Analysis

  • max time kernel
    299s
  • max time network
    288s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01-05-2024 22:32

General

  • Target

    15d4314f2a105c16030e5d12291def5272072e67f10d4063184d2cb477c3438d.exe

  • Size

    1.9MB

  • MD5

    91cc81462f82c0fb9fcaba053cc9348f

  • SHA1

    9b444adf901a2f5e1baf0d0c89034601fd8e2860

  • SHA256

    15d4314f2a105c16030e5d12291def5272072e67f10d4063184d2cb477c3438d

  • SHA512

    2f9b3ac8c3c41e9c8983b80575ae1807f327c28c4e2cbf178c14548ee70a4c240b6627267e807c8980bf43e317fd353bd3dcd0bed0e89b2281e192a9a9bb1fd1

  • SSDEEP

    24576:EQg/bnlnCO3enM0safpTYF76Ts6Z4jSq2VXRa5UAloyp/RVAREnwHyM/iN4MMxaG:E3/bn5tYfhYF7Q4jY/4ZVbmdRsr

Malware Config

Extracted

Family

amadey

Version

4.20

C2

http://193.233.132.139

Attributes
  • install_dir

    5454e6f062

  • install_file

    explorta.exe

  • strings_key

    c7a869c5ba1d72480093ec207994e2bf

  • url_paths

    /sev56rkm/index.php

rc4.plain

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

redline

Botnet

Test1234

C2

185.215.113.67:26260

Extracted

Family

stealc

C2

http://52.143.157.84

Attributes
  • url_path

    /c73eed764cc59dcb.php

Extracted

Family

redline

Botnet

@CLOUDYTTEAM

C2

185.172.128.33:8970

Extracted

Family

lumma

C2

https://affordcharmcropwo.shop/api

https://cleartotalfisherwo.shop/api

https://worryfillvolcawoi.shop/api

https://enthusiasimtitleow.shop/api

https://dismissalcylinderhostw.shop/api

https://diskretainvigorousiw.shop/api

https://communicationgenerwo.shop/api

https://pillowbrocccolipe.shop/api

https://productivelookewr.shop/api

https://incredibleextedwj.shop/api

https://tolerateilusidjukl.shop/api

https://shatterbreathepsw.shop/api

https://shortsvelventysjo.shop/api

https://liabilitynighstjsko.shop/api

https://demonstationfukewko.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 6 IoCs
  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Windows security bypass 2 TTPs 7 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 15 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 30 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 44 IoCs
  • Identifies Wine through registry keys 2 TTPs 15 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 8 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 7 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 10 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 9 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 53 IoCs
  • Suspicious use of SendNotifyMessage 50 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15d4314f2a105c16030e5d12291def5272072e67f10d4063184d2cb477c3438d.exe
    "C:\Users\Admin\AppData\Local\Temp\15d4314f2a105c16030e5d12291def5272072e67f10d4063184d2cb477c3438d.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4924
    • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
      "C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:368
      • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
        "C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"
        3⤵
          PID:4612
        • C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe
          "C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2312
          • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
            "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:1380
            • C:\Users\Admin\AppData\Local\Temp\1000066001\swiiiii.exe
              "C:\Users\Admin\AppData\Local\Temp\1000066001\swiiiii.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:1520
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                6⤵
                  PID:2068
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 836
                  6⤵
                  • Program crash
                  PID:2160
              • C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe
                "C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe"
                5⤵
                • Executes dropped EXE
                PID:2744
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe" /F
                  6⤵
                  • Creates scheduled task(s)
                  PID:4132
                • C:\Users\Admin\AppData\Local\Temp\1000231001\ISetup8.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000231001\ISetup8.exe"
                  6⤵
                  • Executes dropped EXE
                  PID:3180
                  • C:\Users\Admin\AppData\Local\Temp\u2gc.0.exe
                    "C:\Users\Admin\AppData\Local\Temp\u2gc.0.exe"
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Checks processor information in registry
                    PID:4428
                  • C:\Users\Admin\AppData\Local\Temp\u2gc.2\run.exe
                    "C:\Users\Admin\AppData\Local\Temp\u2gc.2\run.exe"
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: MapViewOfSection
                    • Suspicious use of SetWindowsHookEx
                    PID:2276
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\SysWOW64\cmd.exe
                      8⤵
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: MapViewOfSection
                      PID:3176
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        9⤵
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of SetWindowsHookEx
                        PID:6332
                  • C:\Users\Admin\AppData\Local\Temp\u2gc.3.exe
                    "C:\Users\Admin\AppData\Local\Temp\u2gc.3.exe"
                    7⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:2268
                    • C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
                      "C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
                      8⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5540
                • C:\Users\Admin\AppData\Local\Temp\1000232001\toolspub1.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000232001\toolspub1.exe"
                  6⤵
                  • Executes dropped EXE
                  • Checks SCSI registry key(s)
                  PID:5388
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 5388 -s 488
                    7⤵
                    • Program crash
                    PID:4596
                • C:\Users\Admin\AppData\Local\Temp\1000233001\4767d2e713f2021e8fe856e3ea638b58.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000233001\4767d2e713f2021e8fe856e3ea638b58.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5764
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    7⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5592
                  • C:\Users\Admin\AppData\Local\Temp\1000233001\4767d2e713f2021e8fe856e3ea638b58.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000233001\4767d2e713f2021e8fe856e3ea638b58.exe"
                    7⤵
                    • Windows security bypass
                    • Executes dropped EXE
                    • Windows security modification
                    • Adds Run key to start application
                    • Checks for VirtualBox DLLs, possible anti-VM trick
                    • Drops file in Windows directory
                    • Modifies data under HKEY_USERS
                    PID:3916
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      8⤵
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:7028
                    • C:\Windows\System32\cmd.exe
                      C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                      8⤵
                        PID:7088
                        • C:\Windows\system32\netsh.exe
                          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                          9⤵
                          • Modifies Windows Firewall
                          • Modifies data under HKEY_USERS
                          PID:6204
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        8⤵
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:6272
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        8⤵
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2336
                      • C:\Windows\rss\csrss.exe
                        C:\Windows\rss\csrss.exe
                        8⤵
                        • Executes dropped EXE
                        • Adds Run key to start application
                        • Manipulates WinMonFS driver.
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:7088
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          9⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5940
                        • C:\Windows\SYSTEM32\schtasks.exe
                          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                          9⤵
                          • Creates scheduled task(s)
                          PID:4880
                        • C:\Windows\SYSTEM32\schtasks.exe
                          schtasks /delete /tn ScheduledUpdate /f
                          9⤵
                            PID:6360
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -nologo -noprofile
                            9⤵
                            • Drops file in System32 directory
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:964
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -nologo -noprofile
                            9⤵
                            • Drops file in System32 directory
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5596
                          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                            9⤵
                            • Executes dropped EXE
                            PID:6504
                          • C:\Windows\SYSTEM32\schtasks.exe
                            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                            9⤵
                            • Creates scheduled task(s)
                            PID:6764
                          • C:\Windows\windefender.exe
                            "C:\Windows\windefender.exe"
                            9⤵
                            • Executes dropped EXE
                            PID:6896
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                              10⤵
                                PID:6608
                                • C:\Windows\SysWOW64\sc.exe
                                  sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                  11⤵
                                  • Launches sc.exe
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:6616
                    • C:\Users\Admin\AppData\Local\Temp\1000071001\jok.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000071001\jok.exe"
                      5⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Modifies system certificate store
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4124
                      • C:\Users\Admin\AppData\Local\Temp\svrht.exe
                        "C:\Users\Admin\AppData\Local\Temp\svrht.exe"
                        6⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Checks processor information in registry
                        PID:5104
                    • C:\Users\Admin\AppData\Local\Temp\1000073001\swiiii.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000073001\swiiii.exe"
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:5304
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        6⤵
                        • Checks processor information in registry
                        PID:5404
                    • C:\Users\Admin\AppData\Local\Temp\1000075001\file300un.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000075001\file300un.exe"
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5624
                    • C:\Users\Admin\AppData\Local\Temp\1000077001\jfesawdr.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000077001\jfesawdr.exe"
                      5⤵
                      • Executes dropped EXE
                      PID:5876
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "
                        6⤵
                          PID:5960
                          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exe
                            work.exe -priverdD
                            7⤵
                            • Executes dropped EXE
                            PID:6008
                            • C:\Users\Admin\AppData\Local\Temp\RarSFX1\podaw.exe
                              "C:\Users\Admin\AppData\Local\Temp\RarSFX1\podaw.exe"
                              8⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              PID:6088
                      • C:\Users\Admin\AppData\Local\Temp\1000079001\gold.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000079001\gold.exe"
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        PID:2376
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          6⤵
                            PID:5224
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 516
                            6⤵
                            • Program crash
                            PID:5268
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                          5⤵
                          • Loads dropped DLL
                          PID:5368
                          • C:\Windows\system32\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                            6⤵
                            • Blocklisted process makes network request
                            • Loads dropped DLL
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5528
                            • C:\Windows\system32\netsh.exe
                              netsh wlan show profiles
                              7⤵
                                PID:4048
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\106386276412_Desktop.zip' -CompressionLevel Optimal
                                7⤵
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5180
                          • C:\Users\Admin\AppData\Local\Temp\1000080001\alexxxxxxxx.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000080001\alexxxxxxxx.exe"
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:5980
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                              6⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4472
                              • C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe
                                "C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe"
                                7⤵
                                • Executes dropped EXE
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5620
                              • C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe
                                "C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe"
                                7⤵
                                • Executes dropped EXE
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2208
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"
                                7⤵
                                  PID:4728
                                  • C:\Windows\SysWOW64\choice.exe
                                    choice /C Y /N /D Y /T 3
                                    8⤵
                                      PID:212
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5980 -s 504
                                  6⤵
                                  • Program crash
                                  PID:1516
                              • C:\Windows\SysWOW64\rundll32.exe
                                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                                5⤵
                                • Blocklisted process makes network request
                                • Loads dropped DLL
                                PID:4696
                          • C:\Users\Admin\AppData\Local\Temp\1000020001\d2b5d47572.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000020001\d2b5d47572.exe"
                            3⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1120
                          • C:\Users\Admin\1000021002\5c7795a614.exe
                            "C:\Users\Admin\1000021002\5c7795a614.exe"
                            3⤵
                            • Executes dropped EXE
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            • Suspicious use of WriteProcessMemory
                            PID:4928
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
                              4⤵
                              • Enumerates system info in registry
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              • Suspicious use of WriteProcessMemory
                              PID:4708
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fffba209758,0x7fffba209768,0x7fffba209778
                                5⤵
                                  PID:828
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1616 --field-trial-handle=1804,i,1020662820342301865,476157469388496398,131072 /prefetch:2
                                  5⤵
                                    PID:4272
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1912 --field-trial-handle=1804,i,1020662820342301865,476157469388496398,131072 /prefetch:8
                                    5⤵
                                      PID:2768
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2112 --field-trial-handle=1804,i,1020662820342301865,476157469388496398,131072 /prefetch:8
                                      5⤵
                                        PID:3696
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2872 --field-trial-handle=1804,i,1020662820342301865,476157469388496398,131072 /prefetch:1
                                        5⤵
                                          PID:1116
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2880 --field-trial-handle=1804,i,1020662820342301865,476157469388496398,131072 /prefetch:1
                                          5⤵
                                            PID:4192
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4428 --field-trial-handle=1804,i,1020662820342301865,476157469388496398,131072 /prefetch:1
                                            5⤵
                                              PID:4960
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4672 --field-trial-handle=1804,i,1020662820342301865,476157469388496398,131072 /prefetch:8
                                              5⤵
                                                PID:1516
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4772 --field-trial-handle=1804,i,1020662820342301865,476157469388496398,131072 /prefetch:8
                                                5⤵
                                                  PID:4176
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4752 --field-trial-handle=1804,i,1020662820342301865,476157469388496398,131072 /prefetch:8
                                                  5⤵
                                                    PID:5148
                                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                            1⤵
                                              PID:1920
                                            • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                              "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                              1⤵
                                              • Drops file in Windows directory
                                              • Modifies registry class
                                              • Suspicious use of SetWindowsHookEx
                                              PID:5188
                                            • C:\Windows\system32\browser_broker.exe
                                              C:\Windows\system32\browser_broker.exe -Embedding
                                              1⤵
                                              • Modifies Internet Explorer settings
                                              PID:1244
                                            • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                              "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                              1⤵
                                              • Modifies registry class
                                              • Suspicious behavior: MapViewOfSection
                                              • Suspicious use of SetWindowsHookEx
                                              PID:6064
                                            • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                              "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                              1⤵
                                              • Drops file in Windows directory
                                              • Modifies Internet Explorer settings
                                              • Modifies registry class
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of SetWindowsHookEx
                                              PID:4344
                                            • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                              "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                              1⤵
                                              • Drops file in Windows directory
                                              • Modifies registry class
                                              PID:5796
                                            • C:\Windows\system32\browser_broker.exe
                                              C:\Windows\system32\browser_broker.exe -Embedding
                                              1⤵
                                                PID:508
                                              • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:4820
                                              • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:5024
                                              • C:\Windows\system32\browser_broker.exe
                                                C:\Windows\system32\browser_broker.exe -Embedding
                                                1⤵
                                                  PID:6016
                                                • C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe
                                                  C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe
                                                  1⤵
                                                  • Executes dropped EXE
                                                  PID:212
                                                • C:\Windows\system32\browser_broker.exe
                                                  C:\Windows\system32\browser_broker.exe -Embedding
                                                  1⤵
                                                  • Modifies Internet Explorer settings
                                                  PID:4804
                                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                  1⤵
                                                  • Modifies registry class
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:5928
                                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                  1⤵
                                                  • Modifies registry class
                                                  PID:2448
                                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                  1⤵
                                                  • Modifies registry class
                                                  PID:5164
                                                • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                  C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:6512
                                                • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                  C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:6520
                                                • C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe
                                                  C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe
                                                  1⤵
                                                  • Executes dropped EXE
                                                  PID:6772
                                                • C:\Windows\windefender.exe
                                                  C:\Windows\windefender.exe
                                                  1⤵
                                                  • Executes dropped EXE
                                                  • Modifies data under HKEY_USERS
                                                  PID:6628
                                                • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                  C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:6712
                                                • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                  C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:6876
                                                • C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe
                                                  C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe
                                                  1⤵
                                                  • Executes dropped EXE
                                                  PID:5512
                                                • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                  C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:4160
                                                • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                  C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:3392
                                                • C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe
                                                  C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe
                                                  1⤵
                                                  • Executes dropped EXE
                                                  PID:1092
                                                • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                  C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:5212
                                                • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                  C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:6416
                                                • C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe
                                                  C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe
                                                  1⤵
                                                  • Executes dropped EXE
                                                  PID:2132

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\ProgramData\Are.docx

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  a33e5b189842c5867f46566bdbf7a095

                                                  SHA1

                                                  e1c06359f6a76da90d19e8fd95e79c832edb3196

                                                  SHA256

                                                  5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

                                                  SHA512

                                                  f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

                                                • C:\ProgramData\DBAAFIDG

                                                  Filesize

                                                  92KB

                                                  MD5

                                                  dc89cfe2a3b5ff9acb683c7237226713

                                                  SHA1

                                                  24f19bc7d79fa0c5af945b28616225866ee51dd5

                                                  SHA256

                                                  ceddefa824f1dd6e7e669d4470e18e557c22fe73359f5b31edf4537473b96148

                                                  SHA512

                                                  ee5d047e1124351997ecfaa5c8bd3e9ce8a974ac281675cda4d0a55e40f3883336a2378b9ebf3d1f227d01b386c26473c32e39bcab836da2b392bf778a6cf5c2

                                                • C:\ProgramData\mozglue.dll

                                                  Filesize

                                                  593KB

                                                  MD5

                                                  c8fd9be83bc728cc04beffafc2907fe9

                                                  SHA1

                                                  95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                  SHA256

                                                  ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                  SHA512

                                                  fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                • C:\ProgramData\nss3.dll

                                                  Filesize

                                                  2.0MB

                                                  MD5

                                                  1cc453cdf74f31e4d913ff9c10acdde2

                                                  SHA1

                                                  6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                  SHA256

                                                  ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                  SHA512

                                                  dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                • C:\Users\Admin\1000021002\5c7795a614.exe

                                                  Filesize

                                                  1.1MB

                                                  MD5

                                                  703fb1570fb3f63738decf549f887597

                                                  SHA1

                                                  5ec7dcb019752a15b8a4696c270182903ef25cbb

                                                  SHA256

                                                  4ff91e4d4592afcad6a8140961874afcc58f500fe1f9683beaa78f8bfc7f7c9e

                                                  SHA512

                                                  46643544ddae4362486da60c593a50fc99911cb47ef2b3ac2f4943f60f232f83567f977dce030658f059fa5952fbdb382c0b89382793172f00a0e5ef889d2409

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  707B

                                                  MD5

                                                  f44c8a298045134587a252076745c365

                                                  SHA1

                                                  5d01eb9a5b769920671cb9386a00148f7c4e86b9

                                                  SHA256

                                                  837ea055c6a08dc81a7da83543460920839d6c889f51c7e80b3930216bf9ccb6

                                                  SHA512

                                                  490a372666c7897e9da92114d5ba8936a1f6a9879919e88c4683fce7fa0d0e54c0dc2ba1105f992ebb981f9038da6a96f7a5431f9bdcb7640b642ab30d49c9ef

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  60d4ecc22f329475f1d2e5e35626b241

                                                  SHA1

                                                  4c83e8d9fa8275ea8375680f2bb005dbbe1df254

                                                  SHA256

                                                  43ced44d7f3780c9208ba8d10afc8bf14b1990bef4aab77029c0d1c9be20e959

                                                  SHA512

                                                  81927636557ac2770e0e13c214ce8d509f4e7cef8dfda350dc702249c83515958623df2937b5f4df96fb15ddc85d298968057e247a31ee273060211b1adb47c4

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                  Filesize

                                                  272KB

                                                  MD5

                                                  938338364d224aa9fe5e6bb5cabaee7e

                                                  SHA1

                                                  5f9e58c982a4dba224c2f80d9f7c291aaea2fb71

                                                  SHA256

                                                  807e235f40348ea7f89ac159417282bdce99294c5d2a15bbf33fbec19cf4ae4b

                                                  SHA512

                                                  05af4838bbdcdc184992a128e3ef6bf99def0bef15fb117fbc7544a4b853c7a49926372542856ac5e45c1038e23aa167b9bbf112693cd14555b8c688f2734136

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                                  Filesize

                                                  2B

                                                  MD5

                                                  99914b932bd37a50b983c5e7c90ae93b

                                                  SHA1

                                                  bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                  SHA256

                                                  44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                  SHA512

                                                  27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PZD0T2PJ\edgecompatviewlist[1].xml

                                                  Filesize

                                                  74KB

                                                  MD5

                                                  d4fc49dc14f63895d997fa4940f24378

                                                  SHA1

                                                  3efb1437a7c5e46034147cbbc8db017c69d02c31

                                                  SHA256

                                                  853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

                                                  SHA512

                                                  cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

                                                • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\TQC57QZE\suggestions[1].en-US

                                                  Filesize

                                                  17KB

                                                  MD5

                                                  5a34cb996293fde2cb7a4ac89587393a

                                                  SHA1

                                                  3c96c993500690d1a77873cd62bc639b3a10653f

                                                  SHA256

                                                  c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                                                  SHA512

                                                  e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                                                • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\VSHOANEA\favicon[1].png

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  18c023bc439b446f91bf942270882422

                                                  SHA1

                                                  768d59e3085976dba252232a65a4af562675f782

                                                  SHA256

                                                  e0e71acef1efbfab69a1a60cd8fadded948d0e47a0a27c59a0be7033f6a84482

                                                  SHA512

                                                  a95ad7b48596bc0af23d05d1e58681e5d65e707247f96c5bc088880f4525312a1834a89615a0e33aea6b066793088a193ec29b5c96ea216f531c443487ae0735

                                                • C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  27f84645e494762079e5cbeac77092c6

                                                  SHA1

                                                  4161290114ab7aed6378882503242961d8b07553

                                                  SHA256

                                                  7a3572ad7ed92ccfd3b3a69a27cafa3b03e012c87ad9a06e1d05703a74322f6f

                                                  SHA512

                                                  d5319257a98bfe932f4313048aef3c212a9b18259e6c9cf2cafb6745adb2f3a43a79b36360bab024367908905e6dbdc38dd92227c197c8a7a7c25d1897afc333

                                                • C:\Users\Admin\AppData\Local\Temp\1000020001\d2b5d47572.exe

                                                  Filesize

                                                  2.3MB

                                                  MD5

                                                  766c065e52b3fff0814224b26898fb41

                                                  SHA1

                                                  186d6108c14ad4aa456449c763f496ab98bb174e

                                                  SHA256

                                                  66ab56e3b98aebcebf17a044d3bd1bdd44cfbd1dad2f0f163f08758a91e4377e

                                                  SHA512

                                                  94b1314711e9dd0763bb93dd1ed262e5822fb8b24392c7c0004b4de8dafe23a657129e05594be2839e98082c56ee0620917724e64a7d14a5384942427ddafe9d

                                                • C:\Users\Admin\AppData\Local\Temp\1000066001\swiiiii.exe

                                                  Filesize

                                                  321KB

                                                  MD5

                                                  1c7d0f34bb1d85b5d2c01367cc8f62ef

                                                  SHA1

                                                  33aedadb5361f1646cffd68791d72ba5f1424114

                                                  SHA256

                                                  e9e09c5e5d03d21fca820bd9b0a0ea7b86ab9e85cdc9996f8f1dc822b0cc801c

                                                  SHA512

                                                  53bf85d2b004f69bbbf7b6dc78e5f021aba71b6f814101c55d3bf76e6d058a973bc58270b6b621b2100c6e02d382f568d1e96024464e8ea81e6db8ccd948679d

                                                • C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe

                                                  Filesize

                                                  418KB

                                                  MD5

                                                  0099a99f5ffb3c3ae78af0084136fab3

                                                  SHA1

                                                  0205a065728a9ec1133e8a372b1e3864df776e8c

                                                  SHA256

                                                  919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                                                  SHA512

                                                  5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                                                • C:\Users\Admin\AppData\Local\Temp\1000071001\jok.exe

                                                  Filesize

                                                  304KB

                                                  MD5

                                                  8510bcf5bc264c70180abe78298e4d5b

                                                  SHA1

                                                  2c3a2a85d129b0d750ed146d1d4e4d6274623e28

                                                  SHA256

                                                  096220045877e456edfea1adcd5bf1efd332665ef073c6d1e9474c84ca5433f6

                                                  SHA512

                                                  5ff0a47f9e14e22fc76d41910b2986605376605913173d8ad83d29d85eb79b679459e2723a6ad17bc3c3b8c9b359e2be7348ee1c21fa2e8ceb7cc9220515258d

                                                • C:\Users\Admin\AppData\Local\Temp\1000073001\swiiii.exe

                                                  Filesize

                                                  158KB

                                                  MD5

                                                  586f7fecacd49adab650fae36e2db994

                                                  SHA1

                                                  35d9fb512a8161ce867812633f0a43b042f9a5e6

                                                  SHA256

                                                  cf88d499c83da613ad5ccd8805822901bdc3a12eb9b15804aeff8c53dc05fc4e

                                                  SHA512

                                                  a44a2c99d18509681505cf70a251baf2558030a8648d9c621acc72fafcb2f744e3ef664dfd0229baf7c78fb72e69f5d644c755ded4060dcafa7f711d70e94772

                                                • C:\Users\Admin\AppData\Local\Temp\1000075001\file300un.exe

                                                  Filesize

                                                  392KB

                                                  MD5

                                                  ccc754d02cc1188f0a0477b306539065

                                                  SHA1

                                                  8a73b2e84fbdcadfaa98cc325c2222096bdc309b

                                                  SHA256

                                                  2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38

                                                  SHA512

                                                  6cabd1b19ddd94280528e4c2512e222bacc9bea6806e1df5610ffd3d993f52c4599e65fc7573d3d426e4d6d8c3756244e3e242b55b499796222f971b15ca8e0a

                                                • C:\Users\Admin\AppData\Local\Temp\1000077001\jfesawdr.exe

                                                  Filesize

                                                  6.1MB

                                                  MD5

                                                  9fb56dd5b5beb0b9c5d0102f22373c0b

                                                  SHA1

                                                  5559dc162d09c11c1ed80aedf8e9fa86fd531e4c

                                                  SHA256

                                                  a65b290aa9ebfb82746cf75440c19956169f48d7dcbebafde6996c9b46039539

                                                  SHA512

                                                  ab6c88acddf3350f4da37e20e38fc1bd4ac56433d5320fa071649ddf261cf1b6bb4692b54791e08e47b9e887a87ba5704afde6cb9aa9220c1da7f27c85400a1c

                                                • C:\Users\Admin\AppData\Local\Temp\1000079001\gold.exe

                                                  Filesize

                                                  460KB

                                                  MD5

                                                  b22521fb370921bb5d69bf8deecce59e

                                                  SHA1

                                                  3d4486b206e8aaac14a3cf201c5ac152a2a7d4ea

                                                  SHA256

                                                  b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158

                                                  SHA512

                                                  1f7d64ba5266314ed18f577f0984706c21f4f48e8cdb069130e4435c2bcdf219f8dd27e4d3bf3a373f4db4c01e30efe8d7f4d87f4d8cbbbeaf9c7043f685994c

                                                • C:\Users\Admin\AppData\Local\Temp\1000080001\alexxxxxxxx.exe

                                                  Filesize

                                                  2.7MB

                                                  MD5

                                                  31841361be1f3dc6c2ce7756b490bf0f

                                                  SHA1

                                                  ff2506641a401ac999f5870769f50b7326f7e4eb

                                                  SHA256

                                                  222393a4ab4b2ae83ca861faee6df02ac274b2f2ca0bed8db1783dd61f2f37ee

                                                  SHA512

                                                  53d66fa19e8db360042dadc55caaa9a1ca30a9d825e23ed2a58f32834691eb2aaaa27a4471e3fc4d13e201accc43160436ed0e9939df1cc227a62a09a2ae0019

                                                • C:\Users\Admin\AppData\Local\Temp\1000231001\ISetup8.exe

                                                  Filesize

                                                  433KB

                                                  MD5

                                                  824300cf5cafbe498e22648c44e24185

                                                  SHA1

                                                  cd42a721c21a774fc5c5419ee790afe0e2077c12

                                                  SHA256

                                                  cc7481436aadeae5a18e3cedc012768e0fd428e9076d1d246ae9faf85266f58c

                                                  SHA512

                                                  49ee87fbe5735d8867b2c90e1684442c00942f8eaa91f03cbad4168d09e5c1c8b7e2369266d106c87c1055c927f57c7ecda2d8986b7154bfad2a2821d6f69176

                                                • C:\Users\Admin\AppData\Local\Temp\1000232001\toolspub1.exe

                                                  Filesize

                                                  260KB

                                                  MD5

                                                  cf2a49424928afff26947ff8ad128f77

                                                  SHA1

                                                  8cdf0834e2d1cae732c76e37f6058ebf37e06aa4

                                                  SHA256

                                                  37316eae376e8e8c5281b5016d2ab4a65b0201ed139edef72ac4ba102eaf41cb

                                                  SHA512

                                                  6924ea2c5bcb0a3371405e9bf0d0166d512f839be0310d723b21e1acf8e6e7232857e20af800d1331c38f40bbe27a02c4145e661ed6da350a486ad7f1301ba49

                                                • C:\Users\Admin\AppData\Local\Temp\1000233001\4767d2e713f2021e8fe856e3ea638b58.exe

                                                  Filesize

                                                  4.2MB

                                                  MD5

                                                  8a3fe4db1e83d59cb6c6645b3c8679bf

                                                  SHA1

                                                  50867ff7f9225e23d62929cd63cd586518d34f4e

                                                  SHA256

                                                  5afd9cbe92416d134533742271298245510430fc6b98da57869ffc37344a5ff1

                                                  SHA512

                                                  d24f898852d528c837acdedad77cff1161ecb04a8ce854a442ddc4491dc7ee2be5ffc00c9a141b42950d29bd857492b85eef32715c9ebbda026175a8c075e258

                                                • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe

                                                  Filesize

                                                  1.9MB

                                                  MD5

                                                  91cc81462f82c0fb9fcaba053cc9348f

                                                  SHA1

                                                  9b444adf901a2f5e1baf0d0c89034601fd8e2860

                                                  SHA256

                                                  15d4314f2a105c16030e5d12291def5272072e67f10d4063184d2cb477c3438d

                                                  SHA512

                                                  2f9b3ac8c3c41e9c8983b80575ae1807f327c28c4e2cbf178c14548ee70a4c240b6627267e807c8980bf43e317fd353bd3dcd0bed0e89b2281e192a9a9bb1fd1

                                                • C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat

                                                  Filesize

                                                  35B

                                                  MD5

                                                  ff59d999beb970447667695ce3273f75

                                                  SHA1

                                                  316fa09f467ba90ac34a054daf2e92e6e2854ff8

                                                  SHA256

                                                  065d2b17ad499587dc9de7ee9ecda4938b45da1df388bc72e6627dff220f64d2

                                                  SHA512

                                                  d5ac72cb065a3cd3cb118a69a2f356314eeed24dcb4880751e1a3683895e66cedc62607967e29f77a0c27adf1c9fe0efd86e804f693f0a63a5b51b0bf0056b5d

                                                • C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exe

                                                  Filesize

                                                  5.8MB

                                                  MD5

                                                  8eeea65d388106b4489d07e025e17fed

                                                  SHA1

                                                  96651968f724c7daec51e74476403899bc7bf8c2

                                                  SHA256

                                                  69efe73bf8f9669427fb25962d104fb63ae7a4fdb4fb2f0022c7541a72c8a2c3

                                                  SHA512

                                                  1c5966906a89b8e7e83bf382c382e5ece1cf6827e7ba7e4ab4fc0ba0c91284bf398bf4822c53aab250520f7ffde231090a9e44d11493b6be8921899fb6d944d7

                                                • C:\Users\Admin\AppData\Local\Temp\RarSFX1\podaw.exe

                                                  Filesize

                                                  5.5MB

                                                  MD5

                                                  125c7efdef3f11c70b514739b1bab646

                                                  SHA1

                                                  526560d1ff7636ea4f0404eb74f5da68f7eb8e23

                                                  SHA256

                                                  2ca04fad5b8a81264292bb9877cb9c1c9f7a484cd03815ec9bb686ddf70edefa

                                                  SHA512

                                                  e08218e2415a051b9b8b7e6d28e6822341227fc5256f418c22b2b39f6d3d89e763f58b77dbbdfc792f8a8a17870136be5757c736db1c98d3437e76500f768261

                                                • C:\Users\Admin\AppData\Local\Temp\Tmp8E07.tmp

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  1420d30f964eac2c85b2ccfe968eebce

                                                  SHA1

                                                  bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                  SHA256

                                                  f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                  SHA512

                                                  6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zsrym4as.fol.ps1

                                                  Filesize

                                                  1B

                                                  MD5

                                                  c4ca4238a0b923820dcc509a6f75849b

                                                  SHA1

                                                  356a192b7913b04c54574d18c28d46e6395428ab

                                                  SHA256

                                                  6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                  SHA512

                                                  4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  96402ab6cdea8812bd1e27cbcb10552e

                                                  SHA1

                                                  6dfcef1e7387d6d4d0bb95e2157cd42f58ac1796

                                                  SHA256

                                                  92e45f72c92a968a64db634c2fc877387f3c6c8770e1edb526258a518e6472f8

                                                  SHA512

                                                  717599f4ecb6f0fb13c7f2d5b56e6a28f0274c96e669b8761fa8e63e104f0d0c13b4341a5bedc77ae65ff1a2593c30388924ec19092963259af5871d6f00fa5d

                                                • C:\Users\Admin\AppData\Local\Temp\svrht.exe

                                                  Filesize

                                                  346KB

                                                  MD5

                                                  f42bdef761c1ca4496542cdc8024073e

                                                  SHA1

                                                  5990c707a5bf75f76eb84aedaca381d854c4fbf9

                                                  SHA256

                                                  f09c622512228d56ad3555f21d6ae45549a8d25847c81385c081e5d6bfd9d813

                                                  SHA512

                                                  41fa338c987676883c29b9911459a3eb38b4cd21b16da4971945a5accc000d72c5aae4175982a4209526d103b5b3d29b8505346af444677aa8ae605300ce1b1b

                                                • C:\Users\Admin\AppData\Local\Temp\tmpC5BE.tmp

                                                  Filesize

                                                  20KB

                                                  MD5

                                                  c9ff7748d8fcef4cf84a5501e996a641

                                                  SHA1

                                                  02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

                                                  SHA256

                                                  4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

                                                  SHA512

                                                  d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

                                                • C:\Users\Admin\AppData\Local\Temp\u2gc.0.exe

                                                  Filesize

                                                  289KB

                                                  MD5

                                                  652681cfc42cc05b4812c914e4f02ba9

                                                  SHA1

                                                  39118acf00963bb2b9bafc13072cc4a3f6ce9c48

                                                  SHA256

                                                  7d417991d6a5a0d30421d721168db76c170c4a022c53a5deece2fd9d072e4246

                                                  SHA512

                                                  10dc092ec21e06efbbfa6e0fc5d286c272160d71430f3facf2c5c15f264965c052a5dac3bc516c3d514c372ca77e8f9bac9a86ffa28b8f59c4c60510ff9af0b6

                                                • C:\Users\Admin\AppData\Local\Temp\u2gc.1.zip

                                                  Filesize

                                                  3.7MB

                                                  MD5

                                                  78d3ca6355c93c72b494bb6a498bf639

                                                  SHA1

                                                  2fa4e5df74bfe75c207c881a1b0d3bc1c62c8b0e

                                                  SHA256

                                                  a1dd547a63b256aa6a16871ed03f8b025226f7617e67b8817a08444df077b001

                                                  SHA512

                                                  1b2df7bee2514aee7efd3579f5dd33c76b40606d07dba69a34c45747662fad61174db4931bca02b058830107959205e889fee74f8ccc9f6e03f9fd111761f4ea

                                                • C:\Users\Admin\AppData\Local\Temp\u2gc.2\run.exe

                                                  Filesize

                                                  2.4MB

                                                  MD5

                                                  9fb4770ced09aae3b437c1c6eb6d7334

                                                  SHA1

                                                  fe54b31b0db8665aa5b22bed147e8295afc88a03

                                                  SHA256

                                                  a05b592a971fe5011554013bcfe9a4aaf9cfc633bdd1fe3a8197f213d557b8d3

                                                  SHA512

                                                  140fee6daf23fe8b7e441b3b4de83554af804f00ecedc421907a385ac79a63164bd9f28b4be061c2ea2262755d85e14d3a8e7dc910547837b664d78d93667256

                                                • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                                  Filesize

                                                  109KB

                                                  MD5

                                                  726cd06231883a159ec1ce28dd538699

                                                  SHA1

                                                  404897e6a133d255ad5a9c26ac6414d7134285a2

                                                  SHA256

                                                  12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                                                  SHA512

                                                  9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                                                • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                                  Filesize

                                                  1.2MB

                                                  MD5

                                                  15a42d3e4579da615a384c717ab2109b

                                                  SHA1

                                                  22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                                                  SHA256

                                                  3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                                                  SHA512

                                                  1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                                                • C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe

                                                  Filesize

                                                  304KB

                                                  MD5

                                                  0c582da789c91878ab2f1b12d7461496

                                                  SHA1

                                                  238bd2408f484dd13113889792d6e46d6b41c5ba

                                                  SHA256

                                                  a6ab532816fbb0c9664c708746db35287aaa85cbb417bef2eafcd9f5eaf7cf67

                                                  SHA512

                                                  a1b7c5c13462a7704ea2aea5025d1cb16ddd622fe1e2de3bbe08337c271a4dc8b9be2eae58a4896a7df3ad44823675384dbc60bdc737c54b173909be7a0a086a

                                                • C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe

                                                  Filesize

                                                  750KB

                                                  MD5

                                                  20ae0bb07ba77cb3748aa63b6eb51afb

                                                  SHA1

                                                  87c468dc8f3d90a63833d36e4c900fa88d505c6d

                                                  SHA256

                                                  daf6ae706fc78595f0d386817a0f8a3a7eb4ec8613219382b1cbaa7089418e7d

                                                  SHA512

                                                  db315e00ce2b2d5a05cb69541ee45aade4332e424c4955a79d2b7261ab7bd739f02dc688224f031a7a030c92fa915d029538e236dbd3c28b8d07d1265a52e5b2

                                                • C:\Users\Public\Desktop\Google Chrome.lnk

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  c01f05f08621230cfd1f0be4f3a083e3

                                                  SHA1

                                                  bd3173b79a6d1cd3ae811689be33b52644926750

                                                  SHA256

                                                  02c8ec24d83d7f8532b8f3e6b28adae62c75945dc0e9e5c76375082563f2fdae

                                                  SHA512

                                                  448a81229144c8df77e496fae37d7885473506504b84d3e4532acd2dc5a156e5b7cbc9038e11c4758e5253e0fc5a13228ffa7f7de30db49a85f23e0e6a4fa326

                                                • C:\Users\Public\Desktop\Google Chrome.lnk

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  bb8fb64d7ab10519b2d9d63dde2243f1

                                                  SHA1

                                                  ca13c542b58372d279147b053ad63130a65d0634

                                                  SHA256

                                                  0189bab0ee3be1aa4db211c42fce591c9658119f4cfc498071b32680bfb52603

                                                  SHA512

                                                  4ec9c48b276f5ba0dab3172f608c00729953e6d41494deb34a020b0d929803364897fec625bd3da250e89c556827c6a00bfab80890a56221967b09c3f1702e9f

                                                • memory/368-24-0x0000000005010000-0x0000000005011000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/368-28-0x0000000005040000-0x0000000005041000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/368-26-0x0000000004FF0000-0x0000000004FF1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/368-25-0x0000000005050000-0x0000000005051000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/368-470-0x0000000000FA0000-0x0000000001472000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/368-202-0x0000000000FA0000-0x0000000001472000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/368-204-0x0000000000FA0000-0x0000000001472000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/368-29-0x0000000005070000-0x0000000005071000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/368-30-0x0000000005060000-0x0000000005061000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/368-21-0x0000000000FA0000-0x0000000001472000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/368-27-0x0000000005000000-0x0000000005001000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/368-565-0x0000000000FA0000-0x0000000001472000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/368-23-0x0000000005030000-0x0000000005031000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/368-22-0x0000000005020000-0x0000000005021000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1120-306-0x0000000001050000-0x0000000001637000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/1120-475-0x0000000001050000-0x0000000001637000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/1120-69-0x0000000001050000-0x0000000001637000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/1120-476-0x0000000001050000-0x0000000001637000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/1380-471-0x0000000001380000-0x0000000001841000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/1380-474-0x0000000001380000-0x0000000001841000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/1380-64-0x0000000001380000-0x0000000001841000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/1380-305-0x0000000001380000-0x0000000001841000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/1520-107-0x0000000000AA0000-0x0000000000AF2000-memory.dmp

                                                  Filesize

                                                  328KB

                                                • memory/2068-110-0x0000000000400000-0x000000000044C000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/2068-112-0x0000000000400000-0x000000000044C000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/2208-449-0x0000000000050000-0x00000000000A2000-memory.dmp

                                                  Filesize

                                                  328KB

                                                • memory/2312-45-0x0000000001380000-0x0000000001841000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/2312-63-0x0000000001380000-0x0000000001841000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/4124-168-0x0000000000D10000-0x0000000000D62000-memory.dmp

                                                  Filesize

                                                  328KB

                                                • memory/4124-367-0x0000000007AD0000-0x0000000007B20000-memory.dmp

                                                  Filesize

                                                  320KB

                                                • memory/4124-191-0x0000000006160000-0x00000000061D6000-memory.dmp

                                                  Filesize

                                                  472KB

                                                • memory/4124-170-0x0000000005AE0000-0x0000000005FDE000-memory.dmp

                                                  Filesize

                                                  5.0MB

                                                • memory/4124-201-0x0000000006BE0000-0x0000000006BF2000-memory.dmp

                                                  Filesize

                                                  72KB

                                                • memory/4124-313-0x0000000006EE0000-0x0000000006F46000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/4124-215-0x0000000006DC0000-0x0000000006E0B000-memory.dmp

                                                  Filesize

                                                  300KB

                                                • memory/4124-361-0x0000000008220000-0x000000000874C000-memory.dmp

                                                  Filesize

                                                  5.2MB

                                                • memory/4124-360-0x0000000007B20000-0x0000000007CE2000-memory.dmp

                                                  Filesize

                                                  1.8MB

                                                • memory/4124-200-0x0000000006CB0000-0x0000000006DBA000-memory.dmp

                                                  Filesize

                                                  1.0MB

                                                • memory/4124-172-0x00000000055C0000-0x00000000055CA000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/4124-203-0x0000000006C40000-0x0000000006C7E000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4124-197-0x0000000006A10000-0x0000000006A2E000-memory.dmp

                                                  Filesize

                                                  120KB

                                                • memory/4124-171-0x00000000055E0000-0x0000000005672000-memory.dmp

                                                  Filesize

                                                  584KB

                                                • memory/4124-199-0x0000000007140000-0x0000000007746000-memory.dmp

                                                  Filesize

                                                  6.0MB

                                                • memory/4344-535-0x000001C190840000-0x000001C190940000-memory.dmp

                                                  Filesize

                                                  1024KB

                                                • memory/4472-431-0x0000000000400000-0x0000000000592000-memory.dmp

                                                  Filesize

                                                  1.6MB

                                                • memory/4820-566-0x0000000001380000-0x0000000001841000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/4820-743-0x0000000001380000-0x0000000001841000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/4924-11-0x0000000005650000-0x0000000005651000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4924-10-0x0000000005660000-0x0000000005661000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4924-20-0x0000000001120000-0x00000000015F2000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/4924-3-0x0000000005620000-0x0000000005621000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4924-2-0x0000000005610000-0x0000000005611000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4924-6-0x00000000055E0000-0x00000000055E1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4924-7-0x00000000055F0000-0x00000000055F1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4924-1-0x0000000077414000-0x0000000077415000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4924-4-0x0000000005600000-0x0000000005601000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4924-8-0x0000000005630000-0x0000000005631000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4924-0-0x0000000001120000-0x00000000015F2000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/4924-5-0x0000000005640000-0x0000000005641000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/5024-745-0x0000000000FA0000-0x0000000001472000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/5024-572-0x0000000000FA0000-0x0000000001472000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/5180-429-0x0000018099B80000-0x0000018099B8A000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/5180-416-0x0000018099BA0000-0x0000018099BB2000-memory.dmp

                                                  Filesize

                                                  72KB

                                                • memory/5180-370-0x0000018099A00000-0x0000018099A76000-memory.dmp

                                                  Filesize

                                                  472KB

                                                • memory/5180-366-0x0000018099850000-0x0000018099872000-memory.dmp

                                                  Filesize

                                                  136KB

                                                • memory/5188-512-0x000001BD2E9F0000-0x000001BD2E9F2000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/5188-493-0x000001BD31820000-0x000001BD31830000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/5188-477-0x000001BD31720000-0x000001BD31730000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/5188-617-0x000001BD38600000-0x000001BD38601000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/5224-338-0x0000000000400000-0x000000000044E000-memory.dmp

                                                  Filesize

                                                  312KB

                                                • memory/5224-339-0x0000000000400000-0x000000000044E000-memory.dmp

                                                  Filesize

                                                  312KB

                                                • memory/5304-229-0x0000000000BA0000-0x0000000000BCE000-memory.dmp

                                                  Filesize

                                                  184KB

                                                • memory/5404-239-0x0000000000400000-0x000000000063B000-memory.dmp

                                                  Filesize

                                                  2.2MB

                                                • memory/5404-236-0x0000000000400000-0x000000000063B000-memory.dmp

                                                  Filesize

                                                  2.2MB

                                                • memory/5540-1282-0x0000025A3BB70000-0x0000025A3BBA8000-memory.dmp

                                                  Filesize

                                                  224KB

                                                • memory/5540-1281-0x0000025A3BAF0000-0x0000025A3BAF8000-memory.dmp

                                                  Filesize

                                                  32KB

                                                • memory/5540-1279-0x0000025A37A10000-0x0000025A37D10000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/5540-1275-0x0000025A1E8C0000-0x0000025A1E8CA000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/5540-1274-0x0000025A1EB30000-0x0000025A1EB92000-memory.dmp

                                                  Filesize

                                                  392KB

                                                • memory/5540-1270-0x0000025A1E8B0000-0x0000025A1E8BA000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/5540-1273-0x0000025A37890000-0x0000025A3790A000-memory.dmp

                                                  Filesize

                                                  488KB

                                                • memory/5540-1272-0x0000025A37260000-0x0000025A37312000-memory.dmp

                                                  Filesize

                                                  712KB

                                                • memory/5540-1271-0x0000025A1EAD0000-0x0000025A1EAFA000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/5540-1269-0x0000025A1EAA0000-0x0000025A1EAC4000-memory.dmp

                                                  Filesize

                                                  144KB

                                                • memory/5540-1268-0x0000025A1E960000-0x0000025A1E974000-memory.dmp

                                                  Filesize

                                                  80KB

                                                • memory/5540-1266-0x0000025A1E950000-0x0000025A1E960000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/5540-1267-0x0000025A1E970000-0x0000025A1E97C000-memory.dmp

                                                  Filesize

                                                  48KB

                                                • memory/5540-1265-0x0000025A37550000-0x0000025A37660000-memory.dmp

                                                  Filesize

                                                  1.1MB

                                                • memory/5540-1262-0x0000025A192D0000-0x0000025A1CBC8000-memory.dmp

                                                  Filesize

                                                  57.0MB

                                                • memory/5592-962-0x000000006DD40000-0x000000006E090000-memory.dmp

                                                  Filesize

                                                  3.3MB

                                                • memory/5592-820-0x00000000081C0000-0x0000000008226000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/5592-817-0x00000000053B0000-0x00000000053E6000-memory.dmp

                                                  Filesize

                                                  216KB

                                                • memory/5592-916-0x0000000008C90000-0x0000000008CCC000-memory.dmp

                                                  Filesize

                                                  240KB

                                                • memory/5592-818-0x0000000007B20000-0x0000000008148000-memory.dmp

                                                  Filesize

                                                  6.2MB

                                                • memory/5592-961-0x000000006DCF0000-0x000000006DD3B000-memory.dmp

                                                  Filesize

                                                  300KB

                                                • memory/5592-960-0x000000000A7F0000-0x000000000A823000-memory.dmp

                                                  Filesize

                                                  204KB

                                                • memory/5592-825-0x0000000008DE0000-0x0000000008E2B000-memory.dmp

                                                  Filesize

                                                  300KB

                                                • memory/5592-963-0x000000000A7D0000-0x000000000A7EE000-memory.dmp

                                                  Filesize

                                                  120KB

                                                • memory/5592-968-0x000000000A830000-0x000000000A8D5000-memory.dmp

                                                  Filesize

                                                  660KB

                                                • memory/5592-969-0x000000000AA50000-0x000000000AAE4000-memory.dmp

                                                  Filesize

                                                  592KB

                                                • memory/5592-819-0x0000000007AC0000-0x0000000007AE2000-memory.dmp

                                                  Filesize

                                                  136KB

                                                • memory/5592-1174-0x000000000A9B0000-0x000000000A9CA000-memory.dmp

                                                  Filesize

                                                  104KB

                                                • memory/5592-1179-0x000000000A990000-0x000000000A998000-memory.dmp

                                                  Filesize

                                                  32KB

                                                • memory/5592-822-0x0000000008750000-0x000000000876C000-memory.dmp

                                                  Filesize

                                                  112KB

                                                • memory/5592-821-0x00000000083A0000-0x00000000086F0000-memory.dmp

                                                  Filesize

                                                  3.3MB

                                                • memory/5620-740-0x000000001DBD0000-0x000000001DD92000-memory.dmp

                                                  Filesize

                                                  1.8MB

                                                • memory/5620-612-0x000000001BDA0000-0x000000001BDBE000-memory.dmp

                                                  Filesize

                                                  120KB

                                                • memory/5620-741-0x000000001E930000-0x000000001EE56000-memory.dmp

                                                  Filesize

                                                  5.1MB

                                                • memory/5620-469-0x0000000000190000-0x0000000000250000-memory.dmp

                                                  Filesize

                                                  768KB

                                                • memory/5620-547-0x000000001BD80000-0x000000001BD92000-memory.dmp

                                                  Filesize

                                                  72KB

                                                • memory/5620-546-0x000000001D3F0000-0x000000001D4FA000-memory.dmp

                                                  Filesize

                                                  1.0MB

                                                • memory/5620-548-0x000000001BF10000-0x000000001BF4E000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/5624-277-0x0000021592190000-0x00000215921EE000-memory.dmp

                                                  Filesize

                                                  376KB

                                                • memory/5624-276-0x00000215908E0000-0x00000215908EA000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/5624-261-0x0000021590550000-0x000002159055A000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/5796-560-0x000001CDF79A0000-0x000001CDF79A2000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/5796-558-0x000001CDF7980000-0x000001CDF7982000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/5796-556-0x000001CDF7960000-0x000001CDF7962000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/5796-553-0x000001CDE7580000-0x000001CDE7680000-memory.dmp

                                                  Filesize

                                                  1024KB

                                                • memory/5796-588-0x000001CDF84D0000-0x000001CDF84D2000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/5796-591-0x000001CDF84F0000-0x000001CDF84F2000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/5796-593-0x000001CDF8D20000-0x000001CDF8D22000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/5796-595-0x000001CDF8D40000-0x000001CDF8D42000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/6088-341-0x0000000000060000-0x0000000000951000-memory.dmp

                                                  Filesize

                                                  8.9MB

                                                • memory/6088-340-0x0000000000D30000-0x0000000000D31000-memory.dmp

                                                  Filesize

                                                  4KB