Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-11-2024 19:55

General

  • Target

    0f4af03d2ba59b5c68066c95b41bfad8.exe

  • Size

    1.6MB

  • MD5

    0f4af03d2ba59b5c68066c95b41bfad8

  • SHA1

    ecbb98b5bde92b2679696715e49b2e35793f8f9f

  • SHA256

    c263ebdc90fdb0a75d6570f178156c0ba665ac9f846b8172d7835733e5c3de59

  • SHA512

    ea4de68e9eb4a9b69527a3924783b03b4b78bffc547c53a0ecd74d0bd0b315d312ae2f17313085acd317be1e0d6f9a63e0089a8a20bf9facc5157a9b8bea95a3

  • SSDEEP

    24576:Wa0E71YwbX4e2F4fOfq444sMDF6XR5w5ZVcs5I0wzvZBjQB/CtNJb/zUJH++QLS0:vYwD4e2FkCq/yYB5alxUNJLzyiegcIZ

Malware Config

Extracted

Family

vidar

C2

https://t.me/asg7rd

https://steamcommunity.com/profiles/76561199794498376

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6

Signatures

  • Detect Vidar Stealer 17 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 21 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 54 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3520
      • C:\Users\Admin\AppData\Local\Temp\0f4af03d2ba59b5c68066c95b41bfad8.exe
        "C:\Users\Admin\AppData\Local\Temp\0f4af03d2ba59b5c68066c95b41bfad8.exe"
        2⤵
        • Checks computer location settings
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1552
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c copy Treat Treat.bat & Treat.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1496
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1396
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa opssvc"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2192
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:4924
          • C:\Windows\SysWOW64\findstr.exe
            findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2372
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 646751
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1960
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "AffiliateRobotsJoinedNewsletter" Purse
            4⤵
            • System Location Discovery: System Language Discovery
            PID:864
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Suitable + ..\Johnson + ..\July + ..\Firmware + ..\Invalid + ..\Baby + ..\Bar + ..\Continental + ..\Ruled + ..\Gay + ..\Hop + ..\Clearance + ..\Wisdom + ..\January + ..\Denmark + ..\Bull c
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4132
          • C:\Users\Admin\AppData\Local\Temp\646751\Plates.pif
            Plates.pif c
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4652
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
              5⤵
              • Uses browser remote debugging
              • Enumerates system info in registry
              • Modifies data under HKEY_USERS
              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:5088
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffec51ecc40,0x7ffec51ecc4c,0x7ffec51ecc58
                6⤵
                  PID:3108
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1964,i,16558539091489878344,8952801467103942410,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1936 /prefetch:2
                  6⤵
                    PID:2676
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1908,i,16558539091489878344,8952801467103942410,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2068 /prefetch:3
                    6⤵
                      PID:3688
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,16558539091489878344,8952801467103942410,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2428 /prefetch:8
                      6⤵
                        PID:1992
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3184,i,16558539091489878344,8952801467103942410,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3204 /prefetch:1
                        6⤵
                        • Uses browser remote debugging
                        PID:4364
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3212,i,16558539091489878344,8952801467103942410,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3252 /prefetch:1
                        6⤵
                        • Uses browser remote debugging
                        PID:540
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4280,i,16558539091489878344,8952801467103942410,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4584 /prefetch:1
                        6⤵
                        • Uses browser remote debugging
                        PID:4384
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4464,i,16558539091489878344,8952801467103942410,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4480 /prefetch:8
                        6⤵
                          PID:2052
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4544,i,16558539091489878344,8952801467103942410,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4784 /prefetch:8
                          6⤵
                            PID:780
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3224,i,16558539091489878344,8952801467103942410,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4908 /prefetch:8
                            6⤵
                              PID:4156
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4456,i,16558539091489878344,8952801467103942410,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4760 /prefetch:8
                              6⤵
                                PID:4256
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                              5⤵
                              • Uses browser remote debugging
                              • Enumerates system info in registry
                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                              • Suspicious use of FindShellTrayWindow
                              PID:2248
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec51f46f8,0x7ffec51f4708,0x7ffec51f4718
                                6⤵
                                • Checks processor information in registry
                                • Enumerates system info in registry
                                PID:2892
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,16906634199445401310,6855099879492112080,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:2
                                6⤵
                                  PID:2204
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,16906634199445401310,6855099879492112080,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:3
                                  6⤵
                                    PID:2864
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,16906634199445401310,6855099879492112080,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2592 /prefetch:8
                                    6⤵
                                      PID:4256
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2144,16906634199445401310,6855099879492112080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:1
                                      6⤵
                                      • Uses browser remote debugging
                                      PID:1724
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2144,16906634199445401310,6855099879492112080,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:1
                                      6⤵
                                      • Uses browser remote debugging
                                      PID:1964
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2144,16906634199445401310,6855099879492112080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:1
                                      6⤵
                                      • Uses browser remote debugging
                                      PID:4364
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2144,16906634199445401310,6855099879492112080,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:1
                                      6⤵
                                      • Uses browser remote debugging
                                      PID:1152
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,16906634199445401310,6855099879492112080,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:2
                                      6⤵
                                        PID:3932
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,16906634199445401310,6855099879492112080,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:2
                                        6⤵
                                          PID:2268
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,16906634199445401310,6855099879492112080,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2452 /prefetch:2
                                          6⤵
                                            PID:1276
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,16906634199445401310,6855099879492112080,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2516 /prefetch:2
                                            6⤵
                                              PID:2204
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,16906634199445401310,6855099879492112080,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4680 /prefetch:2
                                              6⤵
                                                PID:1960
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,16906634199445401310,6855099879492112080,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3672 /prefetch:2
                                                6⤵
                                                  PID:1320
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,16906634199445401310,6855099879492112080,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3700 /prefetch:2
                                                  6⤵
                                                    PID:3800
                                                • C:\ProgramData\ECBAEBGHDA.exe
                                                  "C:\ProgramData\ECBAEBGHDA.exe"
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetThreadContext
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4900
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                    6⤵
                                                    • Suspicious use of SetThreadContext
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3940
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                      7⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3992
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 152
                                                        8⤵
                                                        • Program crash
                                                        PID:4516
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 256
                                                    6⤵
                                                    • Program crash
                                                    PID:1592
                                                • C:\ProgramData\IJKFHDBKFC.exe
                                                  "C:\ProgramData\IJKFHDBKFC.exe"
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetThreadContext
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4752
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                    6⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3036
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 140
                                                    6⤵
                                                    • Program crash
                                                    PID:3512
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\DBGHJEBKJEGH" & exit
                                                  5⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2424
                                                  • C:\Windows\SysWOW64\timeout.exe
                                                    timeout /t 10
                                                    6⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Delays execution with timeout.exe
                                                    PID:5116
                                              • C:\Windows\SysWOW64\choice.exe
                                                choice /d y /t 5
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2936
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /c schtasks.exe /create /tn "Enjoy" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SkySync Technologies\SkySync.js'" /sc minute /mo 5 /F
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of WriteProcessMemory
                                            PID:2880
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks.exe /create /tn "Enjoy" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SkySync Technologies\SkySync.js'" /sc minute /mo 5 /F
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2340
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SkySync.url" & echo URL="C:\Users\Admin\AppData\Local\SkySync Technologies\SkySync.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SkySync.url" & exit
                                            2⤵
                                            • Drops startup file
                                            • System Location Discovery: System Language Discovery
                                            PID:2904
                                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                          1⤵
                                            PID:3252
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                            1⤵
                                              PID:4712
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4900 -ip 4900
                                              1⤵
                                                PID:1992
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4752 -ip 4752
                                                1⤵
                                                  PID:4284
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3992 -ip 3992
                                                  1⤵
                                                    PID:4464

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\ProgramData\ECBAEBGHDA.exe

                                                    Filesize

                                                    761KB

                                                    MD5

                                                    8c66851a94f593031f78c4b0139aa0fe

                                                    SHA1

                                                    77d44ebb62b4acb59cbbab47151de0260fa77889

                                                    SHA256

                                                    801f91b149ccc94aef57d7052af2a68663c9549d538ef47f9d657e68b556a207

                                                    SHA512

                                                    72896b71f972dff1bd911662f4beb86fccfcc6882588b1559708e973f6295c778938eb264103fb6286145a2e7ecf08eeed928f4d83d73c39807323beb75a0f2f

                                                  • C:\ProgramData\IJKFHDBKFC.exe

                                                    Filesize

                                                    751KB

                                                    MD5

                                                    6a054f0935f2ece44e58f88353ad230d

                                                    SHA1

                                                    ff8fd9fe483e9e8ee767e77f7ccab4f4207ff0f1

                                                    SHA256

                                                    2751c72ca341d5a05b1f4b947ebba74bf1e679b388cf560a104918a71adbcc5b

                                                    SHA512

                                                    85e5db38d7c2e179c9d6bc5e76d9666e4f40c331cb6eca37cd264b1cac7c87ed64a7d8981fa198d57cf0ab645b55e7598a305f2763899877be4c09fc9f52f0df

                                                  • C:\ProgramData\chrome.dll

                                                    Filesize

                                                    676KB

                                                    MD5

                                                    eda18948a989176f4eebb175ce806255

                                                    SHA1

                                                    ff22a3d5f5fb705137f233c36622c79eab995897

                                                    SHA256

                                                    81a4f37c5495800b7cc46aea6535d9180dadb5c151db6f1fd1968d1cd8c1eeb4

                                                    SHA512

                                                    160ed9990c37a4753fc0f5111c94414568654afbedc05308308197df2a99594f2d5d8fe511fd2279543a869ed20248e603d88a0b9b8fb119e8e6131b0c52ff85

                                                  • C:\ProgramData\mozglue.dll

                                                    Filesize

                                                    593KB

                                                    MD5

                                                    c8fd9be83bc728cc04beffafc2907fe9

                                                    SHA1

                                                    95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                    SHA256

                                                    ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                    SHA512

                                                    fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                  • C:\ProgramData\nss3.dll

                                                    Filesize

                                                    2.0MB

                                                    MD5

                                                    1cc453cdf74f31e4d913ff9c10acdde2

                                                    SHA1

                                                    6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                    SHA256

                                                    ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                    SHA512

                                                    dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                    Filesize

                                                    649B

                                                    MD5

                                                    0edd9af43c568f84503587162de75e0d

                                                    SHA1

                                                    4e18cc2beda2fe1f419f527a2fb3fefb81fb94e2

                                                    SHA256

                                                    149ef97474735af2ed841ec5e6416f7573ba752d87e204906ec1749614f2abbb

                                                    SHA512

                                                    f390768eb3d6eb3b9c598501e0aa6f8054ad3532ffc6c2b62e19460b26eedb00db2d93ce61390392af59cf4da04d1fee0168579458cb262d09661ac35d78cf3e

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                    Filesize

                                                    2B

                                                    MD5

                                                    d751713988987e9331980363e24189ce

                                                    SHA1

                                                    97d170e1550eee4afc0af065b78cda302a97674c

                                                    SHA256

                                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                    SHA512

                                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\0b593f03-97e1-444c-bccd-decbb11c0896.dmp

                                                    Filesize

                                                    825KB

                                                    MD5

                                                    91afb67e82fd808264f02ae917493aee

                                                    SHA1

                                                    42b6de551e3b07199608cb33c3a09f6e0f0918a3

                                                    SHA256

                                                    a37dc4a705f67eedf4d3cb8cf4044f1329c7ccce3a2bc3d4ef82e32ffc0c58a5

                                                    SHA512

                                                    e51a9480aff6faaadea0482e5deae14341779b1962ae2c29bf52018c47d03cc19ad48d5b93ce2a3b48536099472a8eaad87992ca232a19d197674ab55ec98d8b

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\0c189d1e-f01d-4356-9aee-e5969cdea990.dmp

                                                    Filesize

                                                    838KB

                                                    MD5

                                                    75ccefccbcb1b65422e41126935eef92

                                                    SHA1

                                                    08e704d1521a3e9a3266cce179e8664c89a6db1c

                                                    SHA256

                                                    ffab83da7910458470c5c511c1d58280d7776635a4d9f779e8aae9e8a734ef88

                                                    SHA512

                                                    3761b1b145d044caed40612973030bec947b905f424bfc0e9e54989e038ad38b16c52503620d7daadc028bfc947a083b77f01826d283ecabaf62727c70b12045

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\12c79d24-5d6a-4835-b483-8b93968c2478.dmp

                                                    Filesize

                                                    825KB

                                                    MD5

                                                    6953cce8730daad658157ade4a1af3b7

                                                    SHA1

                                                    4af069676dedde1a0098d8c2216c5325c4d23690

                                                    SHA256

                                                    cf5d6534fe45902c8a6c444f49cddacde04fd90c77b80d2603c6a52732b3cb87

                                                    SHA512

                                                    6c61afcda4777399c645ce1af82506800cf2df739a50471d49ae0c9f51269f3c48512313a8bc330435f56161145f97e182230d1174c1a0b287748ab75f540c3a

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\1f828b6c-13e2-4bba-b5a8-2789455780ac.dmp

                                                    Filesize

                                                    826KB

                                                    MD5

                                                    5ec48f9b2f3acb65fa6fe8ff5bf852c2

                                                    SHA1

                                                    822e4ac10491c0ac3572050170a91baa0704ecb2

                                                    SHA256

                                                    630a0d6881780f7cd1e1424897cd5b35b6bc65a6d766b220f75f5bdf0650d073

                                                    SHA512

                                                    b765b92094e6a39a8130958550fd455ef5ebec0465c15d02f5ed3b92c8a8b4083d14854381a194b91ac7bd01bd06c974f964ca81d410845f78de5e98b2df0da3

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\24618dd1-b1e9-4295-a139-9dc3cec6b473.dmp

                                                    Filesize

                                                    829KB

                                                    MD5

                                                    8a9d6aebf3ed0fd56c5ab735e3369e7f

                                                    SHA1

                                                    bb1311ba0c9dfe8c68fc26f8b5e93e70fbb9277b

                                                    SHA256

                                                    2a615fc1761e89f88923be11b18f79bf2a47b74e4356644ad89c30749a68e287

                                                    SHA512

                                                    b13695c73a4dc42f470157f46d345e51f05018b4052246f0f41f68748a7eb49a088bbbf0a1f919c2d39a3bf56759d67f3b2c609cc1c572d4626e12125089e020

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\8de930ee-39c1-498c-bd8b-7cdde76d2061.dmp

                                                    Filesize

                                                    838KB

                                                    MD5

                                                    7ceb28f427e3880fed0895e2532d8d7f

                                                    SHA1

                                                    90bce9992d6c27445966d9eccac12b63add0a1fe

                                                    SHA256

                                                    0ecdb41de164e4012a173dc99d716f3e460ad66cfb8d6193bc3de8056b4c3c93

                                                    SHA512

                                                    bbcff101b4a3a66440402e570d7aeeca1d92c6be46ed29dea29ec12366cdba6169e87b0532b209e859dcd4cc697eeecb9e45196ee4675ef2bb37841f5aaae9cc

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\e6520a0e-1a36-47a5-b318-5d0fe7c0692b.dmp

                                                    Filesize

                                                    838KB

                                                    MD5

                                                    c306df964836e636c4fbdb981b1c1186

                                                    SHA1

                                                    0ac0cb831e5db8169c246e8f7557283c3f4cd7d3

                                                    SHA256

                                                    e30ba5e5f8974bb8cbb222ed4920600864163b8057eebea000ba66bc54f625ed

                                                    SHA512

                                                    dcc2a59f6a8c679932ccd6affb6b6d1a9541ebcac61ae15d55f78e3814af4b58a4aa7073601bea9b5dd808c9df53bb9e65c744b414cb906917693826233b4e62

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    1cdf62f9fb59d3291fe18697de1aee91

                                                    SHA1

                                                    7a2eb7dd24e883da105e31f6135db778ea2789a9

                                                    SHA256

                                                    0e849eb2bf752d1b09c01df8a76fd378d6e329d30d85af2fe08ac3b9bc3c916b

                                                    SHA512

                                                    9814619aba77470213e407dfb4060c961107adfbd50715ec3dc39d573f6603707480e0c831efedc7447e585aebee3f5b0fdfbe5e4adab1b2314818e47f951cd8

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    36988ca14952e1848e81a959880ea217

                                                    SHA1

                                                    a0482ef725657760502c2d1a5abe0bb37aebaadb

                                                    SHA256

                                                    d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6

                                                    SHA512

                                                    d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    fab8d8d865e33fe195732aa7dcb91c30

                                                    SHA1

                                                    2637e832f38acc70af3e511f5eba80fbd7461f2c

                                                    SHA256

                                                    1b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea

                                                    SHA512

                                                    39a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    cb61a2653cd8e3516ac9962ea976e899

                                                    SHA1

                                                    aa806194809e8f7e3175f6b80ff32e68f91e9463

                                                    SHA256

                                                    9ac2436bfb1f6278482d3e42347d266f0ddff4223a81ed161f104f0f6e0bf24d

                                                    SHA512

                                                    3024d1b3bd8078c82e7dc1bdf66cdc2d45298c90fc53ba6bacd3cd2b680bee7c1810fd9413750a225076c0b2924ae943db1550d9af57899b596517da90eddb30

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    b6e8ab6fc50ab22e3e439a42feac742d

                                                    SHA1

                                                    101b98da1180f8f54021fc97abf0d4bf1323ce00

                                                    SHA256

                                                    9e7f29f837c7d16bbbcde156be6697530f279482eb671a86dc2eb256fca06a3f

                                                    SHA512

                                                    acba5b9b85e71c4762015756baecfb76d0a8daff09d561b00e4e52121bf429365d7cf4e78a0afad7c7b507ca1202491e4431d34dc0b81d1b526bdcd8e8336542

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    f0b8cdca128b55fafb3d97cd0285ff6b

                                                    SHA1

                                                    301d4080f597ac5d9d827d6d792e734db4536047

                                                    SHA256

                                                    74b7595e87023ac1bcf8413f6be0f46bb43b0c6a2a27177002e6581c83ac2e32

                                                    SHA512

                                                    b77847abe6abcd3a542b843b354af0e3a0b64a113a8734ae261488029dd556f69674dc2b1734506cc5babd580e0d0d46d45fe718efff3d0513b99df6aae0498b

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                    Filesize

                                                    264KB

                                                    MD5

                                                    f50f89a0a91564d0b8a211f8921aa7de

                                                    SHA1

                                                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                    SHA256

                                                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                    SHA512

                                                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                  • C:\Users\Admin\AppData\Local\Temp\646751\Plates.pif

                                                    Filesize

                                                    872KB

                                                    MD5

                                                    18ce19b57f43ce0a5af149c96aecc685

                                                    SHA1

                                                    1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

                                                    SHA256

                                                    d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

                                                    SHA512

                                                    a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

                                                  • C:\Users\Admin\AppData\Local\Temp\646751\c

                                                    Filesize

                                                    1.1MB

                                                    MD5

                                                    e9040d6e82ffa0f28cecfb9c4cedc0ea

                                                    SHA1

                                                    0c899a8a0b527e4f9d8542facfae9c73ff2c2595

                                                    SHA256

                                                    cf1c104480409dea5f86c6f0323ef71232ab062b7e719a7a10e2b69a3412f1a5

                                                    SHA512

                                                    9f5e8c989c2a0ba8ef133ad7c95a6b70a849bfe5ca5f7f46ea9e9dcdd568800f9393c884def0fde00dc60d26251f8a81e65eff826555b0b6102faeaf4f890933

                                                  • C:\Users\Admin\AppData\Local\Temp\Baby

                                                    Filesize

                                                    82KB

                                                    MD5

                                                    ee7c47686d35a3e258c1f45053cc75ab

                                                    SHA1

                                                    72341f88c79d79cb44ef60fc33783b9f14ff1ee8

                                                    SHA256

                                                    b199ba689f6b383644345854c758629b925f9cb853c0e4e1dcb4d0f891be5eba

                                                    SHA512

                                                    f007c9c101650842dd7b57310d22a0c04fa1fa71f1388285f55fe9cc0b70dbe7a1964ace594793bd707db07c3ea4911bfd21c458993b1bec8fa155250dac2471

                                                  • C:\Users\Admin\AppData\Local\Temp\Bar

                                                    Filesize

                                                    61KB

                                                    MD5

                                                    b01f3d096606e9762d0a6b305163c763

                                                    SHA1

                                                    95c3623ad2693cfff27bc1f2fa60e5fb3292f4d7

                                                    SHA256

                                                    adacdc0798acbc5bec0377956876c8b94b52528f51bb998c1f7f1cd2f0db5088

                                                    SHA512

                                                    99e4fb8914a35396395638eb1542fb096ff3cb9ce56258e89350fe49738344819e707a3aa4c9731f02a47da5432a6ec96c42c121b1e8a7113e8aaff250c27b58

                                                  • C:\Users\Admin\AppData\Local\Temp\Bull

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    bca7d728d907c651e17ce086fe7e56ff

                                                    SHA1

                                                    b91db7b274cf33c643c33edc13ec122564d798de

                                                    SHA256

                                                    f837e6522cf5992ed8c1f016c95f84948a83c891294e1aebf0688e3275d3c593

                                                    SHA512

                                                    34ec6af89ebe2c3625dcfb4961df148bd57042084a252d352837663e6a1aaa097a82a7138211a73a046f3b2eea7c459faaa80b22cf9098805f46548926f3b8c3

                                                  • C:\Users\Admin\AppData\Local\Temp\Care

                                                    Filesize

                                                    866KB

                                                    MD5

                                                    c1f370ffaaea402a8c74c0987b2844dd

                                                    SHA1

                                                    751f94ebcbea6a4d62bf382f18cf83156b57ba44

                                                    SHA256

                                                    3ba807e13102e920b109e89933b2b7fcd0612778dad22f9fb3b0b70f680dc573

                                                    SHA512

                                                    92dfac93bf8cc7f22f0043c4ee36be0e63057242584c238e6625666a24d4a38e736be1910be3eeef14ef3573154c16750bd99a9f5be933b25d757d6715c86456

                                                  • C:\Users\Admin\AppData\Local\Temp\Clearance

                                                    Filesize

                                                    59KB

                                                    MD5

                                                    11bbe9e6529811962d78cab3d0ee1c43

                                                    SHA1

                                                    f96714a4791c2f655c6abf7288474c07dd48bc84

                                                    SHA256

                                                    7cb10878d4544e53ca4730ab78c244f2e46ed76a7d1329c5c0e01fef8204cca3

                                                    SHA512

                                                    d6fd22a48a1f8d725d921a59ee4ddba149235a329d6ea70dde8e956c080823c38479d2702b7cba27a4c0e7fbb9d028c0e876ae2f0d2f6dced8ad8ec8e179baf8

                                                  • C:\Users\Admin\AppData\Local\Temp\Continental

                                                    Filesize

                                                    95KB

                                                    MD5

                                                    ecf9598497596bde26d0ad70777d6d75

                                                    SHA1

                                                    5225aa0982dc031c7361b72cdeff4b7e373f983e

                                                    SHA256

                                                    013836f48c6a0b07dcfba2e219d0e5e4733f6959b9c683f2c7ddf213c973b18b

                                                    SHA512

                                                    26d8e83f6b215a15c87f1ea4355502964cc84c3e991c7c93b47c977b9bfaa17248d7d8a8a8122e80d0187c5b63c831fda65cd7bcf0ca2299a13a2663286183fe

                                                  • C:\Users\Admin\AppData\Local\Temp\Denmark

                                                    Filesize

                                                    57KB

                                                    MD5

                                                    006481206cbd4c83fa649632f7222ef1

                                                    SHA1

                                                    6e2a05cddac05ce304a77460c6bd7b3f890393f5

                                                    SHA256

                                                    42390451e4799e041cf688fe02a9c33b6aa1b1d873f5b8c954b0ed8ba0af63a3

                                                    SHA512

                                                    ee44850bc2b0390394080198be27e8b74b6ee46e6e379bb3f3f9a4ba53830ecfe955efab4b2beec341ed302a110824350071c716dee80b984d465a7d4419d69a

                                                  • C:\Users\Admin\AppData\Local\Temp\Firmware

                                                    Filesize

                                                    95KB

                                                    MD5

                                                    4ac36f51637d82d4d2354108de385a58

                                                    SHA1

                                                    0c556b79cc52b6710dadcfde1044c1481d996f33

                                                    SHA256

                                                    0efec48bed8c476258cfc1a5a9694d42837234134d0947a2f9c041752f7485e0

                                                    SHA512

                                                    ef661c0c5457002d521c8790e37bd286344a77dea70a9ea0f7bf74a22e6f3722ad67f0546047c29166cd273c6f9415ba0dc7f68d2282ae2e4c7ebd38402afd9a

                                                  • C:\Users\Admin\AppData\Local\Temp\Gay

                                                    Filesize

                                                    99KB

                                                    MD5

                                                    997016fd2fa51b13fdff955e76b66d21

                                                    SHA1

                                                    1190f5454bb69687440fbe9699b26bf1a7dc65de

                                                    SHA256

                                                    06978fa33a74ef4c3b3d4971bbb2b8efff84dad1fe2f822dd8c3e179dd3bd880

                                                    SHA512

                                                    d9ca616e7cdbc7f7376ca75a9ea1e75dd140fecacdf5744f3dd36ddb2c332d37649016e495179e0832f8545fb2579150c6664c7678cb08841f7add1148be2865

                                                  • C:\Users\Admin\AppData\Local\Temp\Hop

                                                    Filesize

                                                    78KB

                                                    MD5

                                                    246993f804971aff1da64d44386bef26

                                                    SHA1

                                                    8d04fb03b432670ee3b207fcbc616231ec862285

                                                    SHA256

                                                    0bc854aa1b688f84e401919b4c2308f31b88c24068cb64b18bc8f8531f7bcc2c

                                                    SHA512

                                                    2a181d37404fff73f897164152a1076a47517beafa5fe4852544b2f826cc5e700ee5ed0a86ec89ac748a310e34e95a3c0ee8a0656bed283340e25d24346dd5f6

                                                  • C:\Users\Admin\AppData\Local\Temp\Invalid

                                                    Filesize

                                                    78KB

                                                    MD5

                                                    804f99fc8fef68f602b5be45a6008a88

                                                    SHA1

                                                    82c7298d0abf37dedb6cf5420eace6020e4b9ca2

                                                    SHA256

                                                    8cb4e2b1e61169ab59989e55ebe8c8234dbc13c571b5c87ee90ea4c0dd3f04c1

                                                    SHA512

                                                    9573e28719d68a50e2171f3d9eda5af01236011b16efab4e90f0597612f9dbfe35ba7f137da965a5016e19c2a31e8c68de700588062eea0dd206dae0641197ad

                                                  • C:\Users\Admin\AppData\Local\Temp\January

                                                    Filesize

                                                    65KB

                                                    MD5

                                                    06b437c07120c91c7f92ce0bc670ab1d

                                                    SHA1

                                                    17f58c591c6f8bcfd92e88022dbb16d14c860c18

                                                    SHA256

                                                    cda405b2f101febc4d73784eb66a0fb6241a068448f1f59da50f94d6427d2491

                                                    SHA512

                                                    f49a3f0c9b4e6aca1a3c07183cee4a17ae0b6deb1dd95bfd63b50c768a10243bd49a46fbac3afd626cce4cfb50f9dcc9fa3ebe287955042aab705e305f747095

                                                  • C:\Users\Admin\AppData\Local\Temp\Johnson

                                                    Filesize

                                                    87KB

                                                    MD5

                                                    45fce45ac7ba97912a521f861fffda46

                                                    SHA1

                                                    f8b2190331947ea12e4b01a575cffc336d0e1821

                                                    SHA256

                                                    23dbd2c3962063f75956f209933f5bbfc5f20364e4bacc198d32b832f624a49c

                                                    SHA512

                                                    099dc0f6a696c4186b046a23ef532aa893d437c59fdb820eaee085516fedf28f4123f0239708e8ebe36ee405e4fca358b6175edf5b09cde69006c16180e56031

                                                  • C:\Users\Admin\AppData\Local\Temp\July

                                                    Filesize

                                                    96KB

                                                    MD5

                                                    04cad2ab332f64c6161a3a4308db8fd7

                                                    SHA1

                                                    016a65c178852632b151eb917ebf7623bb9dffc0

                                                    SHA256

                                                    9c4a70cf8295104b4b13fe9f7f99af2690ae94760521055c0f492169c1377df2

                                                    SHA512

                                                    bf597406dc401f26d91679ef3aa275f6fe1549a0ae5424acb6879a7b003e53c3936a3e290ccf228cc1d2aaa67fa2a8b78cccae929aaf7397d33e363df52dd243

                                                  • C:\Users\Admin\AppData\Local\Temp\Purse

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    ef125e0bf013c42de1651613d7ba0375

                                                    SHA1

                                                    8b50ccabd5f95d730b5744a2d6460afc5bf7e9c7

                                                    SHA256

                                                    25ba04aa9001223300db69f53e972056137193689eb964862228707099e618ba

                                                    SHA512

                                                    23d9cb80f032f61f403d4cd6090e9a4e3849ad4a1002213a9838b1dce4c12da2f7e8ee5e6a9e366527f972ef572b8341845d64d876f95164132fa4e231f8f76c

                                                  • C:\Users\Admin\AppData\Local\Temp\Ruled

                                                    Filesize

                                                    85KB

                                                    MD5

                                                    aa5c108559abe590bc4edf77e20e2f2d

                                                    SHA1

                                                    88d41d1d1dbd210226b353339e89fca3d1664fc1

                                                    SHA256

                                                    bb324d7599d0862f7e788f941204d85e7b47dc921e3d38a9a48acf80fcd0d0d2

                                                    SHA512

                                                    091519a9ef4bf0a08e02adf30d627c2220a2374b10880a4d7e0eea3e4f39fe293214da3ae9051aa9ad0c83c41419996f44d56b5e878f0bcb352d67a271af39ea

                                                  • C:\Users\Admin\AppData\Local\Temp\Suitable

                                                    Filesize

                                                    67KB

                                                    MD5

                                                    9a86a061ac6f60588a603dab694901fb

                                                    SHA1

                                                    542fa7abe87867d17de53c1b430f02b6baa6c97a

                                                    SHA256

                                                    aefc1a30b5a9cae66fa5e1e51b0f73e7214c6b5a07d14819e9c50cadf925517e

                                                    SHA512

                                                    3892e394720d527962b09b6fb03b6c3639cf8e458808d36a1c910823801e54a548690260421cef7d69e4b365fa4cd09778bc9958a20c898f70783ea53373fca8

                                                  • C:\Users\Admin\AppData\Local\Temp\Treat

                                                    Filesize

                                                    28KB

                                                    MD5

                                                    84e3f6bfcd653acdb026346c2e116ecc

                                                    SHA1

                                                    43947c2dc41318970cccef6cdde3da618af7895e

                                                    SHA256

                                                    00a0c805738394dfed356aae5a33ce80d8f751c3b5d7e09293817c07fbaeb9fd

                                                    SHA512

                                                    eeba8f5c0f9163bc38080ac7cfcc5babf9dfdf36b34b341416ca969b9f19cebb141f8b0d2e12e7c41d886eec36e23cf1525a7ce28785ad09154bc3db78ca0591

                                                  • C:\Users\Admin\AppData\Local\Temp\Wisdom

                                                    Filesize

                                                    52KB

                                                    MD5

                                                    5efee5d7edbe127050e3ea3d197120ab

                                                    SHA1

                                                    5fa5546f2890ea0298314d46ed7f0bec3819c3f6

                                                    SHA256

                                                    ae4adae2962a4dfca41929164973d98217401cfa39264f3a367220e09dc87e8b

                                                    SHA512

                                                    3644b60eaee9d35e9fe33db8571d0fbe19c61ced979a68098be93c3cdfaf2a82b3ef8329a015fc0644a48c19782a27864948c120744b2d01d6e0284803dcfc61

                                                  • memory/3940-1168-0x0000000000400000-0x000000000045E000-memory.dmp

                                                    Filesize

                                                    376KB

                                                  • memory/3940-1177-0x0000000007400000-0x00000000074F4000-memory.dmp

                                                    Filesize

                                                    976KB

                                                  • memory/3940-1176-0x00000000075B0000-0x0000000007B54000-memory.dmp

                                                    Filesize

                                                    5.6MB

                                                  • memory/3940-1175-0x0000000006D70000-0x0000000006E02000-memory.dmp

                                                    Filesize

                                                    584KB

                                                  • memory/3940-1173-0x0000000006AE0000-0x0000000006BCA000-memory.dmp

                                                    Filesize

                                                    936KB

                                                  • memory/3940-1171-0x0000000005420000-0x0000000005486000-memory.dmp

                                                    Filesize

                                                    408KB

                                                  • memory/3940-1170-0x0000000005940000-0x0000000005F58000-memory.dmp

                                                    Filesize

                                                    6.1MB

                                                  • memory/3940-1169-0x0000000005260000-0x000000000531C000-memory.dmp

                                                    Filesize

                                                    752KB

                                                  • memory/3992-1185-0x0000000000400000-0x00000000004B6000-memory.dmp

                                                    Filesize

                                                    728KB

                                                  • memory/3992-1182-0x0000000000400000-0x00000000004B6000-memory.dmp

                                                    Filesize

                                                    728KB

                                                  • memory/3992-1184-0x0000000000400000-0x00000000004B6000-memory.dmp

                                                    Filesize

                                                    728KB

                                                  • memory/3992-1181-0x0000000000400000-0x00000000004B6000-memory.dmp

                                                    Filesize

                                                    728KB

                                                  • memory/4652-665-0x0000000004860000-0x0000000004B60000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/4652-664-0x0000000004860000-0x0000000004B60000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/4652-662-0x0000000004860000-0x0000000004B60000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/4652-1132-0x0000000004860000-0x0000000004B60000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/4652-1133-0x0000000004860000-0x0000000004B60000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/4652-1140-0x0000000004860000-0x0000000004B60000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/4652-1141-0x0000000004860000-0x0000000004B60000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/4652-661-0x0000000004860000-0x0000000004B60000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/4652-660-0x0000000004860000-0x0000000004B60000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/4652-1110-0x0000000004860000-0x0000000004B60000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/4652-1109-0x0000000004860000-0x0000000004B60000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/4652-663-0x0000000004860000-0x0000000004B60000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/4652-1103-0x0000000004860000-0x0000000004B60000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/4652-743-0x0000000004860000-0x0000000004B60000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/4652-683-0x0000000004860000-0x0000000004B60000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/4652-684-0x0000000004860000-0x0000000004B60000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/4652-934-0x0000000004860000-0x0000000004B60000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/4652-685-0x0000000010000000-0x000000001025F000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/4652-735-0x0000000004860000-0x0000000004B60000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/4652-736-0x0000000004860000-0x0000000004B60000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/4652-742-0x0000000004860000-0x0000000004B60000-memory.dmp

                                                    Filesize

                                                    3.0MB