
MIT License. Copyright (c) 2020-2021 Strontic.