Analysis

  • max time kernel
    1807s
  • max time network
    1184s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231128-en
  • resource tags

    arch:x64arch:x86image:win11-20231128-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    30-11-2023 21:47

General

  • Target

    a.exe

  • Size

    85KB

  • MD5

    f4fdac362f860520d28385d92c288a7c

  • SHA1

    9d7add3ef8a94821eff53b9f3b6634a204248a08

  • SHA256

    bb86852cf19f43f30561b6deb1f31735bebe157fcecdc74f5b7ba453c253b367

  • SHA512

    097c06c9ae982308bd80be0d4d9c4bf439005f18861c49d662482dd30acdb52ca413e332e65899d5c058df681185cf0ce4bbf6e7a2ac40de75ed2cd4ba2acf6c

  • SSDEEP

    1536:tKC9T1+3phJnoHt3DU5zPHTLSG/raJtVfNfsCZU8rzfBPgH+U391ChsndEg3:tG/1HTba0ClXR8AsnP

Malware Config

Extracted

Family

xworm

C2

goofyah-26004.portmap.host:26004

Attributes
  • Install_directory

    %AppData%

  • install_file

    GVClientV4.exe

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 11 IoCs
  • XenArmor Suite

    XenArmor is as suite of password recovery tools for various application.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • ACProtect 1.3x - 1.4x DLL software 5 IoCs

    Detects file using ACProtect software.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a.exe
    "C:\Users\Admin\AppData\Local\Temp\a.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AYQBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHcAcABkACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHcAagB2ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHMAYgBjACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1532
    • C:\Windows\GV Client V4 BETA.exe
      "C:\Windows\GV Client V4 BETA.exe"
      2⤵
      • Disables RegEdit via registry modification
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1756
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\GV Client V4 BETA.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2448
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'GV Client V4 BETA.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4836
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\GVClientV4.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1832
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'GVClientV4.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3380
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "GVClientV4" /tr "C:\Users\Admin\AppData\Roaming\GVClientV4.exe"
        3⤵
        • Creates scheduled task(s)
        PID:3436
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c Cd %temp% && All-In-One.exe OutPut.json
        3⤵
          PID:1432
          • C:\Users\Admin\AppData\Local\Temp\All-In-One.exe
            All-In-One.exe OutPut.json
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Accesses Microsoft Outlook accounts
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:4760
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://exmple.com/
          3⤵
            PID:3844
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa80ae3cb8,0x7ffa80ae3cc8,0x7ffa80ae3cd8
              4⤵
                PID:4152
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
          1⤵
            PID:1724
          • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
            "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
            1⤵
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:3672
          • C:\Windows\System32\oobe\UserOOBEBroker.exe
            C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding
            1⤵
            • Drops file in Windows directory
            PID:2044
          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
            C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
            1⤵
              PID:2804
            • C:\Users\Admin\AppData\Roaming\GVClientV4.exe
              C:\Users\Admin\AppData\Roaming\GVClientV4.exe
              1⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:1020
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
              1⤵
              • Enumerates system info in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:1912
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0x48,0x10c,0x7ffa80ae3cb8,0x7ffa80ae3cc8,0x7ffa80ae3cd8
                2⤵
                  PID:1472
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,9389174823904532041,9296123504906329159,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2540 /prefetch:8
                  2⤵
                    PID:992
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,9389174823904532041,9296123504906329159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 /prefetch:3
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2100
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,9389174823904532041,9296123504906329159,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2028 /prefetch:2
                    2⤵
                      PID:2236
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,9389174823904532041,9296123504906329159,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:1
                      2⤵
                        PID:2252
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,9389174823904532041,9296123504906329159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:1
                        2⤵
                          PID:4924
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,9389174823904532041,9296123504906329159,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:1
                          2⤵
                            PID:3488
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,9389174823904532041,9296123504906329159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:1
                            2⤵
                              PID:2776
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2036,9389174823904532041,9296123504906329159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4604
                            • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,9389174823904532041,9296123504906329159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1900
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,9389174823904532041,9296123504906329159,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1
                              2⤵
                                PID:2080
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,9389174823904532041,9296123504906329159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:1
                                2⤵
                                  PID:1364
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,9389174823904532041,9296123504906329159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3912 /prefetch:1
                                  2⤵
                                    PID:2252
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,9389174823904532041,9296123504906329159,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5572 /prefetch:2
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:4536
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,9389174823904532041,9296123504906329159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3832 /prefetch:1
                                    2⤵
                                      PID:2388
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,9389174823904532041,9296123504906329159,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4508 /prefetch:1
                                      2⤵
                                        PID:1680
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:596
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:2936
                                        • C:\Users\Admin\AppData\Roaming\GVClientV4.exe
                                          C:\Users\Admin\AppData\Roaming\GVClientV4.exe
                                          1⤵
                                          • Executes dropped EXE
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2092
                                        • C:\Users\Admin\AppData\Roaming\GVClientV4.exe
                                          C:\Users\Admin\AppData\Roaming\GVClientV4.exe
                                          1⤵
                                          • Executes dropped EXE
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2388
                                        • C:\Users\Admin\AppData\Roaming\GVClientV4.exe
                                          C:\Users\Admin\AppData\Roaming\GVClientV4.exe
                                          1⤵
                                          • Executes dropped EXE
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4448
                                        • C:\Users\Admin\AppData\Roaming\GVClientV4.exe
                                          C:\Users\Admin\AppData\Roaming\GVClientV4.exe
                                          1⤵
                                          • Executes dropped EXE
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4244
                                        • C:\Users\Admin\AppData\Roaming\GVClientV4.exe
                                          C:\Users\Admin\AppData\Roaming\GVClientV4.exe
                                          1⤵
                                          • Drops startup file
                                          • Executes dropped EXE
                                          • Adds Run key to start application
                                          • Suspicious behavior: AddClipboardFormatListener
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of SetWindowsHookEx
                                          PID:3352
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\GVClientV4.exe'
                                            2⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:3500
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'GVClientV4.exe'
                                            2⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:372
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\GVClientV4.exe'
                                            2⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:5044
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'GVClientV4.exe'
                                            2⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2384
                                          • C:\Windows\System32\schtasks.exe
                                            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "GVClientV4" /tr "C:\Users\Admin\AppData\Roaming\GVClientV4.exe"
                                            2⤵
                                            • Creates scheduled task(s)
                                            PID:3052
                                          • C:\Windows\System32\schtasks.exe
                                            "C:\Windows\System32\schtasks.exe" /delete /f /tn "GVClientV4"
                                            2⤵
                                              PID:3408
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpD840.tmp.bat""
                                              2⤵
                                                PID:5000
                                                • C:\Windows\system32\timeout.exe
                                                  timeout 3
                                                  3⤵
                                                  • Delays execution with timeout.exe
                                                  PID:2340
                                            • C:\Windows\system32\sihost.exe
                                              sihost.exe
                                              1⤵
                                              • Suspicious use of FindShellTrayWindow
                                              PID:4604
                                            • C:\Windows\system32\LogonUI.exe
                                              "LogonUI.exe" /flags:0x4 /state0:0xa39c7055 /state1:0x41c64e6d
                                              1⤵
                                              • Modifies data under HKEY_USERS
                                              • Suspicious use of SetWindowsHookEx
                                              PID:3200

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\GVClientV4.exe.log

                                              Filesize

                                              654B

                                              MD5

                                              2cbbb74b7da1f720b48ed31085cbd5b8

                                              SHA1

                                              79caa9a3ea8abe1b9c4326c3633da64a5f724964

                                              SHA256

                                              e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3

                                              SHA512

                                              ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                              Filesize

                                              2KB

                                              MD5

                                              627073ee3ca9676911bee35548eff2b8

                                              SHA1

                                              4c4b68c65e2cab9864b51167d710aa29ebdcff2e

                                              SHA256

                                              85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

                                              SHA512

                                              3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              2fdf029278a0dee411a92724272084f8

                                              SHA1

                                              2255ac6fb951928e43b1d6942babc1fd537b1b31

                                              SHA256

                                              9d0a95bba4fe224220477941236b19c9084805b27d6c52234ff9c223bfd9d089

                                              SHA512

                                              148fe2e6332311a3719ed205bd5f43bc25153f334ef7a0bc1f92c494524ae7b4b025df83964bfd4567123b859c78ada0857505420701e956cfd2c32a91d18d04

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              2fdf029278a0dee411a92724272084f8

                                              SHA1

                                              2255ac6fb951928e43b1d6942babc1fd537b1b31

                                              SHA256

                                              9d0a95bba4fe224220477941236b19c9084805b27d6c52234ff9c223bfd9d089

                                              SHA512

                                              148fe2e6332311a3719ed205bd5f43bc25153f334ef7a0bc1f92c494524ae7b4b025df83964bfd4567123b859c78ada0857505420701e956cfd2c32a91d18d04

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              72B

                                              MD5

                                              cb6f8f62758d38dd4193e314d0c551ae

                                              SHA1

                                              30e3e157e92a8b8266551a789743d26bb90d65f5

                                              SHA256

                                              4ab13a04a589aaf1f5134eb5467bd0c27c64e60652eca49d45a73552b4a6c573

                                              SHA512

                                              0cd3f97e6e284d303e24b822c56b8845d070af7f7c2af76583beb0bb34ed482ce85680663a5bd2b6419d619b0284c7a7e88e34e608a46980ec65b8ed0f68b4a7

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                              Filesize

                                              185B

                                              MD5

                                              efa3b79297b792ddfa72609e2389407a

                                              SHA1

                                              7c959b0d9c508607119d7c112fe81939169c8ccb

                                              SHA256

                                              04371cb7276a5868761433e311d805f97da580075fc9bf1a66f0a9d8ac9a4017

                                              SHA512

                                              1f08b7ea9823ae979382586db83b05c0d0dc5cb565b3946fb8134c0dfaaf61fdf80d6c666ceca6522964ac446d2a2e798e1f0eaff3dd2ab5cae88a793db20eaf

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              bc6a58fddcb98bb89cc44748a6c4dcde

                                              SHA1

                                              cc85afd6e48af6d7009f160082241cb949461a7c

                                              SHA256

                                              bc4ba62025b03ac731743baf646cd9beee150a649aeddbef4c217a2418ab827f

                                              SHA512

                                              6209ab20475f9391e40d770c6e3d7bfaa03a50a7a9923062dfac27ae5a29fabe22901f1efd5af30bf5b9c4a9d9514b2f3dc199d590a9353f21cb7885832d7137

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              965571131e18bb6583120a56de7d3e8c

                                              SHA1

                                              144491b93c8779b5428654f983fe5dcb9cfcde0b

                                              SHA256

                                              2d2110263a610f860b5d094c2d84d73e2e1cf57bf4eef8e11eb75f06160bed51

                                              SHA512

                                              8b3cd3838ee848140c3c6f2c0ac017e41941913c6b826e560ff2d4850f1ad57242fd8fbca725f28de7a47b0de2a98dadf5e6f2ea02b2690a800bd3353af61cca

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              faaac4f37f0e8fde0b275298c591a5e1

                                              SHA1

                                              9215eac5244de40b3a10484a1ad3c0907c9b921f

                                              SHA256

                                              0af9ff2a81f834277caa3531aa76acadcb38aa88e05f2f0dc98bf2d01adcb701

                                              SHA512

                                              e51da43856b2f3ee4a1c29c2ade4a1ee5311c2951f4e6d120ba8737cef7d868deebeefc68ad09b96fb92d087ba7cb948d9b794cd7078857c07bee24628b3187e

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                              Filesize

                                              25KB

                                              MD5

                                              c965fea8ba6d79dee323ce53d055d179

                                              SHA1

                                              2a4d2a5bc232f091d2f252943ce04760f2b2a3f7

                                              SHA256

                                              54e34486aa0e739416735ccd26c9271fe41ae4a28a25080f7b2a11b08e4c576d

                                              SHA512

                                              2736d6c4b94c39e4d483044e54a6182f9aea376ede3bd9b719d8bf6a66a66e145c8f60b5de8718f6856e8dbca0134079d1d0724419922431bf969bd5d28204dc

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              46295cac801e5d4857d09837238a6394

                                              SHA1

                                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                              SHA256

                                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                              SHA512

                                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              206702161f94c5cd39fadd03f4014d98

                                              SHA1

                                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                              SHA256

                                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                              SHA512

                                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              0b643016028841c5c67a53a6a3bc6bce

                                              SHA1

                                              30ae2a52fb054946a78c9104e13e2889712964f6

                                              SHA256

                                              9922c8b3d71f2fb0eed4991b01d813a496925f3b7bb37c59727cc2ee92eaf4ea

                                              SHA512

                                              0c19a2f91305e5a9c8f6cf107133af17dd23c34baf981dae73ac76277753f4c163c90be2f448fddd47157b7022e209a35d74dad4f536d81b6e354a07b1b7f731

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              894e98235144afd6a0e08ccebad97818

                                              SHA1

                                              19314256467f1a5cb4f4ea6b6424e75669e398b4

                                              SHA256

                                              905bb6f8442921637d903b7bb740f0f6e8df504a4ab60587b9f2a6727361316a

                                              SHA512

                                              aa10ef9c5c5211331a9170be7fa196cbc7c042ba4920dc0e0c204c69919aa20cd4122f6ac9ea3ea80507f2ad43ca7d7f57e761ca7f1aba47a9fa8077031d3df4

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              11KB

                                              MD5

                                              7e0fe851a8e2a03700b4dcfdb6c09d13

                                              SHA1

                                              98bb0678e7a9156eb24e7aaa1625299ab0a368ea

                                              SHA256

                                              dac12954ebd53ee8c72bf021ed2127ddcba6a597adb9544e809ddceb487570dc

                                              SHA512

                                              c98b3c09e40b8a6a61df713051ee9197ed62e3b87b065f9e7c969992007ce4d77e2e590400e1fae20fa8efe2c723afbdf3db8e682108757af350eedb9c5f7caf

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              11KB

                                              MD5

                                              7e0fe851a8e2a03700b4dcfdb6c09d13

                                              SHA1

                                              98bb0678e7a9156eb24e7aaa1625299ab0a368ea

                                              SHA256

                                              dac12954ebd53ee8c72bf021ed2127ddcba6a597adb9544e809ddceb487570dc

                                              SHA512

                                              c98b3c09e40b8a6a61df713051ee9197ed62e3b87b065f9e7c969992007ce4d77e2e590400e1fae20fa8efe2c723afbdf3db8e682108757af350eedb9c5f7caf

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              944B

                                              MD5

                                              8b1394bd98c93d68bb4151a8c8c4015b

                                              SHA1

                                              3c5695c58a2186c1a13e70d8de9343f660429a91

                                              SHA256

                                              3d46aa2ace9880ec7c1eb00581078beb3ca2107f343654aa5d5e250c97bf67d8

                                              SHA512

                                              b7fe198d72b322dd2b2badf038821af9ceccae8b506f7475d8c253ea40aef9b0ba50dae223d5251d72a14aec81d025d394d3277576125d03f3e4ec393459a607

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              18KB

                                              MD5

                                              2f190db8a7098639c8e5b301c66b9cd0

                                              SHA1

                                              e15b007918afaf52a24db449c43eb01a5bee6473

                                              SHA256

                                              cf43ec140edfd282d931407a6690f347d98c29748c48d3d393deb5de0ae82e89

                                              SHA512

                                              4c0dd63a2a943360ee854fdfa3bdeaf247d81b73cd3645827c0bb96f7a6e94894a2ff3d2647ab8216ae235c2f62340837930c0df7054da272cb8ec7de464accd

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              18KB

                                              MD5

                                              2f190db8a7098639c8e5b301c66b9cd0

                                              SHA1

                                              e15b007918afaf52a24db449c43eb01a5bee6473

                                              SHA256

                                              cf43ec140edfd282d931407a6690f347d98c29748c48d3d393deb5de0ae82e89

                                              SHA512

                                              4c0dd63a2a943360ee854fdfa3bdeaf247d81b73cd3645827c0bb96f7a6e94894a2ff3d2647ab8216ae235c2f62340837930c0df7054da272cb8ec7de464accd

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              944B

                                              MD5

                                              6344564097353c8e7e68991fffa80d88

                                              SHA1

                                              2ac4d108a30ec3fbd2938b0563eb912415ea7c62

                                              SHA256

                                              d0af6d69f8bc0c98e9fb61dead6327bbc8b4f5292529313515382d8f883de0da

                                              SHA512

                                              e2b37a9001a91cb05483d72f88bd70a61ca5655939c2290fd1580710eec9d8d26a5fedbcb5223f5413b5dcc46f1d8b6b408e57be0e4ad4b37b55cbce9023a303

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              944B

                                              MD5

                                              947f5aa506644a452dd41f1c18ea6103

                                              SHA1

                                              d26a04fd395c97e0028a46aaabf2a4e6767dce75

                                              SHA256

                                              69428140330e639719076b30ff37512ccb9202ba7013c0ad7b938ac95c4aeabd

                                              SHA512

                                              6b61b9d7936cd3e7eef324c79f021af7400c850ed3312c5c444d0a08c6476d7b7bc3730edf96fe749c0f18464c0cf3624a1f80abaf69cb564b231fdc6527d698

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              944B

                                              MD5

                                              549ecc6e6baef14e62306531602260ed

                                              SHA1

                                              cad898d58fd9cbf92760d030a00130ea8f797e09

                                              SHA256

                                              c5fe493720e278fcb114cc810f01d6455b7894c5fd834312b64476f8477e5770

                                              SHA512

                                              7a83e840836d91d5deb1a7b6e2c78be10b2e2d5d29e92334c565f30d0be7df0e0753700a716c6d3cf3cc063a1605268de999f8b57d8c7c25844164f442b6638e

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              944B

                                              MD5

                                              2e8eb51096d6f6781456fef7df731d97

                                              SHA1

                                              ec2aaf851a618fb43c3d040a13a71997c25bda43

                                              SHA256

                                              96bfd9dd5883329927fe8c08b8956355a1a6ceb30ceeb5d4252b346df32bc864

                                              SHA512

                                              0a73dc9a49f92d9dd556c2ca2e36761890b3538f355ee1f013e7cf648d8c4d065f28046cd4a167db3dea304d1fbcbcea68d11ce6e12a3f20f8b6c018a60422d2

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              944B

                                              MD5

                                              4e901e22c098a46473400b6525149b8c

                                              SHA1

                                              9e309acff6d0f7667809eecb9c5a50f55f4a1adb

                                              SHA256

                                              9d447446c558bd52a6cd2cb087d9d8b3fac348a4c947ecc6c287b8314c8ddef0

                                              SHA512

                                              b85345bcb0982f9911b077d72aba0f7b2a77c42912a4ecd8050025d72148d4578f43193b5ef0c916cb6171bed491e23c0d10e621ead9461ae49e575cacb8e0bc

                                            • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                                              Filesize

                                              10KB

                                              MD5

                                              3c5aed9aec62190893fc7d066893797f

                                              SHA1

                                              50ec964d7b60675d41999de7f2cc97ec009cf8c3

                                              SHA256

                                              e3a229e0f021e194bb42de44b6a250e46838b95c970e4e7852d6fe9652444297

                                              SHA512

                                              a542c377a10d07ccc106520d5411cc4888c5a9330723b7c0612f7dae687faafb0d7372dd556e3d3daf9909aad2aaab23ddec2820bf753669d882782d7e399406

                                            • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                                              Filesize

                                              10KB

                                              MD5

                                              6b7a0ed22a4f1803242f9b21b510c3d9

                                              SHA1

                                              fadbafe24ad0253ea956992074b43282852d4ec6

                                              SHA256

                                              9ada689e351bbfb2559450fb0f5549e45ee6c4255ca68f27b4b369772e33e9f0

                                              SHA512

                                              b501a8dbc98977ca09e1bfbc713c4d41134f76cca1b43e9390ab95c273b8a6b716721c5dcb178f6bae448205d292722a0d0a4c4c04c4a3c204fd70af0cfc2b5f

                                            • C:\Users\Admin\AppData\Local\Temp\All-In-One.exe

                                              Filesize

                                              5.1MB

                                              MD5

                                              a48e3197ab0f64c4684f0828f742165c

                                              SHA1

                                              f935c3d6f9601c795f2211e34b3778fad14442b4

                                              SHA256

                                              baecc747370a4c396ef5403a3a2b286465d8fe4677bf1bfd23b8164ef5c22bbb

                                              SHA512

                                              e0b0b73c39850a30aac89f84f721c79f863612f596d6ff3df0860a9faf743a81364656773c99708e9c0656c74b6a278b6bf7e648f7ff1b9080f9a21e10515a59

                                            • C:\Users\Admin\AppData\Local\Temp\All-In-One.exe

                                              Filesize

                                              5.1MB

                                              MD5

                                              a48e3197ab0f64c4684f0828f742165c

                                              SHA1

                                              f935c3d6f9601c795f2211e34b3778fad14442b4

                                              SHA256

                                              baecc747370a4c396ef5403a3a2b286465d8fe4677bf1bfd23b8164ef5c22bbb

                                              SHA512

                                              e0b0b73c39850a30aac89f84f721c79f863612f596d6ff3df0860a9faf743a81364656773c99708e9c0656c74b6a278b6bf7e648f7ff1b9080f9a21e10515a59

                                            • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-conio-l1-1-0_not.dll

                                              Filesize

                                              18KB

                                              MD5

                                              6ea692f862bdeb446e649e4b2893e36f

                                              SHA1

                                              84fceae03d28ff1907048acee7eae7e45baaf2bd

                                              SHA256

                                              9ca21763c528584bdb4efebe914faaf792c9d7360677c87e93bd7ba7bb4367f2

                                              SHA512

                                              9661c135f50000e0018b3e5c119515cfe977b2f5f88b0f5715e29df10517b196c81694d074398c99a572a971ec843b3676d6a831714ab632645ed25959d5e3e7

                                            • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-convert-l1-1-0.dll

                                              Filesize

                                              21KB

                                              MD5

                                              72e28c902cd947f9a3425b19ac5a64bd

                                              SHA1

                                              9b97f7a43d43cb0f1b87fc75fef7d9eeea11e6f7

                                              SHA256

                                              3cc1377d495260c380e8d225e5ee889cbb2ed22e79862d4278cfa898e58e44d1

                                              SHA512

                                              58ab6fedce2f8ee0970894273886cb20b10d92979b21cda97ae0c41d0676cc0cd90691c58b223bce5f338e0718d1716e6ce59a106901fe9706f85c3acf7855ff

                                            • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-environment-l1-1-0.dll

                                              Filesize

                                              18KB

                                              MD5

                                              ac290dad7cb4ca2d93516580452eda1c

                                              SHA1

                                              fa949453557d0049d723f9615e4f390010520eda

                                              SHA256

                                              c0d75d1887c32a1b1006b3cffc29df84a0d73c435cdcb404b6964be176a61382

                                              SHA512

                                              b5e2b9f5a9dd8a482169c7fc05f018ad8fe6ae27cb6540e67679272698bfca24b2ca5a377fa61897f328b3deac10237cafbd73bc965bf9055765923aba9478f8

                                            • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-filesystem-l1-1-0.dll

                                              Filesize

                                              19KB

                                              MD5

                                              aec2268601470050e62cb8066dd41a59

                                              SHA1

                                              363ed259905442c4e3b89901bfd8a43b96bf25e4

                                              SHA256

                                              7633774effe7c0add6752ffe90104d633fc8262c87871d096c2fc07c20018ed2

                                              SHA512

                                              0c14d160bfa3ac52c35ff2f2813b85f8212c5f3afbcfe71a60ccc2b9e61e51736f0bf37ca1f9975b28968790ea62ed5924fae4654182f67114bd20d8466c4b8f

                                            • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-heap-l1-1-0.dll

                                              Filesize

                                              18KB

                                              MD5

                                              93d3da06bf894f4fa21007bee06b5e7d

                                              SHA1

                                              1e47230a7ebcfaf643087a1929a385e0d554ad15

                                              SHA256

                                              f5cf623ba14b017af4aec6c15eee446c647ab6d2a5dee9d6975adc69994a113d

                                              SHA512

                                              72bd6d46a464de74a8dac4c346c52d068116910587b1c7b97978df888925216958ce77be1ae049c3dccf5bf3fffb21bc41a0ac329622bc9bbc190df63abb25c6

                                            • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-locale-l1-1-0.dll

                                              Filesize

                                              18KB

                                              MD5

                                              a2f2258c32e3ba9abf9e9e38ef7da8c9

                                              SHA1

                                              116846ca871114b7c54148ab2d968f364da6142f

                                              SHA256

                                              565a2eec5449eeeed68b430f2e9b92507f979174f9c9a71d0c36d58b96051c33

                                              SHA512

                                              e98cbc8d958e604effa614a3964b3d66b6fc646bdca9aa679ea5e4eb92ec0497b91485a40742f3471f4ff10de83122331699edc56a50f06ae86f21fad70953fe

                                            • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-math-l1-1-0.dll

                                              Filesize

                                              28KB

                                              MD5

                                              8b0ba750e7b15300482ce6c961a932f0

                                              SHA1

                                              71a2f5d76d23e48cef8f258eaad63e586cfc0e19

                                              SHA256

                                              bece7bab83a5d0ec5c35f0841cbbf413e01ac878550fbdb34816ed55185dcfed

                                              SHA512

                                              fb646cdcdb462a347ed843312418f037f3212b2481f3897a16c22446824149ee96eb4a4b47a903ca27b1f4d7a352605d4930df73092c380e3d4d77ce4e972c5a

                                            • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-multibyte-l1-1-0.dll

                                              Filesize

                                              25KB

                                              MD5

                                              35fc66bd813d0f126883e695664e7b83

                                              SHA1

                                              2fd63c18cc5dc4defc7ea82f421050e668f68548

                                              SHA256

                                              66abf3a1147751c95689f5bc6a259e55281ec3d06d3332dd0ba464effa716735

                                              SHA512

                                              65f8397de5c48d3df8ad79baf46c1d3a0761f727e918ae63612ea37d96adf16cc76d70d454a599f37f9ba9b4e2e38ebc845df4c74fc1e1131720fd0dcb881431

                                            • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-runtime-l1-1-0.dll

                                              Filesize

                                              22KB

                                              MD5

                                              41a348f9bedc8681fb30fa78e45edb24

                                              SHA1

                                              66e76c0574a549f293323dd6f863a8a5b54f3f9b

                                              SHA256

                                              c9bbc07a033bab6a828ecc30648b501121586f6f53346b1cd0649d7b648ea60b

                                              SHA512

                                              8c2cb53ccf9719de87ee65ed2e1947e266ec7e8343246def6429c6df0dc514079f5171acd1aa637276256c607f1063144494b992d4635b01e09ddea6f5eef204

                                            • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-stdio-l1-1-0.dll

                                              Filesize

                                              23KB

                                              MD5

                                              fefb98394cb9ef4368da798deab00e21

                                              SHA1

                                              316d86926b558c9f3f6133739c1a8477b9e60740

                                              SHA256

                                              b1e702b840aebe2e9244cd41512d158a43e6e9516cd2015a84eb962fa3ff0df7

                                              SHA512

                                              57476fe9b546e4cafb1ef4fd1cbd757385ba2d445d1785987afb46298acbe4b05266a0c4325868bc4245c2f41e7e2553585bfb5c70910e687f57dac6a8e911e8

                                            • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-string-l1-1-0.dll

                                              Filesize

                                              22KB

                                              MD5

                                              404604cd100a1e60dfdaf6ecf5ba14c0

                                              SHA1

                                              58469835ab4b916927b3cabf54aee4f380ff6748

                                              SHA256

                                              73cc56f20268bfb329ccd891822e2e70dd70fe21fc7101deb3fa30c34a08450c

                                              SHA512

                                              da024ccb50d4a2a5355b7712ba896df850cee57aa4ada33aad0bae6960bcd1e5e3cee9488371ab6e19a2073508fbb3f0b257382713a31bc0947a4bf1f7a20be4

                                            • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-time-l1-1-0.dll

                                              Filesize

                                              20KB

                                              MD5

                                              849f2c3ebf1fcba33d16153692d5810f

                                              SHA1

                                              1f8eda52d31512ebfdd546be60990b95c8e28bfb

                                              SHA256

                                              69885fd581641b4a680846f93c2dd21e5dd8e3ba37409783bc5b3160a919cb5d

                                              SHA512

                                              44dc4200a653363c9a1cb2bdd3da5f371f7d1fb644d1ce2ff5fe57d939b35130ac8ae27a3f07b82b3428233f07f974628027b0e6b6f70f7b2a8d259be95222f5

                                            • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-utility-l1-1-0.dll

                                              Filesize

                                              18KB

                                              MD5

                                              b52a0ca52c9c207874639b62b6082242

                                              SHA1

                                              6fb845d6a82102ff74bd35f42a2844d8c450413b

                                              SHA256

                                              a1d1d6b0cb0a8421d7c0d1297c4c389c95514493cd0a386b49dc517ac1b9a2b0

                                              SHA512

                                              18834d89376d703bd461edf7738eb723ad8d54cb92acc9b6f10cbb55d63db22c2a0f2f3067fe2cc6feb775db397030606608ff791a46bf048016a1333028d0a4

                                            • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\freebl3.dll

                                              Filesize

                                              324KB

                                              MD5

                                              04a2ba08eb17206b7426cb941f39250b

                                              SHA1

                                              731ac2b533724d9f540759d84b3e36910278edba

                                              SHA256

                                              8e5110ce03826f680f30013985be49ebd8fc672de113fc1d9a566eced149b8c4

                                              SHA512

                                              e6e90b4becf472b2e8f716dbb962cd7de61676fcce342c735fccdc01268b5a221139bc9be0e0c9722e9978aefaae79c10bc49c43392aa05dd12244b3147aeffc

                                            • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\mozglue.dll

                                              Filesize

                                              135KB

                                              MD5

                                              591533ca4655646981f759d95f75ae3d

                                              SHA1

                                              b4a02f18e505a1273f7090a9d246bc953a2cb792

                                              SHA256

                                              4434f4223d24fb6e2f5840dd6c1eedef2875e11abe24e4b0e9bc1507f8f6fd47

                                              SHA512

                                              915b124ad595ee78feab8f3c9be7e80155445e58ed4c88b89665df5fb7e0a04e973374a01f97bb67aaa733a8ce2e91a9f92605ec96251906e0fb2750a719b579

                                            • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\msvcp140.dll

                                              Filesize

                                              429KB

                                              MD5

                                              109f0f02fd37c84bfc7508d4227d7ed5

                                              SHA1

                                              ef7420141bb15ac334d3964082361a460bfdb975

                                              SHA256

                                              334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

                                              SHA512

                                              46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

                                            • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\nss3.dll

                                              Filesize

                                              1.2MB

                                              MD5

                                              fc57d044bfd635997415c5f655b5fffa

                                              SHA1

                                              1b5162443d985648ef64e4aab42089ad4c25f856

                                              SHA256

                                              17f8c55eba797bbc80c8c32ca1a3a7588415984386be56f4b4cdefd4176fb4c3

                                              SHA512

                                              f5a944230000730bc0aad10e6607e3389d9d82a0a4ab1b72a19d32e94e8572789d46fb4acd75ad48f17e2bbc27389d432086696f2ccc899850ff9177d6823efb

                                            • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\softokn3.dll

                                              Filesize

                                              140KB

                                              MD5

                                              1b304dad157edc24e397629c0b688a3e

                                              SHA1

                                              ae151af384675125dfbdc96147094cff7179b7da

                                              SHA256

                                              8f0c9ac7134773d11d402e49daa90958fe00205e83a7389f7a58da03892d20cb

                                              SHA512

                                              2dc625dbdf2aae4ade600cca688eb5280200e8d7c2dfc359590435afe0926b3a7446cc56a66023ee834366132a68ae68da51a5079e4f107201e2050f5c5512ad

                                            • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\vcruntime140.dll

                                              Filesize

                                              81KB

                                              MD5

                                              7587bf9cb4147022cd5681b015183046

                                              SHA1

                                              f2106306a8f6f0da5afb7fc765cfa0757ad5a628

                                              SHA256

                                              c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

                                              SHA512

                                              0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

                                            • C:\Users\Admin\AppData\Local\Temp\External\Components\nspr4.dll

                                              Filesize

                                              72KB

                                              MD5

                                              72414dfb0b112c664d2c8d1215674e09

                                              SHA1

                                              50a1e61309741e92fe3931d8eb606f8ada582c0a

                                              SHA256

                                              69e73fea2210adc2ae0837ac98b46980a09fe91c07f181a28fda195e2b9e6b71

                                              SHA512

                                              41428624573b4a191b33657ed9ad760b500c5640f3d62b758869a17857edc68f90bc10d7a5e720029519c0d49b5ca0fa8579743e80b200ef331e41efde1dc8c9

                                            • C:\Users\Admin\AppData\Local\Temp\External\Components\nss3.dll

                                              Filesize

                                              172KB

                                              MD5

                                              7ddbd64d87c94fd0b5914688093dd5c2

                                              SHA1

                                              d49d1f79efae8a5f58e6f713e43360117589efeb

                                              SHA256

                                              769703fb1ba6c95fb6c889e8a9baaea309e62d0f3ca444d01cc6b495c0f722d1

                                              SHA512

                                              60eaad58c3c4894f1673723eb28ddb42b681ff7aafe7a29ff8bf87a2da6595c16d1f8449096accdb89bd6cda6454eb90470e71dde7c5bd16abd0f80e115cfa2d

                                            • C:\Users\Admin\AppData\Local\Temp\External\Components\plc4.dll

                                              Filesize

                                              8KB

                                              MD5

                                              c73ec58b42e66443fafc03f3a84dcef9

                                              SHA1

                                              5e91f467fe853da2c437f887162bccc6fd9d9dbe

                                              SHA256

                                              2dc0171b83c406db6ec9389b438828246b282862d2b8bdf2f5b75aec932a69f7

                                              SHA512

                                              6318e831d8f38525e2e49b5a1661440cd8b1f3d2afc6813bb862c21d88d213c4675a8ec2a413b14fbdca896c63b65a7da6ec9595893b352ade8979e7e86a7fcf

                                            • C:\Users\Admin\AppData\Local\Temp\External\Components\plds4.dll

                                              Filesize

                                              6KB

                                              MD5

                                              ee44d5d780521816c906568a8798ed2f

                                              SHA1

                                              2da1b06d5de378cbfc7f2614a0f280f59f2b1224

                                              SHA256

                                              50b2735318233d6c87b6efccccc23a0e3216d2870c67f2f193cc1c83c7c879fc

                                              SHA512

                                              634a1cd2baaef29b4fe7c7583c04406bb2ea3a3c93294b31f621652844541e7c549da1a31619f657207327604c261976e15845571ee1efe5416f1b021d361da8

                                            • C:\Users\Admin\AppData\Local\Temp\External\Components\softokn3.dll

                                              Filesize

                                              155KB

                                              MD5

                                              e846285b19405b11c8f19c1ed0a57292

                                              SHA1

                                              2c20cf37394be48770cd6d396878a3ca70066fd0

                                              SHA256

                                              251f0094b6b6537df3d3ce7c2663726616f06cfb9b6de90efabd67de2179a477

                                              SHA512

                                              b622ff07ae2f77e886a93987a9a922e80032e9041ed41503f0e38abb8c344eb922d154ade29e52454d0a1ad31596c4085f4bd942e4412af9f0698183acd75db7

                                            • C:\Users\Admin\AppData\Local\Temp\License.XenArmor

                                              Filesize

                                              104B

                                              MD5

                                              774a9a7b72f7ed97905076523bdfe603

                                              SHA1

                                              946355308d2224694e0957f4ebf6cdba58327370

                                              SHA256

                                              76e56835b1ac5d7a8409b7333826a2353401cf67f3bd95c733adc6aa8d9fec81

                                              SHA512

                                              c5c77c6827c72901494b3a368593cb9a990451664b082761294a845c0cd9441d37e5e9ac0e82155cb4d97f29507ffc8e26d6ff74009666c3075578aa18b28675

                                            • C:\Users\Admin\AppData\Local\Temp\License.XenArmor

                                              Filesize

                                              104B

                                              MD5

                                              774a9a7b72f7ed97905076523bdfe603

                                              SHA1

                                              946355308d2224694e0957f4ebf6cdba58327370

                                              SHA256

                                              76e56835b1ac5d7a8409b7333826a2353401cf67f3bd95c733adc6aa8d9fec81

                                              SHA512

                                              c5c77c6827c72901494b3a368593cb9a990451664b082761294a845c0cd9441d37e5e9ac0e82155cb4d97f29507ffc8e26d6ff74009666c3075578aa18b28675

                                            • C:\Users\Admin\AppData\Local\Temp\OutPut.json

                                              Filesize

                                              59B

                                              MD5

                                              c5c15e7b1aac854b1e92a4d1c2fb59b6

                                              SHA1

                                              1c10b459171d26546eafac69d5647e744d6002c8

                                              SHA256

                                              c148de684bfb4400bbb5e4239a4e5f28c7b068160de8ad852f7606365ce623a2

                                              SHA512

                                              85be142ac152717148fc5819494457c61b9a2c7b30643a3d98415305b79ade5d3ddb65ce7f6a684ad2973fbad72f5e05409344c0d445fb0e542d352305fdb42f

                                            • C:\Users\Admin\AppData\Local\Temp\XenManager.dll

                                              Filesize

                                              2.0MB

                                              MD5

                                              7a5c53a889c4bf3f773f90b85af5449e

                                              SHA1

                                              25b2928c310b3068b629e9dca38c7f10f6adc5b6

                                              SHA256

                                              baa9c3a0d0524263c4f848056b3f1da3b4bb913162362cbcabe77ce76a39870c

                                              SHA512

                                              f5943687d7e098790581bf56ac6fec3b7e9b83d0e29301077a8bc48768c5a0e9f54f53d926f9847885f6035a2b31e456e4e45ccf1c70be27229c46e79876e2ed

                                            • C:\Users\Admin\AppData\Local\Temp\XenManager.dll

                                              Filesize

                                              2.0MB

                                              MD5

                                              7a5c53a889c4bf3f773f90b85af5449e

                                              SHA1

                                              25b2928c310b3068b629e9dca38c7f10f6adc5b6

                                              SHA256

                                              baa9c3a0d0524263c4f848056b3f1da3b4bb913162362cbcabe77ce76a39870c

                                              SHA512

                                              f5943687d7e098790581bf56ac6fec3b7e9b83d0e29301077a8bc48768c5a0e9f54f53d926f9847885f6035a2b31e456e4e45ccf1c70be27229c46e79876e2ed

                                            • C:\Users\Admin\AppData\Local\Temp\XenManager.dll

                                              Filesize

                                              2.0MB

                                              MD5

                                              7a5c53a889c4bf3f773f90b85af5449e

                                              SHA1

                                              25b2928c310b3068b629e9dca38c7f10f6adc5b6

                                              SHA256

                                              baa9c3a0d0524263c4f848056b3f1da3b4bb913162362cbcabe77ce76a39870c

                                              SHA512

                                              f5943687d7e098790581bf56ac6fec3b7e9b83d0e29301077a8bc48768c5a0e9f54f53d926f9847885f6035a2b31e456e4e45ccf1c70be27229c46e79876e2ed

                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tc5rhac3.jzh.ps1

                                              Filesize

                                              60B

                                              MD5

                                              d17fe0a3f47be24a6453e9ef58c94641

                                              SHA1

                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                              SHA256

                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                              SHA512

                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                            • C:\Users\Admin\AppData\Local\Temp\settings.db

                                              Filesize

                                              20KB

                                              MD5

                                              56b941f65d270f2bf397be196fcf4406

                                              SHA1

                                              244f2e964da92f7ef7f809e5ce0b3191aeab084a

                                              SHA256

                                              00c020ba1cce022364976f164c575993cb3b811c61b5b4e05a8a0c3d1b560c0c

                                              SHA512

                                              52ad8c7ed497a5b8eed565b3abcbf544841f3c8c9ec3ca8f686846a2afd15ac4ac8b16abf1cb14aeca1a2fb31f3086ad17206ec4af28e77bae600dca15e8deab

                                            • C:\Users\Admin\AppData\Local\Temp\settings.db

                                              Filesize

                                              20KB

                                              MD5

                                              56b941f65d270f2bf397be196fcf4406

                                              SHA1

                                              244f2e964da92f7ef7f809e5ce0b3191aeab084a

                                              SHA256

                                              00c020ba1cce022364976f164c575993cb3b811c61b5b4e05a8a0c3d1b560c0c

                                              SHA512

                                              52ad8c7ed497a5b8eed565b3abcbf544841f3c8c9ec3ca8f686846a2afd15ac4ac8b16abf1cb14aeca1a2fb31f3086ad17206ec4af28e77bae600dca15e8deab

                                            • C:\Users\Admin\AppData\Local\Temp\tmpD003.tmp

                                              Filesize

                                              100KB

                                              MD5

                                              1b942faa8e8b1008a8c3c1004ba57349

                                              SHA1

                                              cd99977f6c1819b12b33240b784ca816dfe2cb91

                                              SHA256

                                              555ccb7ecd9ae52a75135fdd81ab443a49d5785b0621ed6468d28c4234e46ccc

                                              SHA512

                                              5aee3d59478d41ddd5885c99b394c9c4983064e2b3528db1a3f7fc289662bced4f57d072517bbe7573c6d1789435e987ef1aa9cc91f372bcfd30bc016675fa43

                                            • C:\Users\Admin\AppData\Local\Temp\tmpD840.tmp.bat

                                              Filesize

                                              159B

                                              MD5

                                              ecb9fa4333fc8b140297ca8fd7ee493f

                                              SHA1

                                              259383196f56442ef8185fa7a5c495f304b93ef3

                                              SHA256

                                              9c1d1dd50fb927ba5e85862a11e9328d6fc4bbf00fcc62c27f045fb2cc69271a

                                              SHA512

                                              0533050d3ba3adec5345c6b8f827320b7d19533ebdedbb00d18b5141f1e5917e5e6d1979d5c3250a273bab1418e3b3147896f8d1e0f5c401144d279531392f91

                                            • C:\Users\Admin\AppData\Roaming\GVClientV4.exe

                                              Filesize

                                              80KB

                                              MD5

                                              687f761162c7f606147b6cb4ec53f1b0

                                              SHA1

                                              c5becf98823cf61fa049da30a9bb74819aa62d75

                                              SHA256

                                              b29fb89932c2a4b8c10a2be6b5c0e5fccbe6f4e9a5eca3562983accd0b4d76c7

                                              SHA512

                                              29d5c802559c8d17d0959983999676f7f4925860ddea9b0e659e8931c2435b82804f02949ac4d8ea65ed1bbe814e731e5161a5170d1e589b79f609585bf82d26

                                            • C:\Users\Admin\AppData\Roaming\GVClientV4.exe

                                              Filesize

                                              80KB

                                              MD5

                                              687f761162c7f606147b6cb4ec53f1b0

                                              SHA1

                                              c5becf98823cf61fa049da30a9bb74819aa62d75

                                              SHA256

                                              b29fb89932c2a4b8c10a2be6b5c0e5fccbe6f4e9a5eca3562983accd0b4d76c7

                                              SHA512

                                              29d5c802559c8d17d0959983999676f7f4925860ddea9b0e659e8931c2435b82804f02949ac4d8ea65ed1bbe814e731e5161a5170d1e589b79f609585bf82d26

                                            • C:\Users\Admin\AppData\Roaming\GVClientV4.exe

                                              Filesize

                                              80KB

                                              MD5

                                              687f761162c7f606147b6cb4ec53f1b0

                                              SHA1

                                              c5becf98823cf61fa049da30a9bb74819aa62d75

                                              SHA256

                                              b29fb89932c2a4b8c10a2be6b5c0e5fccbe6f4e9a5eca3562983accd0b4d76c7

                                              SHA512

                                              29d5c802559c8d17d0959983999676f7f4925860ddea9b0e659e8931c2435b82804f02949ac4d8ea65ed1bbe814e731e5161a5170d1e589b79f609585bf82d26

                                            • C:\Users\Admin\AppData\Roaming\GVClientV4.exe

                                              Filesize

                                              80KB

                                              MD5

                                              687f761162c7f606147b6cb4ec53f1b0

                                              SHA1

                                              c5becf98823cf61fa049da30a9bb74819aa62d75

                                              SHA256

                                              b29fb89932c2a4b8c10a2be6b5c0e5fccbe6f4e9a5eca3562983accd0b4d76c7

                                              SHA512

                                              29d5c802559c8d17d0959983999676f7f4925860ddea9b0e659e8931c2435b82804f02949ac4d8ea65ed1bbe814e731e5161a5170d1e589b79f609585bf82d26

                                            • C:\Users\Admin\AppData\Roaming\GVClientV4.exe

                                              Filesize

                                              80KB

                                              MD5

                                              687f761162c7f606147b6cb4ec53f1b0

                                              SHA1

                                              c5becf98823cf61fa049da30a9bb74819aa62d75

                                              SHA256

                                              b29fb89932c2a4b8c10a2be6b5c0e5fccbe6f4e9a5eca3562983accd0b4d76c7

                                              SHA512

                                              29d5c802559c8d17d0959983999676f7f4925860ddea9b0e659e8931c2435b82804f02949ac4d8ea65ed1bbe814e731e5161a5170d1e589b79f609585bf82d26

                                            • C:\Users\Admin\AppData\Roaming\GVClientV4.exe

                                              Filesize

                                              80KB

                                              MD5

                                              687f761162c7f606147b6cb4ec53f1b0

                                              SHA1

                                              c5becf98823cf61fa049da30a9bb74819aa62d75

                                              SHA256

                                              b29fb89932c2a4b8c10a2be6b5c0e5fccbe6f4e9a5eca3562983accd0b4d76c7

                                              SHA512

                                              29d5c802559c8d17d0959983999676f7f4925860ddea9b0e659e8931c2435b82804f02949ac4d8ea65ed1bbe814e731e5161a5170d1e589b79f609585bf82d26

                                            • C:\Users\Admin\AppData\Roaming\GVClientV4.exe

                                              Filesize

                                              80KB

                                              MD5

                                              687f761162c7f606147b6cb4ec53f1b0

                                              SHA1

                                              c5becf98823cf61fa049da30a9bb74819aa62d75

                                              SHA256

                                              b29fb89932c2a4b8c10a2be6b5c0e5fccbe6f4e9a5eca3562983accd0b4d76c7

                                              SHA512

                                              29d5c802559c8d17d0959983999676f7f4925860ddea9b0e659e8931c2435b82804f02949ac4d8ea65ed1bbe814e731e5161a5170d1e589b79f609585bf82d26

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GVClientV4.lnk

                                              Filesize

                                              788B

                                              MD5

                                              f9bd9e89ee89034aba1af0c513ffb686

                                              SHA1

                                              d281f613d430e2c97307fae29658f28b36d8db71

                                              SHA256

                                              15fc1e8873d6b71fa8ccc2953931894d293eecc5e8f0b47c31967c882e32aeec

                                              SHA512

                                              e64d6ab8d6dd227352e6297e6d203b50ff22af7c7b9e6024f433b6937dd9a226e93adc0fd1a3420bb785012f8d26a80cd35817dfb7ca6641eef880de5e76a413

                                            • C:\Windows\GV Client V4 BETA.exe

                                              Filesize

                                              80KB

                                              MD5

                                              687f761162c7f606147b6cb4ec53f1b0

                                              SHA1

                                              c5becf98823cf61fa049da30a9bb74819aa62d75

                                              SHA256

                                              b29fb89932c2a4b8c10a2be6b5c0e5fccbe6f4e9a5eca3562983accd0b4d76c7

                                              SHA512

                                              29d5c802559c8d17d0959983999676f7f4925860ddea9b0e659e8931c2435b82804f02949ac4d8ea65ed1bbe814e731e5161a5170d1e589b79f609585bf82d26

                                            • C:\Windows\GV Client V4 BETA.exe

                                              Filesize

                                              80KB

                                              MD5

                                              687f761162c7f606147b6cb4ec53f1b0

                                              SHA1

                                              c5becf98823cf61fa049da30a9bb74819aa62d75

                                              SHA256

                                              b29fb89932c2a4b8c10a2be6b5c0e5fccbe6f4e9a5eca3562983accd0b4d76c7

                                              SHA512

                                              29d5c802559c8d17d0959983999676f7f4925860ddea9b0e659e8931c2435b82804f02949ac4d8ea65ed1bbe814e731e5161a5170d1e589b79f609585bf82d26

                                            • C:\Windows\GV Client V4 BETA.exe

                                              Filesize

                                              80KB

                                              MD5

                                              687f761162c7f606147b6cb4ec53f1b0

                                              SHA1

                                              c5becf98823cf61fa049da30a9bb74819aa62d75

                                              SHA256

                                              b29fb89932c2a4b8c10a2be6b5c0e5fccbe6f4e9a5eca3562983accd0b4d76c7

                                              SHA512

                                              29d5c802559c8d17d0959983999676f7f4925860ddea9b0e659e8931c2435b82804f02949ac4d8ea65ed1bbe814e731e5161a5170d1e589b79f609585bf82d26

                                            • \??\pipe\LOCAL\crashpad_1912_FIHJBLOZAZHVBMGZ

                                              MD5

                                              d41d8cd98f00b204e9800998ecf8427e

                                              SHA1

                                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                                              SHA256

                                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                              SHA512

                                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                            • memory/1020-157-0x00007FFA88A70000-0x00007FFA89532000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/1020-155-0x00007FFA88A70000-0x00007FFA89532000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/1532-70-0x00000000076A0000-0x00000000076AA000-memory.dmp

                                              Filesize

                                              40KB

                                            • memory/1532-57-0x00000000074E0000-0x0000000007584000-memory.dmp

                                              Filesize

                                              656KB

                                            • memory/1532-127-0x0000000074510000-0x0000000074CC1000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/1532-120-0x000000007F580000-0x000000007F590000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/1532-13-0x0000000004E20000-0x0000000004E56000-memory.dmp

                                              Filesize

                                              216KB

                                            • memory/1532-105-0x0000000007960000-0x000000000797A000-memory.dmp

                                              Filesize

                                              104KB

                                            • memory/1532-103-0x0000000007870000-0x0000000007885000-memory.dmp

                                              Filesize

                                              84KB

                                            • memory/1532-14-0x0000000074510000-0x0000000074CC1000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/1532-16-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/1532-17-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/1532-101-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/1532-15-0x0000000005490000-0x0000000005ABA000-memory.dmp

                                              Filesize

                                              6.2MB

                                            • memory/1532-119-0x0000000007950000-0x0000000007958000-memory.dmp

                                              Filesize

                                              32KB

                                            • memory/1532-18-0x0000000005420000-0x0000000005442000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/1532-99-0x0000000007860000-0x000000000786E000-memory.dmp

                                              Filesize

                                              56KB

                                            • memory/1532-19-0x0000000005CF0000-0x0000000005D56000-memory.dmp

                                              Filesize

                                              408KB

                                            • memory/1532-20-0x0000000005DD0000-0x0000000005E36000-memory.dmp

                                              Filesize

                                              408KB

                                            • memory/1532-29-0x0000000005ED0000-0x0000000006227000-memory.dmp

                                              Filesize

                                              3.3MB

                                            • memory/1532-30-0x00000000062D0000-0x00000000062EE000-memory.dmp

                                              Filesize

                                              120KB

                                            • memory/1532-84-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/1532-82-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/1532-81-0x0000000007820000-0x0000000007831000-memory.dmp

                                              Filesize

                                              68KB

                                            • memory/1532-79-0x00000000078A0000-0x0000000007936000-memory.dmp

                                              Filesize

                                              600KB

                                            • memory/1532-31-0x0000000006300000-0x000000000634C000-memory.dmp

                                              Filesize

                                              304KB

                                            • memory/1532-45-0x000000007F580000-0x000000007F590000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/1532-46-0x00000000072A0000-0x00000000072D4000-memory.dmp

                                              Filesize

                                              208KB

                                            • memory/1532-47-0x0000000070700000-0x000000007074C000-memory.dmp

                                              Filesize

                                              304KB

                                            • memory/1532-66-0x0000000074510000-0x0000000074CC1000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/1532-56-0x00000000068A0000-0x00000000068BE000-memory.dmp

                                              Filesize

                                              120KB

                                            • memory/1532-63-0x0000000007610000-0x000000000762A000-memory.dmp

                                              Filesize

                                              104KB

                                            • memory/1532-62-0x0000000007C50000-0x00000000082CA000-memory.dmp

                                              Filesize

                                              6.5MB

                                            • memory/1756-60-0x00007FFA88A70000-0x00007FFA89532000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/1756-159-0x0000000002A10000-0x0000000002A1E000-memory.dmp

                                              Filesize

                                              56KB

                                            • memory/1756-11-0x0000000000840000-0x000000000085A000-memory.dmp

                                              Filesize

                                              104KB

                                            • memory/1756-12-0x00007FFA88A70000-0x00007FFA89532000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/1756-273-0x000000001B6B0000-0x000000001B6BC000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/1756-92-0x0000000001180000-0x0000000001190000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/1756-32-0x0000000001180000-0x0000000001190000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/1832-106-0x00007FFA88A70000-0x00007FFA89532000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/1832-102-0x0000026CB68E0000-0x0000026CB68F0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/1832-100-0x0000026CB68E0000-0x0000026CB68F0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/1832-98-0x0000026CB68E0000-0x0000026CB68F0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/1832-97-0x00007FFA88A70000-0x00007FFA89532000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/2092-202-0x00007FFA88A70000-0x00007FFA89532000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/2092-240-0x00007FFA88A70000-0x00007FFA89532000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/2448-39-0x000001E335670000-0x000001E335692000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/2448-33-0x00007FFA88A70000-0x00007FFA89532000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/2448-61-0x000001E31B7B0000-0x000001E31B7C0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2448-64-0x00007FFA88A70000-0x00007FFA89532000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/2448-44-0x000001E31B7B0000-0x000001E31B7C0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2448-43-0x000001E31B7B0000-0x000001E31B7C0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3380-107-0x00007FFA88A70000-0x00007FFA89532000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/3380-117-0x000001A5E3030000-0x000001A5E3040000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3380-158-0x000001A5E3030000-0x000001A5E3040000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3380-123-0x00007FFA88A70000-0x00007FFA89532000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/3380-116-0x000001A5E3030000-0x000001A5E3040000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3380-121-0x000001A5E3030000-0x000001A5E3040000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/4836-67-0x00007FFA88A70000-0x00007FFA89532000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/4836-69-0x00000180DD980000-0x00000180DD990000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/4836-85-0x00000180DD980000-0x00000180DD990000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/4836-86-0x00007FFA88A70000-0x00007FFA89532000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/4836-68-0x00000180DD980000-0x00000180DD990000-memory.dmp

                                              Filesize

                                              64KB