Analysis

  • max time kernel
    268s
  • max time network
    272s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-04-2024 15:04

General

  • Target

    https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqa1c2b1ZPcm1jdTg2aERQcHJlbHdfR0FKREpOd3xBQ3Jtc0trWmpLUVNNOWJOd0E2bUFyX3pzUmhHQWl1dE03aHpHOFE0RG9nS1hMcnhJWjhVcS1sRHN0TncyV2RpR25QRWRMSzU5QzVOd2c3RmxDWTN5MU9mcGVfQjlBeUw0blBVQ2s5TUwtc1diamtteGxoLUE4dw&q=https%3A%2F%2Fthebusssoftsdownload.framer.website%2F&v=xyZmIFZ9MI8

Malware Config

Extracted

Family

lumma

C2

https://alcojoldwograpciw.shop/api

https://productivelookewr.shop/api

https://tolerateilusidjukl.shop/api

https://shatterbreathepsw.shop/api

https://shortsvelventysjo.shop/api

https://incredibleextedwj.shop/api

https://liabilitynighstjsko.shop/api

https://demonstationfukewko.shop/api

Signatures

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 6 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 57 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqa1c2b1ZPcm1jdTg2aERQcHJlbHdfR0FKREpOd3xBQ3Jtc0trWmpLUVNNOWJOd0E2bUFyX3pzUmhHQWl1dE03aHpHOFE0RG9nS1hMcnhJWjhVcS1sRHN0TncyV2RpR25QRWRMSzU5QzVOd2c3RmxDWTN5MU9mcGVfQjlBeUw0blBVQ2s5TUwtc1diamtteGxoLUE4dw&q=https%3A%2F%2Fthebusssoftsdownload.framer.website%2F&v=xyZmIFZ9MI8
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff871a2ab58,0x7ff871a2ab68,0x7ff871a2ab78
      2⤵
        PID:1792
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1600 --field-trial-handle=1892,i,13168152242030681990,7180195741739272693,131072 /prefetch:2
        2⤵
          PID:2224
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1892,i,13168152242030681990,7180195741739272693,131072 /prefetch:8
          2⤵
            PID:3456
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2224 --field-trial-handle=1892,i,13168152242030681990,7180195741739272693,131072 /prefetch:8
            2⤵
              PID:2624
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3036 --field-trial-handle=1892,i,13168152242030681990,7180195741739272693,131072 /prefetch:1
              2⤵
                PID:532
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1892,i,13168152242030681990,7180195741739272693,131072 /prefetch:1
                2⤵
                  PID:3016
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4412 --field-trial-handle=1892,i,13168152242030681990,7180195741739272693,131072 /prefetch:8
                  2⤵
                    PID:4328
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4536 --field-trial-handle=1892,i,13168152242030681990,7180195741739272693,131072 /prefetch:8
                    2⤵
                      PID:852
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4576 --field-trial-handle=1892,i,13168152242030681990,7180195741739272693,131072 /prefetch:1
                      2⤵
                        PID:264
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=1852 --field-trial-handle=1892,i,13168152242030681990,7180195741739272693,131072 /prefetch:1
                        2⤵
                          PID:4460
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 --field-trial-handle=1892,i,13168152242030681990,7180195741739272693,131072 /prefetch:8
                          2⤵
                            PID:2232
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5112 --field-trial-handle=1892,i,13168152242030681990,7180195741739272693,131072 /prefetch:1
                            2⤵
                              PID:2852
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4912 --field-trial-handle=1892,i,13168152242030681990,7180195741739272693,131072 /prefetch:1
                              2⤵
                                PID:4280
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 --field-trial-handle=1892,i,13168152242030681990,7180195741739272693,131072 /prefetch:8
                                2⤵
                                  PID:4608
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5508 --field-trial-handle=1892,i,13168152242030681990,7180195741739272693,131072 /prefetch:1
                                  2⤵
                                    PID:1180
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 --field-trial-handle=1892,i,13168152242030681990,7180195741739272693,131072 /prefetch:8
                                    2⤵
                                      PID:1768
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=6024 --field-trial-handle=1892,i,13168152242030681990,7180195741739272693,131072 /prefetch:1
                                      2⤵
                                        PID:2252
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6140 --field-trial-handle=1892,i,13168152242030681990,7180195741739272693,131072 /prefetch:8
                                        2⤵
                                          PID:1372
                                      • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                                        "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                                        1⤵
                                          PID:2232
                                        • C:\Windows\System32\rundll32.exe
                                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                          1⤵
                                            PID:536
                                          • C:\Program Files\7-Zip\7zFM.exe
                                            "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\Launcher.zip"
                                            1⤵
                                            • Suspicious behavior: GetForegroundWindowSpam
                                            • Suspicious use of FindShellTrayWindow
                                            PID:1548
                                          • C:\Program Files\7-Zip\7zFM.exe
                                            "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\Roblox Hacks\Launcher.exe"
                                            1⤵
                                            • Suspicious behavior: GetForegroundWindowSpam
                                            • Suspicious use of FindShellTrayWindow
                                            PID:440
                                          • C:\Program Files\7-Zip\7zFM.exe
                                            "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\Roblox Hacks\d3dcompiler_47.dll"
                                            1⤵
                                            • Suspicious use of FindShellTrayWindow
                                            PID:4800
                                          • C:\Program Files\7-Zip\7zFM.exe
                                            "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\Roblox Hacks\libG1LESv2.dll"
                                            1⤵
                                            • Suspicious use of FindShellTrayWindow
                                            PID:4464
                                          • C:\Program Files\7-Zip\7zFM.exe
                                            "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\Roblox Hacks\resources\d3dcompiler_47.dll"
                                            1⤵
                                            • Suspicious use of FindShellTrayWindow
                                            PID:4272
                                          • C:\Program Files\7-Zip\7zFM.exe
                                            "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\Roblox Hacks\resources\ffmpeg.dll"
                                            1⤵
                                            • Modifies registry class
                                            • Suspicious behavior: GetForegroundWindowSpam
                                            • Suspicious use of FindShellTrayWindow
                                            PID:1044
                                          • C:\Windows\system32\OpenWith.exe
                                            C:\Windows\system32\OpenWith.exe -Embedding
                                            1⤵
                                            • Modifies registry class
                                            • Suspicious use of SetWindowsHookEx
                                            PID:5092
                                          • C:\Program Files\7-Zip\7zFM.exe
                                            "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\Roblox Hacks\resources\app.asar"
                                            1⤵
                                            • Suspicious use of FindShellTrayWindow
                                            PID:4552
                                          • C:\Users\Admin\Desktop\Roblox Hacks\Launcher.exe
                                            "C:\Users\Admin\Desktop\Roblox Hacks\Launcher.exe"
                                            1⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetThreadContext
                                            PID:808
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                              2⤵
                                              • Checks computer location settings
                                              • Accesses Microsoft Outlook profiles
                                              • Adds Run key to start application
                                              • Checks processor information in registry
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:3544
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV70_aad77e59497e37c65f6f24e55c3a59ca\MSIUpdaterV70.exe" /tn "MSIUpdaterV70_aad77e59497e37c65f6f24e55c3a59ca HR" /sc HOURLY /rl HIGHEST
                                                3⤵
                                                • Creates scheduled task(s)
                                                PID:3352
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV70_aad77e59497e37c65f6f24e55c3a59ca\MSIUpdaterV70.exe" /tn "MSIUpdaterV70_aad77e59497e37c65f6f24e55c3a59ca LG" /sc ONLOGON /rl HIGHEST
                                                3⤵
                                                • Creates scheduled task(s)
                                                PID:4980
                                              • C:\Users\Admin\AppData\Local\Temp\spannKufDKFjLvVn\QMEtlToQ2omFqoxMCwt4.exe
                                                "C:\Users\Admin\AppData\Local\Temp\spannKufDKFjLvVn\QMEtlToQ2omFqoxMCwt4.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetThreadContext
                                                PID:2300
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                  4⤵
                                                    PID:1700
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                    4⤵
                                                      PID:2408
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 584
                                                      4⤵
                                                      • Program crash
                                                      PID:5076
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV70_93c4750d07be7885c8f839a66372e48f\MSIUpdaterV70.exe" /tn "MSIUpdaterV70_93c4750d07be7885c8f839a66372e48f HR" /sc HOURLY /rl HIGHEST
                                                    3⤵
                                                    • Creates scheduled task(s)
                                                    PID:2284
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV70_93c4750d07be7885c8f839a66372e48f\MSIUpdaterV70.exe" /tn "MSIUpdaterV70_93c4750d07be7885c8f839a66372e48f LG" /sc ONLOGON /rl HIGHEST
                                                    3⤵
                                                    • Creates scheduled task(s)
                                                    PID:4012
                                                  • C:\Users\Admin\AppData\Local\Temp\spannKufDKFjLvVn\UKrsHwAZTrkXZfCXrBGg.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\spannKufDKFjLvVn\UKrsHwAZTrkXZfCXrBGg.exe"
                                                    3⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetThreadContext
                                                    PID:5012
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                      4⤵
                                                        PID:4432
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                        4⤵
                                                          PID:808
                                                  • C:\Users\Admin\Desktop\Roblox Hacks\Launcher.exe
                                                    "C:\Users\Admin\Desktop\Roblox Hacks\Launcher.exe"
                                                    1⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetThreadContext
                                                    PID:4892
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                      2⤵
                                                        PID:2052
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                        2⤵
                                                        • Checks computer location settings
                                                        • Accesses Microsoft Outlook profiles
                                                        • Checks processor information in registry
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • outlook_office_path
                                                        • outlook_win_path
                                                        PID:3632
                                                        • C:\Users\Admin\AppData\Local\Temp\spantYtSfz4oOsoB\6ccY0weN5HHWdRpnofal.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\spantYtSfz4oOsoB\6ccY0weN5HHWdRpnofal.exe"
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetThreadContext
                                                          PID:3464
                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                            4⤵
                                                              PID:3676
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 564
                                                              4⤵
                                                              • Program crash
                                                              PID:3948
                                                          • C:\Users\Admin\AppData\Local\Temp\spantYtSfz4oOsoB\eCRB7WG9dQiKzC5zOBkb.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\spantYtSfz4oOsoB\eCRB7WG9dQiKzC5zOBkb.exe"
                                                            3⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetThreadContext
                                                            PID:2920
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                              4⤵
                                                                PID:536
                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                4⤵
                                                                  PID:2928
                                                          • C:\Users\Admin\Desktop\Roblox Hacks\Launcher.exe
                                                            "C:\Users\Admin\Desktop\Roblox Hacks\Launcher.exe"
                                                            1⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetThreadContext
                                                            PID:3788
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                              2⤵
                                                                PID:3028
                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                2⤵
                                                                  PID:3972
                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                  2⤵
                                                                    PID:4080
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2300 -ip 2300
                                                                  1⤵
                                                                    PID:964
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3464 -ip 3464
                                                                    1⤵
                                                                      PID:3016

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                                      Filesize

                                                                      40B

                                                                      MD5

                                                                      6123155f7b8a202460ac1407e231fbf4

                                                                      SHA1

                                                                      13121f6000a380f6621bcb8dc7c83f9cd10ab626

                                                                      SHA256

                                                                      dc3766fd1d9f14e305d5483a9e886548c3ff3ad2d8497e26a04c6d8c31e7be6c

                                                                      SHA512

                                                                      ef2e48a3517f58cf068d2ed9e202ba4d2a54afdccd4937c74b5c84d5c4fd47d9b92ddcf3b842a102b426dccae53ab3bc9e571a5cf27cb315be4dc58bdaad34cf

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      50ec2d22160c3affd80951c7a5df5f4a

                                                                      SHA1

                                                                      c023e98821a60f1dc1ec89bae6cb3e49811beedd

                                                                      SHA256

                                                                      50c40f8499767a6382c939d2f6a7e345bfe227c5f15a8e81ca8ca8a3e1b21580

                                                                      SHA512

                                                                      c7b7eb6eb2419f1609a4c8428c6ff229268d75400611e47ce314eec9b07fe4eedbd50b40544dfc5e9f660183b0fd67c0be98941da3848c263184e9115ba7be97

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                      Filesize

                                                                      168B

                                                                      MD5

                                                                      f2aeef1fcdf046999e1ddef3b61318e7

                                                                      SHA1

                                                                      44e27a280b2753699a28ecbe94816c31dfca4f9b

                                                                      SHA256

                                                                      4040ddc80ef5ee0632f703af702f326f3afc126b4f8933b8da24b7a48c89eed3

                                                                      SHA512

                                                                      849784b8c4e5428015d231c3a15e6219e67231f207493bb68f5abc9b0bd5e630ccf43fe60522ced19f2d93cb2afa4e0fd61acb17fd108d3617ddd22be486d001

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                                                      Filesize

                                                                      264KB

                                                                      MD5

                                                                      655da70d3459a2a8a6a0dc453f030607

                                                                      SHA1

                                                                      7b622f2d7e4aa9d85fc9381c64205fd48e4347d2

                                                                      SHA256

                                                                      f29934d3ca8ee715aeb72d75037da6b3ca2ff75a1ef1c1d3d5d5203969bd364b

                                                                      SHA512

                                                                      23b105ac45f888d591893c939122e4aa324abd89414b6c475787a1e6f1e24ea3ad6c4c3357d796c14d905558088a6b5f1984acfb055e47d3aba9d86ee5a95a3e

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\History

                                                                      Filesize

                                                                      192KB

                                                                      MD5

                                                                      6eec0955ccbfe6034d1e41d1988bd279

                                                                      SHA1

                                                                      f650620bdded049e78cc78f9f4ec89d46b18f2c2

                                                                      SHA256

                                                                      01e8335de7d18898e68f0eb02f22bb8f7742f06e2f970b81ab734f60b083f3f7

                                                                      SHA512

                                                                      4e06148733c6119c24145d40d7472ab66450c1071757100ed4632622c7ba3597290ee08411847366637e86af7def6634f9ae5ea7003eb7753ef9da542dbcfbc6

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.log

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      0bee9448ac80d8641e62468b44a16703

                                                                      SHA1

                                                                      02c0c751f8a75e00d690529254a0fc810c026fc1

                                                                      SHA256

                                                                      fe359b06999390a82c338fec9da7d9b2b1b6ef76a59ba5e3a74e6484eecee1db

                                                                      SHA512

                                                                      e541e9a9f564bfd268cd74516104ba5a9f8db948fa68172219eccb174495f612e55bb6c300122a0d814fbc0cab607171b8c4c5d127ea42e123342aa466a92c69

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies

                                                                      Filesize

                                                                      32KB

                                                                      MD5

                                                                      15f70abbe572ea2df5718cdd61166ea2

                                                                      SHA1

                                                                      c1bb587c4f0fe72613e2ba6c47d59cb707e44b0e

                                                                      SHA256

                                                                      e93726ea0147f532e7faea89a29cacff332b98c639a7449463cf37d03d559cca

                                                                      SHA512

                                                                      8a9be3734d146ffc58900ae66b5c109b81a163ad80d5bd3941486219f1a8dd4c987bc614a590557ea9ca21cec74a89fd2dcd5c89701aa29674e9b4f329d459f5

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                      Filesize

                                                                      10KB

                                                                      MD5

                                                                      f47b6cac5015ca483bfc82fb4ff82ff1

                                                                      SHA1

                                                                      6f42777fb73d82d6334006743099620e4546659b

                                                                      SHA256

                                                                      2b74b38a78404239997970446ac9b433e9fa7ead1e766fd311158f0b85c3bb08

                                                                      SHA512

                                                                      e2aa771053a749cc6176bd0d50a4865378a98789b231c995da7d826c0628c59f0fdf29710a1687e4ef70aa43f72395e564efd06aa6783c5b553b054b939e94a8

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                      Filesize

                                                                      2KB

                                                                      MD5

                                                                      595155f8e19849a30518015c348a3542

                                                                      SHA1

                                                                      750695a6316ac11f3cf2cef0caf88246a6ef27a5

                                                                      SHA256

                                                                      ef1eeb7a2f99f3eedf09288ae9016e8fa85d712bd3b7fcfd8daab5de2c4c80ce

                                                                      SHA512

                                                                      106cfe2abdca8513514b770f8dbe81eca90301fd07ecc24223c0de35ddfed4ee335abc2e2828cec1c1b0a0c77caf6fc75f2ff9b6b2dce2e4d565ee3a632c5798

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                      Filesize

                                                                      2B

                                                                      MD5

                                                                      d751713988987e9331980363e24189ce

                                                                      SHA1

                                                                      97d170e1550eee4afc0af065b78cda302a97674c

                                                                      SHA256

                                                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                      SHA512

                                                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                      Filesize

                                                                      2KB

                                                                      MD5

                                                                      6b6c8fb4bc845840aea6c7f8957347da

                                                                      SHA1

                                                                      609a0ea256c5a7af19c8bedd7de31b5482d02925

                                                                      SHA256

                                                                      3ac58bc6381cdc062df92ccd7fe01be8e75bde15aa9cf6954da4adb213df96bb

                                                                      SHA512

                                                                      d11b4cfc59efef0271c220d4a63a1ac47fe81487abe625a869fb55df741fd3fef30e896f6404a380dca5efe8d9e7da3a2aa85ca5d9fd3e324b9c438114883158

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                      Filesize

                                                                      524B

                                                                      MD5

                                                                      69d85ac714e3372f4dc510edc2055363

                                                                      SHA1

                                                                      e41ec9a26d262d43ff9df4815a467d89e2a114c4

                                                                      SHA256

                                                                      c843e5169ffa7677f45bc192eee1bab1a13e9a9569416e08a1c1b6313af438c2

                                                                      SHA512

                                                                      beaead015aec5dcae0f9b6fe27c07efcae77f0bd77e8f3d78a1526bde05261c39da8a0c881b33f37b60ad8f87443a928c647d83d686b5bfbc304a1e0fccd759b

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      f756cca2433e8a967dffbcffb98017eb

                                                                      SHA1

                                                                      a114f2996f0377550c6ae81be0cdd976199eb33f

                                                                      SHA256

                                                                      a14d482cc92532358b9608f7f01c0709a48f378afd4e9b277361c5d9cfb0d21b

                                                                      SHA512

                                                                      44cc34ab2901b087be4e709625019ba434536fef9166c5bc5ec2fa53970d87284b5449ce33f5a2a384b65e4a3a2b793f6a8adc6c6cc75f5cbbeda176c0e58008

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                      Filesize

                                                                      2KB

                                                                      MD5

                                                                      c508d2de89828c36486dee02ab73248c

                                                                      SHA1

                                                                      e77534d6787754db3d6c1348b97225682b10da11

                                                                      SHA256

                                                                      5b1b00186d8f8f8d4816bfe20ed1dd95838020de811857a60f86393b6fe05159

                                                                      SHA512

                                                                      0500f934aa12d9a230ae0681c0baa7de9a2c5a0caa3bb4714297bc6f32016285ef7fc9b2325e679818a76e0adf5e22b2caebaf4b18b70e6cb132fc762fdffcd8

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                      Filesize

                                                                      2KB

                                                                      MD5

                                                                      c684f2adae084490cc83f035513a2c12

                                                                      SHA1

                                                                      644a3775242750c5edd38466996f287b21700fd1

                                                                      SHA256

                                                                      932a0e24809316db480227ab3119c9fcb21f3ef18d4800594f90e4a606250311

                                                                      SHA512

                                                                      144eba454c7b1ebce2a259fb82ae067f825f80058f3c34f3e67b103a4619b1ebbea2ace6adf980c2ae93a72503de209a1b6ddab1f965015272d362f00522b070

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                      Filesize

                                                                      7KB

                                                                      MD5

                                                                      c2f82a4a815f2044a547f7e71f665cf9

                                                                      SHA1

                                                                      3863ea41bb08d258a350ec1eeb88dc181fe15d5e

                                                                      SHA256

                                                                      f9e1fe0ed447443e86c702fe4d007fb941682bea54a5c63857a9cdd5f9165065

                                                                      SHA512

                                                                      871becfeb46ffc246b67991e7975f1575dfb73e0e222d45a2b750a1acf4f851f17d6a686a69390a64f35ba20efc607ae7a1555427199e282d00334df013e4a84

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                      Filesize

                                                                      8KB

                                                                      MD5

                                                                      ae135fefd936fd66eab8124adeed758a

                                                                      SHA1

                                                                      84117ac7a1dea9661b133403ae7b1113066191d0

                                                                      SHA256

                                                                      4471bb448861eaed3e81e5995645444a0d32123317465aa8749226d7dfa08ba3

                                                                      SHA512

                                                                      234bf2b029926f050edc97253610dae62a0f5c65464e798b159c7e63970a7691552b26aee91cd8f3ed6f7c6670d42dfca8e7bea1586480e4363f38d859b667fe

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                      Filesize

                                                                      8KB

                                                                      MD5

                                                                      3a7097a36c562ddba72dad1bc5507e68

                                                                      SHA1

                                                                      bdf4eedd13931d85c10c837055a6f26f5c5aef72

                                                                      SHA256

                                                                      502e350fc5b8e3f1ca71d9865e80398ebd015c39d4883f633c854c75c40c33a0

                                                                      SHA512

                                                                      23edd1ae3de666cccb7805f7fd12c4a3cdfe03c38003b94564cc5f26cb46d8fd6c04fc804b734d688bcadbe8e1823653a6e5b76e5d74d22d00829f506b1e11cd

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                      Filesize

                                                                      8KB

                                                                      MD5

                                                                      25b7ece311fffb148160dc60abf5fd4d

                                                                      SHA1

                                                                      770bce96db7370054f8eecd0ba23e36d83af9840

                                                                      SHA256

                                                                      c2dc11bd8c0741a63e42627e63a3c69d54e3f2622049c35150aac44d666f59f7

                                                                      SHA512

                                                                      8bd2a1168d37f250c50a3f7dd7d655dc86b04b44580cd3214f26ab46494b2fce725e7ce624f02848f5c073cadfb6b9bce69a7487530c4bce6c848658fec29c61

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                      Filesize

                                                                      7KB

                                                                      MD5

                                                                      a12d184dd5eb567d52cd0815aef221fd

                                                                      SHA1

                                                                      4c2ee031f7d4a1e2a710fa5526640e740d2425b0

                                                                      SHA256

                                                                      3f40f28e136f71fb9ff6abfbd14cd6287fe2dac020363bb4895992a0bc33304b

                                                                      SHA512

                                                                      82bcbd50306b2bd9bdc1a2d65441110a185a0784eabea9eb890c942c983df71318c63acfdd3d70d68b2652bb1dff9c26e0e07efcfc427dbaef5457b56e0e8ff6

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                      Filesize

                                                                      130KB

                                                                      MD5

                                                                      681e68e112225c3b9fcbdcf29c9e3bfc

                                                                      SHA1

                                                                      56ca9d24f83ba0d33f41200ddeb51ee212ee591d

                                                                      SHA256

                                                                      6af222bdfc00e907f184d6f1a630ad7cbc88fb7c8aa661bf36762561cab4d8c3

                                                                      SHA512

                                                                      4e6a3503df954fb62b39fb9a13f7855323f96887c390e4dc90ccab4068c4d3346419d28f646e1297afec666b27637f4b6c839b9f6b2077ab675cba89494c7be6

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                      Filesize

                                                                      130KB

                                                                      MD5

                                                                      5e2763e616a83b7db5b3f091366d8127

                                                                      SHA1

                                                                      579998104e8ec9866f12986bc0c070d1620c7627

                                                                      SHA256

                                                                      f455ee99a19ce2575a544fd661fa14bdd46837288e12af45ea048cfe214bab23

                                                                      SHA512

                                                                      40790ffa8ceb35bc8b14577f6030408909a3bb253b6d01ea3512ac294f96a7dd61475607a3535e59bc388b418b90b866995c9c34b97a418d2688063f37dca0ae

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                      Filesize

                                                                      130KB

                                                                      MD5

                                                                      3f8ffee54322e7d8b163b1d2aceec5e3

                                                                      SHA1

                                                                      93b1827ae2ec31942082b5656fc9638157ca54d7

                                                                      SHA256

                                                                      f4f251b18ba798591820def752f7dbf9aa997e9e99e0374fc3e61ffc6349d2c7

                                                                      SHA512

                                                                      052310ac879660d3b50bd8e66a4f3a3e9feb7a07a49d4b697e26e16a4983cf5d62917b595cccec214b8e9c23034b4e57db819386cc4cbce1a38454a71d5ef936

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                      Filesize

                                                                      130KB

                                                                      MD5

                                                                      d98fcd85bf20eebae896b13068b35242

                                                                      SHA1

                                                                      f5a10345271f0c6913ecfc38bd81c38754fed618

                                                                      SHA256

                                                                      cd46ff046b87fbcd14e9ac36de32c3955de084fda43ba462b4744bb662a379cc

                                                                      SHA512

                                                                      f5fe5dd2351e8df3e8a5c65d53218a6fbfd0ea044a2a79f0c91ed813fb8b76cee4a190fa487453123bbda2a147cdb002a6f29b45b9a6d22ebfb078f63190926d

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                                                                      Filesize

                                                                      96KB

                                                                      MD5

                                                                      396b55fc7c03511200d607ad67fac667

                                                                      SHA1

                                                                      1abff0aa3ba6926a07167dd2a764f8f587125051

                                                                      SHA256

                                                                      8728d39206a198894271fd77040466dba4bb82b0e82944730c9f4f215cb2210d

                                                                      SHA512

                                                                      e0c4e552ca6d22f1e48fbe775ec284ddbd1ecd8228bc5993c5e6e3c30d6701844b3f766fe066911a48b791c3196a9da343a7bf5a84bb802333dd46fc9963ea6a

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                                                                      Filesize

                                                                      91KB

                                                                      MD5

                                                                      d78af7ef800aad6784d1d6bb2fd8b1f6

                                                                      SHA1

                                                                      df79b43dde765e999934a11156eedab0c13cd479

                                                                      SHA256

                                                                      e0a94506e67d9cf420ab3367d9b79e047aebff00c84c1ae0378830e43f4e29a2

                                                                      SHA512

                                                                      da3dabc6aa0d70adadb2644d821c80c83bb868b4a0ace1bc25ee00e4f815e7df3cd950b614c61e19d4cd8ad1bbc8b779af8b65ab0dff06751800fa2d0411cf85

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe58875b.TMP

                                                                      Filesize

                                                                      88KB

                                                                      MD5

                                                                      34d7bc325cc810c0928c58c2eb93e0c3

                                                                      SHA1

                                                                      9e2bcfe938359d8dc26a6a787fb6bf264e1d0702

                                                                      SHA256

                                                                      94c31b9d3947369bbb271d007685d20b1f5c64150c55e1360c0190b90ac95bb1

                                                                      SHA512

                                                                      528678a4ef16c1741776291bb7ee88ada4db4f98dfa7401c40c2a406eec8431c0d9a14c8477482aa2263b7b4027311c4d5144343a4ddae914af6f0ff03a00564

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\a154a508-d200-4577-9f8a-e2acbfbdddb7.tmp

                                                                      Filesize

                                                                      130KB

                                                                      MD5

                                                                      f74d48a49a0293ad8e5e26fe084722d5

                                                                      SHA1

                                                                      b9860d11f1b48e51b8f902dea607d6a2bbda8d99

                                                                      SHA256

                                                                      a7970f4b872b19464c0241bd3fc6c616db87a53879fd7b7c3ccadc3350a6b9a0

                                                                      SHA512

                                                                      133d7803e12c52be3cac482e4fb025413da57e45b84daf365f7637587c770672317adae3773338d2a8d6920bced7f40d0a9e845fba5aeb2d1fca7d064fb11985

                                                                    • C:\Users\Admin\AppData\Local\Temp\spannKufDKFjLvVn\QMEtlToQ2omFqoxMCwt4.exe

                                                                      Filesize

                                                                      2.8MB

                                                                      MD5

                                                                      b8c9db5b5f5720d01cdd58a40cf89e84

                                                                      SHA1

                                                                      290c912f02c847b60debeb3680e5f00c78c7b7c1

                                                                      SHA256

                                                                      e2e943bf7b77ef660c3edbe9823f41d56e98d668327e15fe8e611a517fa52c27

                                                                      SHA512

                                                                      75cb78fd22e327c3e62803c38e2059a1ca6034335a32b834adc652bb8b55749e25297a26c9f40c800f76ff9a2f81ae7db3fd40e1a6c0d1cefe57306db0dd3688

                                                                    • C:\Users\Admin\AppData\Local\Temp\spannKufDKFjLvVn\UKrsHwAZTrkXZfCXrBGg.exe

                                                                      Filesize

                                                                      478KB

                                                                      MD5

                                                                      b3487e31f2f1fe5c761d63cc3bac5000

                                                                      SHA1

                                                                      1d60084d6713d0574244d291fee586f663079e41

                                                                      SHA256

                                                                      491d7b93c49438ac2b97e8ad343b99abbcc3536d9d32de6972ff64a7ec32f858

                                                                      SHA512

                                                                      587ad89b74e83d657d13a280b713330686be6e82c74f42b0f318d38b4abe833689d7b542ba577f6be0242b7d63f8b4bdf4e79ac7edbcbc329f618365e1b3751c

                                                                    • C:\Users\Admin\AppData\Local\Temp\spannKufDKFjLvVn\XOH_EYNQLW5lWeb Data

                                                                      Filesize

                                                                      100KB

                                                                      MD5

                                                                      e0a9a4a78c1f99c5693c26d139b08762

                                                                      SHA1

                                                                      a20443b8e6e4a1fb1a11f4e0c6f48b89f263f069

                                                                      SHA256

                                                                      4075e9418dbc72c7dbb3978bd9e6f1283457e5aeb72389e2285c8c6bf8f61a27

                                                                      SHA512

                                                                      df1f9a9f4eab6086a407ba41dc67645bb1c0b0ac910f37d9b0012895e36b4e27ce00b214a8e519d70b612e1c0cb480828bb25350bba3086842eed7aca94611ac

                                                                    • C:\Users\Admin\AppData\Local\Temp\spannKufDKFjLvVn\hIkXbp3tYmLIWeb Data

                                                                      Filesize

                                                                      116KB

                                                                      MD5

                                                                      f70aa3fa04f0536280f872ad17973c3d

                                                                      SHA1

                                                                      50a7b889329a92de1b272d0ecf5fce87395d3123

                                                                      SHA256

                                                                      8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                                      SHA512

                                                                      30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                                                    • C:\Users\Admin\AppData\Local\Temp\spantYtSfz4oOsoB\D87fZN3R3jFeplaces.sqlite

                                                                      Filesize

                                                                      5.0MB

                                                                      MD5

                                                                      6be34d41d2a5d17e266d68a04bf56ab8

                                                                      SHA1

                                                                      df226cd1cfac6ec00b61f29acbbb27cf07cb42b0

                                                                      SHA256

                                                                      c0ce2bd6a1f195bc5b2e70c0fc586596ed8efbcaa1b5429656552b668abced10

                                                                      SHA512

                                                                      cd2ae3a65c2aba7ae6449ecffecc61cda5e2858f3f21a8a9aec5cfdbd18af566c23c6ee5f107e5336aff2c90810f17abd418d170a1083f06c90b5b64871ed95e

                                                                    • C:\Users\Admin\AppData\Local\Temp\spantYtSfz4oOsoB\Iy3rOaSMcLIiHistory

                                                                      Filesize

                                                                      124KB

                                                                      MD5

                                                                      9618e15b04a4ddb39ed6c496575f6f95

                                                                      SHA1

                                                                      1c28f8750e5555776b3c80b187c5d15a443a7412

                                                                      SHA256

                                                                      a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

                                                                      SHA512

                                                                      f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

                                                                    • C:\Users\Admin\AppData\Local\Temp\spantYtSfz4oOsoB\fwFF8Ofv3hwILogin Data

                                                                      Filesize

                                                                      46KB

                                                                      MD5

                                                                      8f5942354d3809f865f9767eddf51314

                                                                      SHA1

                                                                      20be11c0d42fc0cef53931ea9152b55082d1a11e

                                                                      SHA256

                                                                      776ecf8411b1b0167bea724409ac9d3f8479973df223ecc6e60e3302b3b2b8ea

                                                                      SHA512

                                                                      fde8dfae8a862cf106b0cb55e02d73e4e4c0527c744c20886681245c8160287f722612a6de9d0046ed1156b1771229c8950b9ac036b39c988d75aa20b7bac218

                                                                    • C:\Users\Admin\AppData\Local\Temp\trixynKufDKFjLvVn\Browsers\Vault_IE\Passwords.txt

                                                                      Filesize

                                                                      5KB

                                                                      MD5

                                                                      cb415a199ac4c0a1c769510adcbade19

                                                                      SHA1

                                                                      6820fbc138ddae7291e529ab29d7050eaa9a91d9

                                                                      SHA256

                                                                      bae990e500fc3bbc98eddec0d4dd0b55c648cc74affc57f0ed06efa4bde79fee

                                                                      SHA512

                                                                      a4c967e7ba5293970450fc873bf203bf12763b9915a2f4acd9e6fa287f8e5f74887f24320ddac4769f591d7ef206f34ce041e7f7aaca615757801eb3664ba9a4

                                                                    • C:\Users\Admin\AppData\Local\Temp\trixytYtSfz4oOsoB\Browsers\Chrome\Default\Cookies.txt

                                                                      Filesize

                                                                      10KB

                                                                      MD5

                                                                      c1baaf438bbd7caf54f47f42d1567e07

                                                                      SHA1

                                                                      d8a3b647693bf114c121f4028908b2768a7bba66

                                                                      SHA256

                                                                      8b7137ecdc6988896791551262d012df2f360d3df69aa856d4edf7337fd2e896

                                                                      SHA512

                                                                      9bf3242f733998d0380a1e9d938541f06ed5e1e2eb410cdcdc508009deef1b2aa5664e87a07946cc0c26e0956b0a0a4f2435a89da3ab56d9c31cbe51d05c9296

                                                                    • C:\Users\Admin\Desktop\Roblox Hacks\Launcher.exe

                                                                      Filesize

                                                                      2.4MB

                                                                      MD5

                                                                      e4f4979aed4050e2fe987f4922d53ad2

                                                                      SHA1

                                                                      091c554145a642e899c42bb34c06b7c1214086ee

                                                                      SHA256

                                                                      dbe9c2836d5768eda1f1c6582a8a44bae327dfcfa98049cc04e4aabf91499096

                                                                      SHA512

                                                                      995adc0ca1eba1a09eba96816c77ca039e120f8fe4f42664db86860d547a9d468ed4b3e0ce57b4fceac8f0ed3fd2f197eec04ccd6746a8c0d62eed5fe3d1e1ff

                                                                    • C:\Users\Admin\Desktop\Roblox Hacks\d3dcompiler_47.dll

                                                                      Filesize

                                                                      4.7MB

                                                                      MD5

                                                                      1e2f4329fa2e58be78f5fcde2aeea167

                                                                      SHA1

                                                                      c2ecb4d0542c49d9e906d6173f77349aaa4749a6

                                                                      SHA256

                                                                      a92f3bb1a4d846b38e8422d7c492f638e6bf47081facbb22c92568118938d5ce

                                                                      SHA512

                                                                      8ae9b45f7427d83b5fd0afa49c920f79fc071f362dab0a4ef72be0fd19f5243779f071d762a66ffc2180121ded618e571470d3eabbdcf21b4125cf0b04ea62f3

                                                                    • C:\Users\Admin\Desktop\Roblox Hacks\libG1LESv2.dll

                                                                      Filesize

                                                                      142KB

                                                                      MD5

                                                                      b5505f1a0d0b678dd1198591bc74bc3a

                                                                      SHA1

                                                                      4312c487599c49bc53e2d83ca34561ac3b79b729

                                                                      SHA256

                                                                      08b34f11661de9e838ecd8fdf2780117e6b5e83edf24f5dcfae823a7e1fbfdd1

                                                                      SHA512

                                                                      804ebb36d26f4362f03c31071905b8da41cd0318d10fa9e1fcab191438afc4d7f79d2f6bc6fea2dd45073929b88a3bf467f9d3cc63f703a1909cc089a291853f

                                                                    • C:\Users\Admin\Desktop\Roblox Hacks\resources\app.asar

                                                                      Filesize

                                                                      2.0MB

                                                                      MD5

                                                                      97fac0bc29309dbd8074738b13f8d018

                                                                      SHA1

                                                                      f6e0a6a21362feec0222a28a7645734a790ce6ef

                                                                      SHA256

                                                                      219fdcd72255ec3f6b85769f5cb4659cbaf1653ad257d45422d3d864932d06d1

                                                                      SHA512

                                                                      63a8f904b0070098e444bcabb52276b3c92d7f42147fc5dc769466ddd47f6e3e912835b120c2cdd12bf48441e527295fed22ef5a75a9b56f3bc321381de30f12

                                                                    • C:\Users\Admin\Desktop\Roblox Hacks\resources\ffmpeg.dll

                                                                      Filesize

                                                                      2.6MB

                                                                      MD5

                                                                      7f31b5234e44fac97d3c673a38c4c11f

                                                                      SHA1

                                                                      65dc18e0bce308608dbba3c76d84e266c9fa53e6

                                                                      SHA256

                                                                      0e751cd4312fab78d2c316860f1460875cd799e8d158f75934391c14ba328101

                                                                      SHA512

                                                                      83658e0275a8e1fec8dd0f98c19c3e7d37a7205afc3547fdc09c60f0feebe72d30ecb2b182e9ed17ceaf3604ecd77810e330eff4cb5e38fef8a27b8ea9db2467

                                                                    • C:\Users\Admin\Downloads\Launcher.zip

                                                                      Filesize

                                                                      16.3MB

                                                                      MD5

                                                                      6359ddb7dbe9da860ea09765f4fde122

                                                                      SHA1

                                                                      3ee7b796f996b75c728f684d2e38b4e9f81f03bf

                                                                      SHA256

                                                                      c6fc11843905f2fca33d8d5966e781398c7dfc6f41345b2da6d10513bfaf755e

                                                                      SHA512

                                                                      cd311655c0b71fd76f9de9587d8307e20aa8c1009214700de3f2dd74fddffa0574eb4f168b7565994d94c4e49b4e9c799d8d4467f97e0c0eabc7fa707c99ee10

                                                                    • \??\pipe\crashpad_3012_ERYKVVGMYEOUUCYQ

                                                                      MD5

                                                                      d41d8cd98f00b204e9800998ecf8427e

                                                                      SHA1

                                                                      da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                      SHA256

                                                                      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                      SHA512

                                                                      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                    • memory/808-698-0x0000000000B00000-0x0000000000D71000-memory.dmp

                                                                      Filesize

                                                                      2.4MB

                                                                    • memory/2408-942-0x0000000000400000-0x000000000059C000-memory.dmp

                                                                      Filesize

                                                                      1.6MB

                                                                    • memory/2408-943-0x0000000000400000-0x000000000059C000-memory.dmp

                                                                      Filesize

                                                                      1.6MB

                                                                    • memory/3544-793-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3544-779-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3544-787-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3544-803-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3544-808-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3544-797-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3544-799-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3544-781-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3544-728-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3544-697-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3544-726-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3544-699-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3544-702-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3544-706-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3544-716-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3632-895-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3632-908-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3632-893-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3632-889-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3632-919-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3632-713-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3632-913-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3632-727-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3632-843-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3632-842-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3632-905-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3632-831-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/3788-830-0x0000000000B00000-0x0000000000D71000-memory.dmp

                                                                      Filesize

                                                                      2.4MB

                                                                    • memory/4080-932-0x0000000000400000-0x0000000000873000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/4892-708-0x0000000000B00000-0x0000000000D71000-memory.dmp

                                                                      Filesize

                                                                      2.4MB