Analysis

  • max time kernel
    98s
  • max time network
    100s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250113-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    16-01-2025 12:11

General

  • Target

    Activator MB 5x.exe

  • Size

    63.0MB

  • MD5

    43afa5af888e4b0b6571944596606635

  • SHA1

    992cd7d8e76a462871d2fefd6b86f6e43c6bb744

  • SHA256

    01b3bf3f65832f1e9e59ee76964dcf01ac928e51588192607d43319ff070a719

  • SHA512

    a8798ca5162ee3f09ee53c833742be396dc75ad19afeb9900195e13f53b4a8d08a95bf7af846c1a8de4e0a65b750eb6bb793f6f38502235fefc58f1011fcdb45

  • SSDEEP

    1572864:fKX+chn06/nUUX4WjBQ0KO7xWt40sDxCgj0d7NzKXJ6U6:f2+chnB/U2B7HxWC0sDxxjMUJ6b

Malware Config

Signatures

  • Drops file in Drivers directory 16 IoCs
  • Sets service image path in registry 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 12 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
  • Loads dropped DLL 61 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Start PowerShell.

  • Drops file in System32 directory 6 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 20 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 47 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 11 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious behavior: LoadsDriver 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 21 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Activator MB 5x.exe
    "C:\Users\Admin\AppData\Local\Temp\Activator MB 5x.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2920
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8JCQ7FRK.bat" "C:\Users\Admin\AppData\Local\Temp\Activator MB 5x.exe""
      2⤵
      • Drops file in Drivers directory
      • Suspicious use of WriteProcessMemory
      PID:1416
      • C:\Users\Admin\AppData\Local\Temp\qbE5759A9.0E\7z2201.exe
        "C:\Users\Admin\AppData\Local\Temp\qbE5759A9.0E\7z2201.exe" /S
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        PID:4348
      • C:\Program Files (x86)\7-Zip\7z.exe
        "C:\Program Files (x86)\7-Zip\7z.exe" x "C:\Users\Admin\AppData\Local\Temp\qbE5759A9.0E\ma.7z" -o"C:\Users\Admin\AppData\Local\Temp" -phfdgjjfdgdfgGFDGdfy76ygdsjhks6h -y
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2472
      • C:\Windows\system32\xcopy.exe
        xcopy /C /H /Q /R /Y /E C:\Users\Admin\AppData\Local\Temp\MB2Migration C:\ProgramData\MB2Migration
        3⤵
          PID:436
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\pb.cmd"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3260
          • C:\Windows\system32\mode.com
            mode con:cols=86 lines=36
            4⤵
              PID:4800
            • C:\Windows\system32\chcp.com
              chcp 65001
              4⤵
                PID:3400
              • C:\Windows\system32\mode.com
                mode 70,4
                4⤵
                  PID:4048
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c copy/Z "C:\Users\Admin\AppData\Local\Temp\pb.cmd" nul
                  4⤵
                    PID:3548
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c echo prompt $H|cmd
                    4⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4744
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo prompt $H"
                      5⤵
                        PID:3804
                      • C:\Windows\system32\cmd.exe
                        cmd
                        5⤵
                          PID:3824
                      • C:\Windows\system32\timeout.exe
                        timeout.exe 5
                        4⤵
                        • Delays execution with timeout.exe
                        PID:4464
                      • C:\Windows\system32\timeout.exe
                        timeout.exe 5
                        4⤵
                        • Delays execution with timeout.exe
                        PID:4704
                      • C:\Windows\system32\timeout.exe
                        timeout.exe 5
                        4⤵
                        • Delays execution with timeout.exe
                        PID:4332
                      • C:\Windows\system32\timeout.exe
                        timeout.exe 5
                        4⤵
                        • Delays execution with timeout.exe
                        PID:2348
                      • C:\Windows\system32\timeout.exe
                        timeout.exe 5
                        4⤵
                        • Delays execution with timeout.exe
                        PID:3236
                      • C:\Windows\system32\timeout.exe
                        timeout.exe 5
                        4⤵
                        • Delays execution with timeout.exe
                        PID:4816
                      • C:\Windows\system32\timeout.exe
                        timeout.exe 5
                        4⤵
                        • Delays execution with timeout.exe
                        PID:1624
                      • C:\Windows\system32\timeout.exe
                        timeout.exe 5
                        4⤵
                        • Delays execution with timeout.exe
                        PID:3760
                      • C:\Windows\system32\timeout.exe
                        timeout.exe 5
                        4⤵
                        • Delays execution with timeout.exe
                        PID:1396
                      • C:\Windows\system32\timeout.exe
                        timeout.exe 5
                        4⤵
                        • Delays execution with timeout.exe
                        PID:524
                      • C:\Windows\system32\timeout.exe
                        timeout.exe 5
                        4⤵
                        • Delays execution with timeout.exe
                        PID:4604
                      • C:\Windows\system32\timeout.exe
                        timeout.exe 5
                        4⤵
                        • Delays execution with timeout.exe
                        PID:3144
                      • C:\Windows\system32\timeout.exe
                        timeout.exe 5
                        4⤵
                        • Delays execution with timeout.exe
                        PID:416
                      • C:\Windows\system32\timeout.exe
                        timeout.exe 5
                        4⤵
                        • Delays execution with timeout.exe
                        PID:4384
                      • C:\Windows\system32\timeout.exe
                        timeout.exe 5
                        4⤵
                        • Delays execution with timeout.exe
                        PID:1176
                      • C:\Windows\system32\timeout.exe
                        timeout.exe 5
                        4⤵
                        • Delays execution with timeout.exe
                        PID:4256
                      • C:\Windows\system32\timeout.exe
                        timeout.exe 5
                        4⤵
                        • Delays execution with timeout.exe
                        PID:852
                      • C:\Windows\system32\timeout.exe
                        timeout.exe 5
                        4⤵
                        • Delays execution with timeout.exe
                        PID:4420
                      • C:\Windows\system32\xcopy.exe
                        xcopy /C /H /Q /R /Y "C:\ProgramData\tl\LicenseConfig.json" "C:\ProgramData\Malwarebytes\MBAMService\config"
                        4⤵
                          PID:2128
                        • C:\Windows\system32\xcopy.exe
                          xcopy /C /H /Q /R /Y "C:\ProgramData\tl\ScanConfig.json" "C:\ProgramData\Malwarebytes\MBAMService\config"
                          4⤵
                            PID:2744
                          • C:\Windows\system32\attrib.exe
                            attrib +r "C:\ProgramData\Malwarebytes\MBAMService\config\LicenseConfig.json"
                            4⤵
                            • Views/modifies file attributes
                            PID:1528
                          • C:\Windows\system32\attrib.exe
                            attrib +h +s "C:\ProgramData\Malwarebytes\MBAMService\config"
                            4⤵
                            • Views/modifies file attributes
                            PID:3220
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /K echo --- Malwarebytes Premium is activated ---
                            4⤵
                              PID:908
                            • C:\Windows\system32\cmd.exe
                              cmd /c "timeout /t 1 & del C:\Users\Admin\AppData\Local\Temp\pb.cmd"
                              4⤵
                                PID:1836
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 1
                                  5⤵
                                  • Delays execution with timeout.exe
                                  PID:3588
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell start-process -FilePath 'C:\Program Files\Malwarebytes\Anti-Malware\unins000.exe' -ArgumentList '/VERYSILENT /SUPPRESSMSGBOXES /NORESTART /SP-' -NoNewWindow -Wait
                              3⤵
                              • Command and Scripting Interpreter: PowerShell
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3980
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell start-process -FilePath 'C:\Users\Admin\AppData\Local\Temp\rs.exe' -ArgumentList '/VERYSILENT /SUPPRESSMSGBOXES /NORESTART /SP-' -NoNewWindow -Wait
                              3⤵
                              • Command and Scripting Interpreter: PowerShell
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:1148
                              • C:\Users\Admin\AppData\Local\Temp\rs.exe
                                "C:\Users\Admin\AppData\Local\Temp\rs.exe" /VERYSILENT /SUPPRESSMSGBOXES /NORESTART /SP-
                                4⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of WriteProcessMemory
                                PID:3216
                                • C:\Users\Admin\AppData\Local\Temp\is-RNFM0.tmp\rs.tmp
                                  "C:\Users\Admin\AppData\Local\Temp\is-RNFM0.tmp\rs.tmp" /SL5="$6022A,63820596,239616,C:\Users\Admin\AppData\Local\Temp\rs.exe" /VERYSILENT /SUPPRESSMSGBOXES /NORESTART /SP-
                                  5⤵
                                  • Drops file in Drivers directory
                                  • Executes dropped EXE
                                  • Impair Defenses: Safe Mode Boot
                                  • Loads dropped DLL
                                  • Drops file in Program Files directory
                                  • System Location Discovery: System Language Discovery
                                  • Modifies Internet Explorer settings
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of WriteProcessMemory
                                  PID:3932
                                  • C:\Windows\system32\certutil.exe
                                    "certutil.exe" -f -addStore root "C:\Users\Admin\AppData\Local\Temp\is-HH7KS.tmp\BaltimoreCyberTrustRoot.crt"
                                    6⤵
                                      PID:1656
                                    • C:\Windows\system32\certutil.exe
                                      "certutil.exe" -f -addStore root "C:\Users\Admin\AppData\Local\Temp\is-HH7KS.tmp\DigiCertEVRoot.crt"
                                      6⤵
                                        PID:520
                                      • C:\Program Files\Malwarebytes\Anti-Malware\mbamservice.exe
                                        "C:\Program Files\Malwarebytes\Anti-Malware\mbamservice.exe" /service /Protected
                                        6⤵
                                        • Drops file in Drivers directory
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • Drops file in Windows directory
                                        • Modifies registry class
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4100
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 5
                                  3⤵
                                  • Delays execution with timeout.exe
                                  PID:3860
                                • C:\Windows\system32\attrib.exe
                                  attrib +h +s "C:\ProgramData\tl"
                                  3⤵
                                  • Views/modifies file attributes
                                  PID:3824
                                • C:\Windows\system32\xcopy.exe
                                  xcopy /C /H /Q /R /Y "C:\ProgramData\Malwarebytes\MBAMService\config\LicenseConfig.json" "C:\ProgramData\tl"
                                  3⤵
                                    PID:2060
                                  • C:\Windows\system32\xcopy.exe
                                    xcopy /C /H /Q /R /Y "C:\ProgramData\Malwarebytes\MBAMService\config\ScanConfig.json" "C:\ProgramData\tl"
                                    3⤵
                                      PID:1952
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      powershell start-process -FilePath 'C:\Program Files\Malwarebytes\Anti-Malware\unins000.exe' -ArgumentList '/VERYSILENT /SUPPRESSMSGBOXES /NORESTART /SP-' -NoNewWindow -Wait
                                      3⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4744
                                      • C:\Program Files\Malwarebytes\Anti-Malware\unins000.exe
                                        "C:\Program Files\Malwarebytes\Anti-Malware\unins000.exe" /VERYSILENT /SUPPRESSMSGBOXES /NORESTART /SP-
                                        4⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:540
                                        • C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp
                                          "C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp" /SECONDPHASE="C:\Program Files\Malwarebytes\Anti-Malware\unins000.exe" /FIRSTPHASEWND=$12004A /VERYSILENT /SUPPRESSMSGBOXES /NORESTART /SP-
                                          5⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of FindShellTrayWindow
                                          PID:4688
                                          • C:\Program Files\Malwarebytes\Anti-Malware\mbamservice.exe
                                            "C:\Program Files\Malwarebytes\Anti-Malware\mbamservice.exe" /unregserver
                                            6⤵
                                            • Executes dropped EXE
                                            • Modifies registry class
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1820
                                          • C:\Program Files\Malwarebytes\Anti-Malware\mbamwsc.exe
                                            "C:\Program Files\Malwarebytes\Anti-Malware\mbamwsc.exe" /uninstall
                                            6⤵
                                            • Executes dropped EXE
                                            PID:1784
                                          • C:\Windows\system32\regsvr32.exe
                                            "C:\Windows\system32\regsvr32.exe" /u /s "C:\Program Files\Malwarebytes\Anti-Malware\mbshlext.dll"
                                            6⤵
                                            • Loads dropped DLL
                                            PID:3884
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c wmic path win32_LocalTime Get Day,Month,Year /value
                                      3⤵
                                        PID:968
                                        • C:\Windows\System32\Wbem\WMIC.exe
                                          wmic path win32_LocalTime Get Day,Month,Year /value
                                          4⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:712
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq SbieSvc.exe" /fo csv /nh
                                        3⤵
                                          PID:4100
                                          • C:\Windows\system32\tasklist.exe
                                            tasklist /fi "imagename eq SbieSvc.exe" /fo csv /nh
                                            4⤵
                                            • Enumerates processes with tasklist
                                            PID:5100
                                        • C:\Windows\system32\reg.exe
                                          reg query "HKLM\SOFTWARE\Microsoft\Alu" /s /reg:32
                                          3⤵
                                            PID:1640
                                          • C:\Windows\system32\reg.exe
                                            reg Add "HKLM\SOFTWARE\Microsoft\Alu" /f /reg:32
                                            3⤵
                                              PID:1152
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SystemInformation" /v "SystemProductName"
                                              3⤵
                                                PID:2600
                                                • C:\Windows\system32\reg.exe
                                                  reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SystemInformation" /v "SystemProductName"
                                                  4⤵
                                                    PID:4792
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c reg query "HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\Current" /v "SystemProductName"
                                                  3⤵
                                                    PID:324
                                                    • C:\Windows\system32\reg.exe
                                                      reg query "HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\Current" /v "SystemProductName"
                                                      4⤵
                                                        PID:3116
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c reg query "HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\Current" /v "SystemManufacturer"
                                                      3⤵
                                                        PID:3804
                                                        • C:\Windows\system32\reg.exe
                                                          reg query "HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\Current" /v "SystemManufacturer"
                                                          4⤵
                                                            PID:4844
                                                    • C:\Program Files\Malwarebytes\Anti-Malware\mbamservice.exe
                                                      "C:\Program Files\Malwarebytes\Anti-Malware\mbamservice.exe"
                                                      1⤵
                                                      • Drops file in Drivers directory
                                                      • Sets service image path in registry
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Enumerates connected drives
                                                      • Drops file in System32 directory
                                                      • Drops file in Program Files directory
                                                      • Drops file in Windows directory
                                                      • Checks processor information in registry
                                                      • Modifies data under HKEY_USERS
                                                      • Modifies registry class
                                                      • Modifies system certificate store
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:2616
                                                      • C:\Program Files\Malwarebytes\Anti-Malware\mbamtray.exe
                                                        "C:\Program Files\Malwarebytes\Anti-Malware\mbamtray.exe"
                                                        2⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • System Location Discovery: System Language Discovery
                                                        • Modifies system certificate store
                                                        • Suspicious behavior: AddClipboardFormatListener
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of FindShellTrayWindow
                                                        • Suspicious use of SendNotifyMessage
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:3596
                                                      • C:\Program Files\Malwarebytes\Anti-Malware\MBAMWsc.exe
                                                        "C:\Program Files\Malwarebytes\Anti-Malware\MBAMWsc.exe" /wac 1 /status off true /updatesubstatus none /scansubstatus recommended /settingssubstatus none
                                                        2⤵
                                                        • Executes dropped EXE
                                                        PID:3956

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\PROGRAM FILES\MALWAREBYTES\ANTI-MALWARE\7z.dll

                                                      Filesize

                                                      1.6MB

                                                      MD5

                                                      a2cc0a771f7507d28d4ea0131695186a

                                                      SHA1

                                                      e31043104a102b636374bef2a5f92c75ccc36fc1

                                                      SHA256

                                                      2d9b0f8632c6df2ec2aa1e75d839a6d61128a7724b5509f939078f3a52005e92

                                                      SHA512

                                                      8a1ec52dafe9c7c102ec88df8a95245956238246e1be89b46361ff6d4d69358b08c7fad8fc50d83f59ea6e887e543f53b51eca58d816c3b2d348e57b6a2f283d

                                                    • C:\PROGRAM FILES\MALWAREBYTES\ANTI-MALWARE\Actions.dll

                                                      Filesize

                                                      4.1MB

                                                      MD5

                                                      96bded4523bb423b51a6d8046a10132b

                                                      SHA1

                                                      66123f2e3c4b8d8802fdd8d27af86a6f1f5b2841

                                                      SHA256

                                                      0d3aa8451da1894db98f492152005defe1947ea911446dd1112868f219f31244

                                                      SHA512

                                                      45c7fd71b608e8019f6e7a00469f93745b5b731615cfae48518f12d9bd119b9cb53e88fcc97d5de5067f406140a8d7cdb32274eec0c7fde4addd8a1a697d89bc

                                                    • C:\PROGRAM FILES\MALWAREBYTES\ANTI-MALWARE\ActionsShim.dll

                                                      Filesize

                                                      2.1MB

                                                      MD5

                                                      63df04ba26b4e485e7e6d9acd497dfd8

                                                      SHA1

                                                      41554bf4069a6e07cd2abe941b7496f5084ba286

                                                      SHA256

                                                      67bbf76887027a8924ceff2d81f119a36283a882c2611c104f137d8375f10acb

                                                      SHA512

                                                      2571a9ba4c4101622360bf3cf548cf97f78cd0a07013bae207e45b964a12d822447dd2a1da1f0208029f46b169afe729231374e87aa830f7910f81e3b12ba826

                                                    • C:\PROGRAM FILES\MALWAREBYTES\ANTI-MALWARE\BrowserSDKDLL.dll

                                                      Filesize

                                                      3.4MB

                                                      MD5

                                                      00b0a7e23afb9eb2c42fbf6150d4f28f

                                                      SHA1

                                                      7d6f9bed8ee0f31b426c5c5d5fed7ab32ad571c0

                                                      SHA256

                                                      83cdcf045e76dd2728d8a1307ca24caa7c0cbaa9d2ccc9d54cccb8c841cdb01f

                                                      SHA512

                                                      8948738d604efc3b53bd0829cb1028adb52c27d0a15e02b44200c15fdd01984ad2e26b48a4256c898b1870d488252fa5a1b1034c73ef9d841d4cffb7fc342d28

                                                    • C:\PROGRAM FILES\MALWAREBYTES\ANTI-MALWARE\BrowserSDKDLLShim.dll

                                                      Filesize

                                                      2.1MB

                                                      MD5

                                                      5c6a18b45eef87554c20b35aebbaf095

                                                      SHA1

                                                      33ab693d6c217bcf41459bac12beaf74d2db4110

                                                      SHA256

                                                      750aa87ad53c56300295639f1b1fb9ed70e6450c83c806e951948c7be2a86a99

                                                      SHA512

                                                      7544c8ec1aef1896bdc061c1db3950069a8d18d1e876c2c8ce75f61e6f4d038cffcb594d757cfccd1a67311e4e4b8059146cef0ab6b862d0342910dc34201e5f

                                                    • C:\PROGRAM FILES\MALWAREBYTES\ANTI-MALWARE\CleanControllerImpl.dll

                                                      Filesize

                                                      5.4MB

                                                      MD5

                                                      1aa36b41e437501f20ba879d9c23ed3c

                                                      SHA1

                                                      0f8ec29c321e0c96fb3bd3d8c51945ce70199490

                                                      SHA256

                                                      86f81665b233c7bb75ea5b986edcb486ce92faf38d670d63632eb23875b32b40

                                                      SHA512

                                                      2db53b44c47daabf74229755cfa9621cee8bb397042a8b8dc7e0748b366f42ff866a9e97562e5dea012f3d1741debbd5152debaadefa5060eb9f32a4bc1507f9

                                                    • C:\PROGRAM FILES\MALWAREBYTES\ANTI-MALWARE\CloudControllerImpl.dll

                                                      Filesize

                                                      3.4MB

                                                      MD5

                                                      447926609e3228ff943c3cde0ed1692d

                                                      SHA1

                                                      adbe95d3682677fa6583892124574d0f14ef1bc7

                                                      SHA256

                                                      a50580cfb78676285130ca13fa052df96cd6d1bf639be78a9739a2db4fab2944

                                                      SHA512

                                                      a1277c4c5da9f1801308db96365f413866ff250b38a338e8e93565f658bf2d3ea4dcd8f7820194b21eced4778b1694cdece85a51e2380548e5ace8a1a795726f

                                                    • C:\PROGRAM FILES\MALWAREBYTES\ANTI-MALWARE\LicenseControllerImpl.dll

                                                      Filesize

                                                      3.6MB

                                                      MD5

                                                      907cd3b4605457a0fcc4c884fbb85c80

                                                      SHA1

                                                      6aeeca92f5ccf58b86bb1d5b2d0babe0b4e432b1

                                                      SHA256

                                                      2a12a8240f416ed00329b6ea3e2d01bf759d758b59c6e87ed22d1ebe71818a2d

                                                      SHA512

                                                      87251b2ba3f7a2b4e07d9c89026a53707125ce11814131612abf231c6c34239b02e1567eccb8cefededce95cfa70e8501c5c6049f8aa967d7fde917ff13c0791

                                                    • C:\PROGRAM FILES\MALWAREBYTES\ANTI-MALWARE\ScanControllerImpl.dll

                                                      Filesize

                                                      4.3MB

                                                      MD5

                                                      80a36bcaa9d09595687ff51460676127

                                                      SHA1

                                                      a00a6ad5ddcaffcfb74e3394e46960dfd5450a17

                                                      SHA256

                                                      55e3fbf495de13c76b6a715cfb68f2175efd5d9d58776e3b2fa3faec7a1f648e

                                                      SHA512

                                                      2142b166be03cc0c00a1aa39d1263c26deace2453470c3a2753279de594bea111325b2b933fc8a3f4e9b4fa6d101cd0ad44d3371d590440cba7af7e53513da7e

                                                    • C:\PROGRAM FILES\MALWAREBYTES\ANTI-MALWARE\Swissarmy.dll

                                                      Filesize

                                                      3.3MB

                                                      MD5

                                                      bba22e78c119bb5ebdb904ecb9558d7d

                                                      SHA1

                                                      3a40af6df28969622a7161e118bccb54e1a30544

                                                      SHA256

                                                      e149a3ecc5b44b50fcd5a70b884a7715edc4ac0dae904add3d1cb3c2d93f1f6a

                                                      SHA512

                                                      f4cb0728502cfa1665fa1625791d4f0129ddd0e8a2b6d2179af230d19417c56f0be627611ea36753f50cb56cef2feab6995528dcb82a89560280a824f3dfff0f

                                                    • C:\PROGRAM FILES\MALWAREBYTES\ANTI-MALWARE\SwissarmyShim.dll

                                                      Filesize

                                                      2.2MB

                                                      MD5

                                                      e1e0e1e5342cacb856beaf7f5791ce3c

                                                      SHA1

                                                      bcaa9d08eb2ac153276bd0509c91a84a277a5a54

                                                      SHA256

                                                      7c61bcded4713b4b156139833c0da0d1076a790a54218f6e3c7b51752cd6fa9e

                                                      SHA512

                                                      81ef3efa37a9e76d2153bca2eef33715373556fd9057945410d198182736fd68b724510bd4458aaafab5497d78c696bb7a24f82fe3cddd7b27e24fe804eb550a

                                                    • C:\PROGRAM FILES\MALWAREBYTES\ANTI-MALWARE\TelemetryControllerImpl.dll

                                                      Filesize

                                                      4.0MB

                                                      MD5

                                                      55ef5563825fda3ab05cbee48bb5cc99

                                                      SHA1

                                                      fcb57cb21714edfc7e59671e9b3a6d9842a988da

                                                      SHA256

                                                      3417da91c99c3a4f99c268dd94ca61e59a76340102af54ff984cbf8f339e24d5

                                                      SHA512

                                                      73891411be688711ee86b9759eeeb6c66799892f0dc9f668d8233aee95e6b397cf0434463308d6af77c4b592fe5b71dbdd7de031ce3d071657d29dff64c51ad1

                                                    • C:\PROGRAM FILES\MALWAREBYTES\ANTI-MALWARE\UpdateControllerImpl.dll

                                                      Filesize

                                                      3.5MB

                                                      MD5

                                                      235404716813d5b32d26fd17aed9112b

                                                      SHA1

                                                      c77d3fde646cc07c274cbc2318fd884a6c8a4f36

                                                      SHA256

                                                      ffff47710970e3bcd5e8c2a28867a2e2dc0c01278a531223e535efabea528781

                                                      SHA512

                                                      6aecc1de3cb86d25b66e81badc7b6966d42fcc72925414594e550bb7e71d569835001fac2e5b6ee179307545bc395717c963110ca7c69f0bbd55b9132a11e5eb

                                                    • C:\PROGRAM FILES\MALWAREBYTES\ANTI-MALWARE\mbshlext_proto

                                                      Filesize

                                                      2.3MB

                                                      MD5

                                                      439e2f41cc91de42214d5ca2ea69ecd1

                                                      SHA1

                                                      538bbdb5d0b7e563dbe1b1938e676a64b829b9c0

                                                      SHA256

                                                      94a820e238024dc5c65785b37141020078eed9b170be4389f085577637b538df

                                                      SHA512

                                                      8b9ea8e345150a140e82ac53424bf4aa8c5d05879034b7057e453fa3840a4fb4e09998f43c67090084c72cbcd7499fa145141fbfe56599ef25ce62f84092bd04

                                                    • C:\PROGRAM FILES\MALWAREBYTES\ANTI-MALWARE\pkgvers.dat

                                                      Filesize

                                                      51B

                                                      MD5

                                                      bf86796fe0fb92b34e5f1100d5eb3bb5

                                                      SHA1

                                                      bc10ef8edff446a9aae29a70be7fdb380979f916

                                                      SHA256

                                                      2fc07c3fc5e834495d3f76b3f4b6454c57e78eb928cdd343b863d8170f00ed67

                                                      SHA512

                                                      ef0c5e7ad46e9dd5dbe3741595b5887b34b75eab30de27343b02e68f0430e8a8cc7c79791f3a0ac1871d362eef3bd34f9bd4ac54e77a95ad1d1f2e1c65a10cbe

                                                    • C:\PROGRAM FILES\MALWAREBYTES\ANTI-MALWARE\version.dat

                                                      Filesize

                                                      47B

                                                      MD5

                                                      f87ee333fc7093fb0a7d0bf86acde081

                                                      SHA1

                                                      8e5634b4eaf7ad9201be8fb04fd3ed734d3c5a28

                                                      SHA256

                                                      e5ef72fb7af61be42f9f833f5e532ff4128a26e73920832ca87c5f00164e74a7

                                                      SHA512

                                                      8530fb2efaa8de0c7f2a102a44fd4a035fbe9a06040290820fe0480e8f9bea2295695cce253023b92ad8ac0f2fe9563a6a0cd10e423e1c2e1fa212146276533f

                                                    • C:\Program Files (x86)\7-Zip\7z.dll

                                                      Filesize

                                                      1.2MB

                                                      MD5

                                                      a65e53c974a4e61728ecb632339a0978

                                                      SHA1

                                                      27e6ec4f8e34b40f1e08503245700c182b918ce9

                                                      SHA256

                                                      ca8ab5aeef734f24a3c58bf10b3f0152c2ea1329b02d2730448693df563b4c6a

                                                      SHA512

                                                      b029962f08867496cd3fd5e9af4b0703dae918e938aee759aeffbb4184ea6d3e81e0878ba8957e80d30db5d7b6fc8598e68918a4d16b3d010f31a2e16417593e

                                                    • C:\Program Files (x86)\7-Zip\7z.exe

                                                      Filesize

                                                      329KB

                                                      MD5

                                                      62d2156e3ca8387964f7aa13dd1ccd5b

                                                      SHA1

                                                      a5067e046ed9ea5512c94d1d17c394d6cf89ccca

                                                      SHA256

                                                      59cbfba941d3ac0238219daa11c93969489b40f1e8b38fabdb5805ac3dd72bfa

                                                      SHA512

                                                      006f7c46021f339b6cbf9f0b80cffa74abb8d48e12986266d069738c4e6bdb799bfba4b8ee4565a01e90dbe679a96a2399d795a6ead6eacbb4818a155858bf60

                                                    • C:\Program Files\Malwarebytes\Anti-Malware\Languages\lang_es.qm

                                                      Filesize

                                                      256KB

                                                      MD5

                                                      09a3995806569a7d3fdb05e54ea815ac

                                                      SHA1

                                                      f6ea0bd03ef8d01fe92a63c750586b86ccdf7253

                                                      SHA256

                                                      9e8a6672431aa5b805091c3e08f89417b7ba9ab931a031f3ff9641efccc6ed3f

                                                      SHA512

                                                      0d76fe4b70225bbb2bcbf6734ae0a238a9b5b93eb53c6ed5feee30674c5dab79deb0b222100cf27bb8a1035832c3be153e900fe6a6703829a133126a57a76144

                                                    • C:\Program Files\Malwarebytes\Anti-Malware\MBAMShim.dll

                                                      Filesize

                                                      2.1MB

                                                      MD5

                                                      7821333ce81660424940fee144ae859b

                                                      SHA1

                                                      0296ea96ff58b0bd21c8b3f73816e96ab3ccf6bd

                                                      SHA256

                                                      804a146bc91474f9a87accd473802efc74441020beb4cd455ee0b316d0b86d47

                                                      SHA512

                                                      23ce5e8c4aab068183e2ee45353e65ee5aa3a99d05926744c21ea0ac8fd29000523e6d04cec6b7be29245b13a1d6eca4b9cc7e47e9ececd7779cea3fa01936a4

                                                    • C:\Program Files\Malwarebytes\Anti-Malware\MbamElam.cat

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      988b553a227f7f37f14abb060a320b6f

                                                      SHA1

                                                      f8244956defa0241dca4a6d5e5ee159b5ff96ecf

                                                      SHA256

                                                      42b5c504cfeb02e7d12526ff5398d6063f3e9b3661bc4fb2ce312c7c6213af84

                                                      SHA512

                                                      4c080c853d9a9265ea80fab43cea78ed9230c7be7977f84bea98847792996a9434dc8cfeda96ab2f357eb86134cd81681c6b91215b3f61e89dc96fcdb15e4324

                                                    • C:\Program Files\Malwarebytes\Anti-Malware\MbamElam.inf

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      c481ad4dd1d91860335787aa61177932

                                                      SHA1

                                                      81633414c5bf5832a8584fb0740bc09596b9b66d

                                                      SHA256

                                                      793626d240fd8eefc81b78a57c8dfe12ea247889b6f07918e9fd32a7411aa1c3

                                                      SHA512

                                                      d292e028936412f07264837d4a321ecfa2f5754d4048c8bcf774a0e076e535b361c411301558609d64c71c1ce9b19e6041efa44d201237a7010c553751e1e830

                                                    • C:\Program Files\Malwarebytes\Anti-Malware\MbamElam.sys

                                                      Filesize

                                                      20KB

                                                      MD5

                                                      31e4ac0c3d3bac32082304bd43560760

                                                      SHA1

                                                      ac98325151661fc73674bfde8f40d2322b6f6f86

                                                      SHA256

                                                      228ca2a510bb8bbf0e0ab29455bb0961b82774ff74e664bb20a864758b8b0904

                                                      SHA512

                                                      2cfbf89ffecb1a001b8cd4f61d02681cac5900ea3166825cbe77982cf5cec40dff1cd0e2c17d3fb73842273e083b60683baa94dbf995c65d42300c4741196a64

                                                    • C:\Program Files\Malwarebytes\Anti-Malware\PoliciesControllerImpl.dll

                                                      Filesize

                                                      2.4MB

                                                      MD5

                                                      69d87ada8d240550d7469e5ce7c75369

                                                      SHA1

                                                      bb3422b1dc462922b6a24eee46629b89a590d327

                                                      SHA256

                                                      b44957becd817bb9febcfc627627709916c82f366eecac6e71e630e5bffafc79

                                                      SHA512

                                                      bb91fb0540a861155e5b3d28f109b4bb7f6b6f1d3138391bab382d0750c1968672c163c1cdab226fe3a819e36d6307ec2df94e3539918bec5b55c34214437a58

                                                    • C:\Program Files\Malwarebytes\Anti-Malware\ServiceConfig.json

                                                      Filesize

                                                      607B

                                                      MD5

                                                      d1d2d105889ed4fcefbac2e78248cdcf

                                                      SHA1

                                                      9c3088e1b863b7da1ef83126a267bda000d71349

                                                      SHA256

                                                      48582342d1f338ecc90ed8f3a78d1b94606e680bed049f3bbeeae2a93b829c2e

                                                      SHA512

                                                      47756b3b19f01c91e9d4a46e0b0d0d5564d7d63859be06dba47e954862acd1857591bbf57a3fb31dda4af8870742aabb80d83ef795571fadf80b497bc6800e28

                                                    • C:\Program Files\Malwarebytes\Anti-Malware\mbam.exe

                                                      Filesize

                                                      8.4MB

                                                      MD5

                                                      0ef8c690deab2e93b2cff1aaa5302065

                                                      SHA1

                                                      469b8673542ae6bdd6467d0a83123704ea6a0306

                                                      SHA256

                                                      0dc6596eeda04c2f82bf232059aaf675d461d6302710a14fbf0b895ae44bac6e

                                                      SHA512

                                                      3244b549381d7e9db957f1c06f2c2b81be0fdaf67e5c706f499d80819e016841e19cc55e252adef29e9b95007f8bd9ddb5bdae868bb98fac31e0ae5da1c87b6d

                                                    • C:\Program Files\Malwarebytes\Anti-Malware\mbamservice.exe

                                                      Filesize

                                                      6.4MB

                                                      MD5

                                                      327cb21b41ce523e2faba8e17ab24404

                                                      SHA1

                                                      6dcf3b4a21433b7f365e16a89a131e17e1de4cef

                                                      SHA256

                                                      638d1e4201f7e8e0f5aae7d880fda02874cbbee98eff48e9e1fd0291451a0ac9

                                                      SHA512

                                                      f445f6020997ebbf513f9a470576a84d4b93823e2e143daa7408e7bac83276cb75f8e37c31046482a1aaf1380d6b27218be5b85b045ad6c3200baa7855e68028

                                                    • C:\Program Files\Malwarebytes\Anti-Malware\sdk\MBAMSwissArmy.sys

                                                      Filesize

                                                      268KB

                                                      MD5

                                                      303f8c619d472c98754b369e582f8e17

                                                      SHA1

                                                      71b32fb7b9faa4747be0c98a41fc88466e981b08

                                                      SHA256

                                                      1d5ec9dd832ea97b5984939605897749c786094460cbd731ac2c44712b65cf0c

                                                      SHA512

                                                      72241900cccbac3c19193f54649ff9bd89537a29df29d859f1358457ec9976c4b2a5ce8362b3438c7ad7feb8fb3c47cee00dbddb6e408259f8d45d7d9f30dda1

                                                    • C:\Program Files\Malwarebytes\Anti-Malware\sdk\farflt.sys

                                                      Filesize

                                                      219KB

                                                      MD5

                                                      e271a915b084d17c4b18c26f8eb62ec9

                                                      SHA1

                                                      28638ae1c1cc5b04fb0f13d7b91c32847c2ae8bd

                                                      SHA256

                                                      1d498436bb314813551704a3e46570cb3216224d6dae5473598df0cec3c5577b

                                                      SHA512

                                                      66edec305631440f8f8ae3b75eae8c165b5d8c86e7cb3ebb947e6517c6fca45c005f6f7f77adec6f2bd2e7e9c55dfeaedfc2f10c7187a64904062b2d124ed8fd

                                                    • C:\Program Files\Malwarebytes\Anti-Malware\sdk\mbamchameleon.sys

                                                      Filesize

                                                      195KB

                                                      MD5

                                                      af6d573ff797ace9f62cf693a18ce8af

                                                      SHA1

                                                      c947458393289e420762f005bc8d8a7e8c905f3c

                                                      SHA256

                                                      0c7c976d097788650cdd4440a421fc5f80e6a3ab33445e7e8ac49bd0d999fea0

                                                      SHA512

                                                      5284ce3a008b4d5504dc17c96510aa0df416c08a9b57206982fc2b1b190535c52975827fded4fce7f09160deb8edf7417be665656145b085b4ecae7c503e950c

                                                    • C:\Program Files\Malwarebytes\Anti-Malware\sdk\mwac.sys

                                                      Filesize

                                                      113KB

                                                      MD5

                                                      792f29fb1d0efb9410b26601772e2ba6

                                                      SHA1

                                                      2cf7b518b3be82a9cc98b9d8d83256ae156c34db

                                                      SHA256

                                                      aed5fd68add4ab2e602c3dbb7956b83f6b04be569ac8910781a07cd4ff1d9a3e

                                                      SHA512

                                                      88e3c9863bbf2d104d893f66568b6c264a6d1131690c1caa22c68cecbcb4837d461144c831f3d9e824a3e882cb2485fbaca9cebca9edc1b319db6d278807c2a2

                                                    • C:\ProgramData\Malwarebytes\MBAMService\config\AeConfig.json

                                                      Filesize

                                                      53KB

                                                      MD5

                                                      7e8245c00eb03caf9d15f6322ef17400

                                                      SHA1

                                                      314c64dd9025687cd66ce6900161cf1ac25aa892

                                                      SHA256

                                                      fd47303ac451951b7fa0c32fde759a84c28ae48f685491113eccbc9e65776268

                                                      SHA512

                                                      b68a6a1fd0ddecc20beeb414444b5a53779220d1683571e5a37c7da3a28403cf9a45921cb6dce0a062ab1c57a6ea12c8905a0308064ee1aeaecf7e73a4bbabc4

                                                    • C:\ProgramData\Malwarebytes\MBAMService\config\AeConfig.json

                                                      Filesize

                                                      69KB

                                                      MD5

                                                      b59c99ddc36b9fe55d0110271c7b221c

                                                      SHA1

                                                      b5c8c6d9ac8e7248f5a1cd83d9032071b48114b8

                                                      SHA256

                                                      5e7ef365d6488bcb42c6c226a8b27a22495f38695375de4e9f7b1f54bf8d620f

                                                      SHA512

                                                      2746b86a92762b1cf0fff9f9613f1bc43907a7d6ba63bcdc6d0cf0a1e3a8be87d909bde9a4d15170b9192ac22cbf34ff25ba4f7156be58df97df3cf989aa1e69

                                                    • C:\ProgramData\Malwarebytes\MBAMService\config\AeConfig.json

                                                      Filesize

                                                      41KB

                                                      MD5

                                                      bd2da154e9ae2f5f736d7d8cd2b32851

                                                      SHA1

                                                      9f78cd0a54e1a071739cc28852fe2a758ee2cea2

                                                      SHA256

                                                      e80848a3791333cbb4824c6756bc5d7b754e1efba0a74e9f01a6a811767ec7c5

                                                      SHA512

                                                      34eb4ac8f2a80aadb2a75f92fa4f7a595fe67a9e5412fa3c07e21789f3370ea60feabd129a8f8cc1ec02c66300d3588861a47f0e659ad8966b4bb252dbb9c96a

                                                    • C:\ProgramData\Malwarebytes\MBAMService\config\ArwControllerConfig.json

                                                      Filesize

                                                      243B

                                                      MD5

                                                      56a75ce818a75f97a63a09f6f0168d0e

                                                      SHA1

                                                      70076a87cbea0fe6e363368bda186a452e39f9b3

                                                      SHA256

                                                      832ac7b214608f08d0747a2f45bd2e686563bb9759c2633291c661444c0d626e

                                                      SHA512

                                                      b8397a28ccef6aa8de82425981e11d6bffb19a97dfc2477da002d0ba2b6373d3c9442a2d6541566d8607e0a692f44dc03bf4cdd17944bdec9ac4d5f064c1aeec

                                                    • C:\ProgramData\Malwarebytes\MBAMService\config\LicenseConfig.json

                                                      Filesize

                                                      10KB

                                                      MD5

                                                      e5d0d572fb2090dba7b7e578446626e0

                                                      SHA1

                                                      14e05ff6bf4078aa4c6bab0d33572c54abf3264d

                                                      SHA256

                                                      a48cda0e8b3295e9721a232bfdb02e534b85b1a41fe8cf262ca2751908007483

                                                      SHA512

                                                      7c0116f4f2ed8cb1edf3f6f463d17932948bbf5db0d2d805586214f5d67be8ede45b0d649f804b8a52173dce03000dbfe76525a6995559a488eb1598ff7e5ec4

                                                    • C:\ProgramData\Malwarebytes\MBAMService\config\LicenseConfig.json

                                                      Filesize

                                                      10KB

                                                      MD5

                                                      0ddbfffd3630f7663587129b1ebca089

                                                      SHA1

                                                      e87905a953e80f513012caeb76f773d30b1e3f2a

                                                      SHA256

                                                      e2b86f83c53dc5503065cebdd14e3cadb0167fe561a156d472d04244fe5a298b

                                                      SHA512

                                                      bca5a3ad9ead5a6ef84cd7da7251a5183b8d903b6afe550e8d641a26d46090cedf966cf39a058eff660ceecb27ed08d4b35fec1ef574f61436e6e27306753318

                                                    • C:\ProgramData\Malwarebytes\MBAMService\config\MwacControllerConfig.json

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      af1f5ed28b3071fd8bd8b7077cd79c8b

                                                      SHA1

                                                      d37565d982020abd82681bc702182db8b2581e38

                                                      SHA256

                                                      3455c605dc9b97d490433b51a3f62eb7f749400749c2e2cf7969d5b714310ef0

                                                      SHA512

                                                      b6f6520fab154042702428148f7764ab4728defd9d40aed4ac8e3d1daa1592721bb840c2ea7c6c9ff9eb6a54526096a03f64c8716f849923ffe7cd327fdf738d

                                                    • C:\ProgramData\Malwarebytes\MBAMService\config\PoliciesConfig.json

                                                      Filesize

                                                      803B

                                                      MD5

                                                      416329c4d4100259e7b13a5e8f3b3a24

                                                      SHA1

                                                      4bea92afc0e45929df68b82208f22948ba6e1179

                                                      SHA256

                                                      a0dbee1f436fae26dee65662c76e44936e200b22662876b008be94811309c78f

                                                      SHA512

                                                      f7b18ccba0f0cc0426475893179a97f8bb92021d91dd7a7c06eb04a77082fd125c8f06f2e9812456bb49bddcf49c92a052ecb9f70ed24d0fa95141c381d8bbea

                                                    • C:\ProgramData\Malwarebytes\MBAMService\config\RtpConfig.json

                                                      Filesize

                                                      645B

                                                      MD5

                                                      02dca415327b7307332efa3298043980

                                                      SHA1

                                                      df883cb8bed24b741419e098453b27ef29fd864b

                                                      SHA256

                                                      4aa993230b99de16a66b54874f47ad10adf2141c9969a067d1ad0f0b02317b98

                                                      SHA512

                                                      4112d8d4c612d2640e0c4f906afcbdfb5404a663a56c01077978100c2adbc307d078301de3d3643b9d4000caead7b69bfdaa7b46f7a4bea4beb21885d286d653

                                                    • C:\ProgramData\Malwarebytes\MBAMService\config\ScanConfig.json

                                                      Filesize

                                                      5KB

                                                      MD5

                                                      ea6d45abc319067b20f93c27fb23c3e0

                                                      SHA1

                                                      944198c8e1ce7edab3bd96636c5220adc1cda38d

                                                      SHA256

                                                      4a5f3872b915404a2808e1a0f129bf6d729fc9ae22d367e280babef971d71778

                                                      SHA512

                                                      329b6fa25d9b242da3327e67fdc6abb0d59d0bc985bd19f3a0f3d92748f54ebbdc102f8ef62e9284fe4f009d60e68a2113317a6a41e03d3b5ed05f3ca5194315

                                                    • C:\ProgramData\Malwarebytes\MBAMService\config\SpConfigFile.json

                                                      Filesize

                                                      8KB

                                                      MD5

                                                      280857f5d21344e3b640e998b0f9bf0a

                                                      SHA1

                                                      9506855e79a4adb9d6797230708076f53cb0602d

                                                      SHA256

                                                      8993e810870b65e6b4cd206a63937fecf4c5aaa3d99abe69375e2cb31607a316

                                                      SHA512

                                                      6cbb84e2480df89094771dd21452e08028c46b5cfddbe2a4b4823809b92ff77d1e68628c5a51a45351bb2ca15dad52fcc26d87ad3da2f2f25147cdb92d14d43d

                                                    • C:\ProgramData\Malwarebytes\MBAMService\config\TelemCtrlConfig.json

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      82dac81260c09691f093de928fc7e3af

                                                      SHA1

                                                      503763c2beed5a5cdfa19bf8261ca8a5793114df

                                                      SHA256

                                                      115619d96fe02d7bfcb0fb97b71d69e016a78a2895282a518b45a2781dd062e4

                                                      SHA512

                                                      5e7b466270dc3b6aa745902abc8b8ea47c7dce1e9e198d8d36b7af75a6fe5c5f8e0e14d80ba6b450dffa73d43055c7e558bdaa36ee754dde08310c849a8f6e21

                                                    • C:\ProgramData\Malwarebytes\MBAMService\config\TelemCtrlConfig.json

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      d4ad0c4adf5443b2c6c85a1c60330ca0

                                                      SHA1

                                                      3d1fcdccd9c35c65f4f8cf7234c57d1e0cd650b3

                                                      SHA256

                                                      ac6e769a02cd490e53be651d74e53d8da882cbfa9590a2c7f61a386051be3288

                                                      SHA512

                                                      d7bb793c7d23d6d22d63817aa6436e2747d98f4f35d14626f72f2ad6ec9b47f5eb4511613f85921bb58c7fbcf1d09bf3f0c0a77e2fa8954afa97702ff781ff65

                                                    • C:\ProgramData\Malwarebytes\MBAMService\config\TelemCtrlConfig.json

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      eb8a24955478124321510b15c901c145

                                                      SHA1

                                                      2bd0c7c716eb8c45cfed385fb21b60025529e4d9

                                                      SHA256

                                                      4ea32fa98137e487510178672c42a8ce9e9fe9559e5e89e918fbf0859d9f6e23

                                                      SHA512

                                                      9168468bff49dfc269755455a9ceb4d7054683ff050db98df29bc7fdd2a490d313b42a9b00ea7d37bab26cb14fefc61829627d587c1c7b6af5103435eeb3c727

                                                    • C:\ProgramData\Malwarebytes\MBAMService\config\UpdateControllerConfig.json

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      b8a78e3bdef40192495a5e8daa33e0d0

                                                      SHA1

                                                      3061e71bb735fe1f69358b1a35e27c5c08422320

                                                      SHA256

                                                      cd531f51af5fc34fced6a3e8a6a296dcf770154a9308c8e994324f9584833b9b

                                                      SHA512

                                                      12a45484097f6756bedab17c917e90f68e19f3eae9e0972a87ebcc12b857f0a5da41bb2af6d695ccbcb4a01f209a3ab810a7475aa930592cf7880b4c72c62eea

                                                    • C:\ProgramData\Malwarebytes\MBAMService\logs\mbae-default.log

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      2927f01a32354d597a70feb5068e7139

                                                      SHA1

                                                      e2d7c3305ba7e0549ff0ba22815f56f70f13f59b

                                                      SHA256

                                                      fb3e77f6a3a0e286126fb73cf717ea6a9b4391493b809c9bbe1b6b25b0918313

                                                      SHA512

                                                      7ea2a584fcd25eabad3c85516d2aab5537dbc412adf2424b699c2d9e3da40f8f329808a8cd21f44268bfb0b779911eae9d0969ebf681e3d1a77f6921858dc646

                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      713ad359b75fe6d947468ec1825202b9

                                                      SHA1

                                                      19dcd19f18a2ad6deb581451aad724bd44a592a4

                                                      SHA256

                                                      56572269ec031c63d966c6d3b4712600b908d38826c59c0f9a8225d0a783e9f4

                                                      SHA512

                                                      4df344dec422bed85b186909dc7f9c35126b3bb45e100f18fb95b4a9943ace242479adf5f0194b054d38b67032498f897a5a54b49026efee0c4797cb5a5e54e8

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      8e1fdd1b66d2fee9f6a052524d4ddca5

                                                      SHA1

                                                      0a9d0994559d1be2eecd8b0d6960540ca627bdb6

                                                      SHA256

                                                      4cc7c1b79d1b48582d4dc27ca8c31457b9bf2441deb7914399bb9e6863f18b13

                                                      SHA512

                                                      5a5494b878b08e8515811ab7a3d68780dac7423f5562477d98249a8bedf7ec98567b7cd5d4c6967d6bc63f2d6d9b7da9a65e0eb29d4b955026b469b5b598d1f3

                                                    • C:\Users\Admin\AppData\Local\Temp\8JCQ7FRK.bat

                                                      Filesize

                                                      77KB

                                                      MD5

                                                      6bd543ea83d5ae4335e0fb4623499b5a

                                                      SHA1

                                                      ee559bd570882bb76e546461e8aee3df55a252c5

                                                      SHA256

                                                      5982ceaa76cbbfb54c79c312500e62fa5e03d55dfe2cfcc142a415b89c9f13de

                                                      SHA512

                                                      cda57fdb0c9c0bd324e7b91a871bef03fb83436d16413f3505bbd2bdc82d47320320c106b8b33ed4c4e16010fe551c73d2c138f360e58c30826b8b52d5e3cea5

                                                    • C:\Users\Admin\AppData\Local\Temp\MB2Migration\Configuration\license.conf

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      43bfc177b1a1749e5f80c94a433af4cd

                                                      SHA1

                                                      da1d25a6bb559e17052c6c6079635a8d004291c1

                                                      SHA256

                                                      7bedfa9b06ebfb5ef8a2a77618073c00c5809874099189860bdc402bc9ed2c63

                                                      SHA512

                                                      9d835a052ad3e0ce31f27aeff4e912c2ea6aecb8f032bfd4bb2d4547d9cae0972c4158568f409fd3ab6faa3f05d0a67c20db5651d01151a22643a551bc573318

                                                    • C:\Users\Admin\AppData\Local\Temp\MB2Migration\exclusions.dat

                                                      Filesize

                                                      104B

                                                      MD5

                                                      481e08b086e1663fabd9afa850093696

                                                      SHA1

                                                      5b283959d8f5d356b25890f89babc22a8cdc7d73

                                                      SHA256

                                                      8990dd342de96d5849ca93f4bc87a96cec4f33227e440e679668ee11207f3e38

                                                      SHA512

                                                      e01fb0c54923a11a2956eb5797513c1a6525b9d66b5ef044c646ae957b95e2b16bb19ea1b6214e94f65c30834f8b43d401bbfde1ae50290e06ab73af4375febf

                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vdsjkjpy.wa5.ps1

                                                      Filesize

                                                      60B

                                                      MD5

                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                      SHA1

                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                      SHA256

                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                      SHA512

                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                    • C:\Users\Admin\AppData\Local\Temp\is-HH7KS.tmp\BaltimoreCyberTrustRoot.crt

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      379a301592736712c9a60676c50cf19b

                                                      SHA1

                                                      c103790503bf8c2ff3f119adee027ebb429b9d21

                                                      SHA256

                                                      cc7400692bd90e1b5fc44e11c8dd7c788cbb462f52ea3f3decb579e4d51eb268

                                                      SHA512

                                                      dec25a31f2930eb575a43e654c29f170c261c1c4516767c0e71cc172ad6ad115914fb58d9cd79f681ff3d7c6baa6b7c0d6de99de09d7582c9807ae436f15572f

                                                    • C:\Users\Admin\AppData\Local\Temp\is-HH7KS.tmp\DigiCertEVRoot.crt

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      d25e0f479b9601edf2c9c2dad7ba2706

                                                      SHA1

                                                      2f1d0001e47394f4c4deec9645c5f2df99f91a95

                                                      SHA256

                                                      63ff360aafde5ff959fb9671ec27002f99cbfae4907b410046b6a1b0f51cba9e

                                                      SHA512

                                                      3ba164dad3cadf1ea9f0c555695e4d39cba47612599f547d0d0d59014577995c0ddbff0ef6a5e436867454da02d500136b54c034c2223586271b26108b2cfb5e

                                                    • C:\Users\Admin\AppData\Local\Temp\is-HH7KS.tmp\innocallback.dll

                                                      Filesize

                                                      63KB

                                                      MD5

                                                      1c55ae5ef9980e3b1028447da6105c75

                                                      SHA1

                                                      f85218e10e6aa23b2f5a3ed512895b437e41b45c

                                                      SHA256

                                                      6afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f

                                                      SHA512

                                                      1ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b

                                                    • C:\Users\Admin\AppData\Local\Temp\is-HH7KS.tmp\mb-header100.bmp

                                                      Filesize

                                                      7KB

                                                      MD5

                                                      4f8b110e37a818130310f0c34ec90dc5

                                                      SHA1

                                                      3bef6199fa0ba4c7b98d9c6a6c5a29c52ef9f3b1

                                                      SHA256

                                                      db72101e43020be81ff304f50cf593497d66073be946502c16bcd64e7b2adcc3

                                                      SHA512

                                                      d998b6f09e8750f8f99491e2c2dcbb0cec4a65f8154d795ca070eb131a4f88a30116715b67d1904a0b774e77d0b3ffdb994d10de5688e47f1e2901b10202402b

                                                    • C:\Users\Admin\AppData\Local\Temp\is-HH7KS.tmp\suhlpr.dll

                                                      Filesize

                                                      3.0MB

                                                      MD5

                                                      b55493d2b5f93a41c51811448ccd6975

                                                      SHA1

                                                      584dc786acbb05e09062b98a7d976c9da17aa3a4

                                                      SHA256

                                                      2cbba30b1ab1713a9320c18f9bb0c396f89fdba9ccb89f34dd9a12de2c81f405

                                                      SHA512

                                                      e8f1aa0efa5c7fc3cfe6063c2600d70db1c7cb399b11f443c2575d054b531b856987ca19e9a4ba63161270046ac4dfe85e5675af0f49b722af0071629c0eb8d1

                                                    • C:\Users\Admin\AppData\Local\Temp\is-KCGPQ.tmp\_isetup\_shfoldr.dll

                                                      Filesize

                                                      22KB

                                                      MD5

                                                      92dc6ef532fbb4a5c3201469a5b5eb63

                                                      SHA1

                                                      3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                                      SHA256

                                                      9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                                      SHA512

                                                      9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                                    • C:\Users\Admin\AppData\Local\Temp\is-RNFM0.tmp\rs.tmp

                                                      Filesize

                                                      1.3MB

                                                      MD5

                                                      84c6d2d33ed6f1aa356bca1d354448ab

                                                      SHA1

                                                      e70b4058ed0389fb8482ee3cb2dc04334b6bb053

                                                      SHA256

                                                      efe20d9f6b1427f69c61e3e128e576cf24a0b930903b1ff8fe7fdf3852d106c5

                                                      SHA512

                                                      91e2fa7ae39523c5fb70d49ac3e33aacaa209827f95082b4c812b82c3a1733e1826f69b550d39c68b9ab6b0633bad9b02499bcd26971e971d7825af6eedf43fb

                                                    • C:\Users\Admin\AppData\Local\Temp\pb.cmd

                                                      Filesize

                                                      10KB

                                                      MD5

                                                      26b5149f0c9b80840ddb4cdf03e0954e

                                                      SHA1

                                                      38d8bdcfe99aa8e7528989c62c565dbca2d575de

                                                      SHA256

                                                      b22e6261e85d1d55253f9529586aefdaf4787f9e788bd5c7cfaa5b039ae36630

                                                      SHA512

                                                      c71bc1d11aed1998f655fee7116f14a2f2e533c6d1468814479e20ebdf60d784aacb41ba21490c7cee0c686e6cef411324cfdac17cbca847d6ef71bc775897aa

                                                    • C:\Users\Admin\AppData\Local\Temp\qbE5759A9.0E\7z2201.exe

                                                      Filesize

                                                      1.2MB

                                                      MD5

                                                      734e95cdbe04f53fe7c28eeaaaad7327

                                                      SHA1

                                                      e49a4d750f83bc81d79f1c4c3f3648a817c7d3da

                                                      SHA256

                                                      8c8fbcf80f0484b48a07bd20e512b103969992dbf81b6588832b08205e3a1b43

                                                      SHA512

                                                      16b02001c35248f18095ba341b08523db327d7aa93a55bcee95aebb22235a71eae21a5a8d19019b10cac3e7764a59d78cf730110bae80acc2ff249bbc7861ad7

                                                    • C:\Windows\System32\CatRoot2\dberr.txt

                                                      Filesize

                                                      131KB

                                                      MD5

                                                      3b89dc064be82d63540c7504c006c783

                                                      SHA1

                                                      797f8ff94be2609754b9888ccafb718f2e2183a1

                                                      SHA256

                                                      c54f87a8cd478643ba7b8370bfe075d994f3d1c611fbc997758d72f1ef3d4280

                                                      SHA512

                                                      feab36cf95dbf14effcb43086c4e6e7913fa4809a1cad4100abf3501082ae3d9ca6bdd01222f161433e2d439f73f79b58e0f079d09214e53e0996a4b9bf02715

                                                    • C:\Windows\System32\catroot2\dberr.txt

                                                      Filesize

                                                      131KB

                                                      MD5

                                                      63e45fb03ef5bf0c866f7ea3350b185e

                                                      SHA1

                                                      32ad05315564850b463b1c447195037a62260de8

                                                      SHA256

                                                      da2ee498623ae9d2fd5410247a0779ca45d202ab7c8aef14a9cfc94e911bf17b

                                                      SHA512

                                                      5ba0ce8c9cbbe84c41455cad30ff3b1e00f935a4aa911c130076fcae34681c63ece4a9e3f13f0d8bc67c5a19cd275d94bf7b94c2021623040115c4816724d32d

                                                    • memory/540-1430-0x0000000000400000-0x0000000000549000-memory.dmp

                                                      Filesize

                                                      1.3MB

                                                    • memory/2920-890-0x0000000000400000-0x000000000049C000-memory.dmp

                                                      Filesize

                                                      624KB

                                                    • memory/2920-1436-0x0000000000400000-0x000000000049C000-memory.dmp

                                                      Filesize

                                                      624KB

                                                    • memory/3216-941-0x0000000000400000-0x0000000000445000-memory.dmp

                                                      Filesize

                                                      276KB

                                                    • memory/3216-274-0x0000000000400000-0x0000000000445000-memory.dmp

                                                      Filesize

                                                      276KB

                                                    • memory/3216-1326-0x0000000000400000-0x0000000000445000-memory.dmp

                                                      Filesize

                                                      276KB

                                                    • memory/3596-992-0x00000000034A0000-0x00000000034A1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/3596-987-0x0000000004480000-0x00000000048C0000-memory.dmp

                                                      Filesize

                                                      4.2MB

                                                    • memory/3596-989-0x00000000048C0000-0x0000000004AC0000-memory.dmp

                                                      Filesize

                                                      2.0MB

                                                    • memory/3596-991-0x00000000034A0000-0x00000000034A1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/3932-1089-0x0000000003C80000-0x0000000003C95000-memory.dmp

                                                      Filesize

                                                      84KB

                                                    • memory/3932-1325-0x0000000000400000-0x0000000000549000-memory.dmp

                                                      Filesize

                                                      1.3MB

                                                    • memory/3932-289-0x0000000003C80000-0x0000000003C95000-memory.dmp

                                                      Filesize

                                                      84KB

                                                    • memory/3932-993-0x0000000000400000-0x0000000000549000-memory.dmp

                                                      Filesize

                                                      1.3MB

                                                    • memory/3932-994-0x0000000003C80000-0x0000000003C95000-memory.dmp

                                                      Filesize

                                                      84KB

                                                    • memory/3980-256-0x00007FFBAE920000-0x00007FFBAF3E2000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/3980-257-0x00007FFBAE920000-0x00007FFBAF3E2000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/3980-254-0x000001E756930000-0x000001E756952000-memory.dmp

                                                      Filesize

                                                      136KB

                                                    • memory/3980-260-0x00007FFBAE920000-0x00007FFBAF3E2000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/3980-244-0x00007FFBAE923000-0x00007FFBAE925000-memory.dmp

                                                      Filesize

                                                      8KB

                                                    • memory/4688-1434-0x0000000000400000-0x0000000000549000-memory.dmp

                                                      Filesize

                                                      1.3MB