Analysis

  • max time kernel
    97s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/01/2025, 16:44

General

  • Target

    https://darknessonyx.com/ryos

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://sheayingero.shop/api

https://toppyneedus.biz/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 4 IoCs
  • Enumerates processes with tasklist 1 TTPs 8 IoCs
  • Drops file in Windows directory 24 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 50 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 51 IoCs
  • Suspicious use of SendNotifyMessage 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://darknessonyx.com/ryos
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae5c746f8,0x7ffae5c74708,0x7ffae5c74718
      2⤵
        PID:1384
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,1344284702785853437,1352618578492291136,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:2
        2⤵
          PID:432
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,1344284702785853437,1352618578492291136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2648
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,1344284702785853437,1352618578492291136,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:8
          2⤵
            PID:3060
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1344284702785853437,1352618578492291136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
            2⤵
              PID:1736
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1344284702785853437,1352618578492291136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:1
              2⤵
                PID:1196
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1344284702785853437,1352618578492291136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:1
                2⤵
                  PID:3836
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1344284702785853437,1352618578492291136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:1
                  2⤵
                    PID:1816
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,1344284702785853437,1352618578492291136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:8
                    2⤵
                      PID:716
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,1344284702785853437,1352618578492291136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:964
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1344284702785853437,1352618578492291136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:1
                      2⤵
                        PID:1888
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1344284702785853437,1352618578492291136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:1
                        2⤵
                          PID:2620
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2072,1344284702785853437,1352618578492291136,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5428 /prefetch:8
                          2⤵
                            PID:3504
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2072,1344284702785853437,1352618578492291136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5828 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1976
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1344284702785853437,1352618578492291136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2920 /prefetch:1
                            2⤵
                              PID:5100
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1344284702785853437,1352618578492291136,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3584 /prefetch:1
                              2⤵
                                PID:1452
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1344284702785853437,1352618578492291136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2336 /prefetch:1
                                2⤵
                                  PID:696
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1344284702785853437,1352618578492291136,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6564 /prefetch:1
                                  2⤵
                                    PID:2212
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:4864
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:1312
                                    • C:\Windows\System32\rundll32.exe
                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                      1⤵
                                        PID:4484
                                      • C:\Windows\system32\NOTEPAD.EXE
                                        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Temp1_r--e--l--e--a--s--e-x64.zip\README.txt
                                        1⤵
                                          PID:3404
                                        • C:\Users\Admin\Downloads\r--e--l--e--a--s--e-x64\Release\Bootstrapper.exe
                                          "C:\Users\Admin\Downloads\r--e--l--e--a--s--e-x64\Release\Bootstrapper.exe"
                                          1⤵
                                          • Drops file in Windows directory
                                          • System Location Discovery: System Language Discovery
                                          PID:2304
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /c copy Peak Peak.cmd & Peak.cmd
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:4880
                                            • C:\Windows\SysWOW64\tasklist.exe
                                              tasklist
                                              3⤵
                                              • Enumerates processes with tasklist
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2240
                                            • C:\Windows\SysWOW64\findstr.exe
                                              findstr /I "opssvc wrsa"
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2172
                                            • C:\Windows\SysWOW64\tasklist.exe
                                              tasklist
                                              3⤵
                                              • Enumerates processes with tasklist
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1656
                                            • C:\Windows\SysWOW64\findstr.exe
                                              findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2152
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c md 177979
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:5116
                                            • C:\Windows\SysWOW64\extrac32.exe
                                              extrac32 /Y /E Flyer
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:5056
                                            • C:\Windows\SysWOW64\findstr.exe
                                              findstr /V "tone" Intensity
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1004
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c copy /b 177979\Flows.com + Baby + Monday + Franklin + Keyword + Native + Box + Indeed + On + Mutual 177979\Flows.com
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2680
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c copy /b ..\Scheduled + ..\Metadata + ..\Columns + ..\Challenges + ..\Age + ..\Burner + ..\Ideas + ..\Three I
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1676
                                            • C:\Users\Admin\AppData\Local\Temp\177979\Flows.com
                                              Flows.com I
                                              3⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of FindShellTrayWindow
                                              • Suspicious use of SendNotifyMessage
                                              PID:4956
                                            • C:\Windows\SysWOW64\choice.exe
                                              choice /d y /t 5
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2944
                                        • C:\Users\Admin\Downloads\r--e--l--e--a--s--e-x64\Release\Bootstrapper.exe
                                          "C:\Users\Admin\Downloads\r--e--l--e--a--s--e-x64\Release\Bootstrapper.exe"
                                          1⤵
                                          • Drops file in Windows directory
                                          • System Location Discovery: System Language Discovery
                                          PID:4008
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /c copy Peak Peak.cmd & Peak.cmd
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:4296
                                            • C:\Windows\SysWOW64\tasklist.exe
                                              tasklist
                                              3⤵
                                              • Enumerates processes with tasklist
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2552
                                            • C:\Windows\SysWOW64\findstr.exe
                                              findstr /I "opssvc wrsa"
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:3968
                                            • C:\Windows\SysWOW64\tasklist.exe
                                              tasklist
                                              3⤵
                                              • Enumerates processes with tasklist
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2760
                                            • C:\Windows\SysWOW64\findstr.exe
                                              findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2812
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c md 177979
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:4700
                                            • C:\Windows\SysWOW64\extrac32.exe
                                              extrac32 /Y /E Flyer
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2788
                                            • C:\Windows\SysWOW64\findstr.exe
                                              findstr /V "tone" Intensity
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2760
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c copy /b 177979\Flows.com + Baby + Monday + Franklin + Keyword + Native + Box + Indeed + On + Mutual 177979\Flows.com
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:4664
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c copy /b ..\Scheduled + ..\Metadata + ..\Columns + ..\Challenges + ..\Age + ..\Burner + ..\Ideas + ..\Three I
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:3904
                                            • C:\Users\Admin\AppData\Local\Temp\177979\Flows.com
                                              Flows.com I
                                              3⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of FindShellTrayWindow
                                              • Suspicious use of SendNotifyMessage
                                              PID:752
                                            • C:\Windows\SysWOW64\choice.exe
                                              choice /d y /t 5
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1652
                                        • C:\Users\Admin\Downloads\r--e--l--e--a--s--e-x64\Release\Bootstrapper.exe
                                          "C:\Users\Admin\Downloads\r--e--l--e--a--s--e-x64\Release\Bootstrapper.exe"
                                          1⤵
                                          • Drops file in Windows directory
                                          • System Location Discovery: System Language Discovery
                                          PID:2636
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /c copy Peak Peak.cmd & Peak.cmd
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:3096
                                            • C:\Windows\SysWOW64\tasklist.exe
                                              tasklist
                                              3⤵
                                              • Enumerates processes with tasklist
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3952
                                            • C:\Windows\SysWOW64\findstr.exe
                                              findstr /I "opssvc wrsa"
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:3632
                                            • C:\Windows\SysWOW64\tasklist.exe
                                              tasklist
                                              3⤵
                                              • Enumerates processes with tasklist
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4760
                                            • C:\Windows\SysWOW64\findstr.exe
                                              findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:4772
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c md 177979
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2080
                                            • C:\Windows\SysWOW64\extrac32.exe
                                              extrac32 /Y /E Flyer
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:3572
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c copy /b 177979\Flows.com + Baby + Monday + Franklin + Keyword + Native + Box + Indeed + On + Mutual 177979\Flows.com
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2620
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c copy /b ..\Scheduled + ..\Metadata + ..\Columns + ..\Challenges + ..\Age + ..\Burner + ..\Ideas + ..\Three I
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:3716
                                            • C:\Users\Admin\AppData\Local\Temp\177979\Flows.com
                                              Flows.com I
                                              3⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of FindShellTrayWindow
                                              • Suspicious use of SendNotifyMessage
                                              PID:3852
                                            • C:\Windows\SysWOW64\choice.exe
                                              choice /d y /t 5
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:4608
                                        • C:\Users\Admin\Downloads\r--e--l--e--a--s--e-x64\Release\Bootstrapper.exe
                                          "C:\Users\Admin\Downloads\r--e--l--e--a--s--e-x64\Release\Bootstrapper.exe"
                                          1⤵
                                          • Drops file in Windows directory
                                          • System Location Discovery: System Language Discovery
                                          PID:1116
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /c copy Peak Peak.cmd & Peak.cmd
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:3460
                                            • C:\Windows\SysWOW64\tasklist.exe
                                              tasklist
                                              3⤵
                                              • Enumerates processes with tasklist
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2080
                                            • C:\Windows\SysWOW64\findstr.exe
                                              findstr /I "opssvc wrsa"
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:4508
                                            • C:\Windows\SysWOW64\tasklist.exe
                                              tasklist
                                              3⤵
                                              • Enumerates processes with tasklist
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4036
                                            • C:\Windows\SysWOW64\findstr.exe
                                              findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2084
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c md 177979
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:400
                                            • C:\Windows\SysWOW64\extrac32.exe
                                              extrac32 /Y /E Flyer
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:4420
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c copy /b 177979\Flows.com + Baby + Monday + Franklin + Keyword + Native + Box + Indeed + On + Mutual 177979\Flows.com
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:3716
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c copy /b ..\Scheduled + ..\Metadata + ..\Columns + ..\Challenges + ..\Age + ..\Burner + ..\Ideas + ..\Three I
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:4552
                                            • C:\Users\Admin\AppData\Local\Temp\177979\Flows.com
                                              Flows.com I
                                              3⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of FindShellTrayWindow
                                              • Suspicious use of SendNotifyMessage
                                              PID:4472
                                            • C:\Windows\SysWOW64\choice.exe
                                              choice /d y /t 5
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2100

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          8749e21d9d0a17dac32d5aa2027f7a75

                                          SHA1

                                          a5d555f8b035c7938a4a864e89218c0402ab7cde

                                          SHA256

                                          915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304

                                          SHA512

                                          c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          34d2c4f40f47672ecdf6f66fea242f4a

                                          SHA1

                                          4bcad62542aeb44cae38a907d8b5a8604115ada2

                                          SHA256

                                          b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33

                                          SHA512

                                          50fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                          Filesize

                                          288B

                                          MD5

                                          5377a7dd5668d9287856494af6997e7a

                                          SHA1

                                          b722e8d2531c7cf30534f061e4d21af85ac3aca0

                                          SHA256

                                          6ecc22ab3b51b4d33177aa5ea38f4ff18a3fa21705071b9d85987b99a643e14a

                                          SHA512

                                          43b4dd8c7b2386a6a669a9c20ed84d3e912c6e779ec58339e19bca5a76af67cd6a2be55b82b6923fe656028a66979779b30adf84c20096d82a29f9e3d2e51a7a

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                          Filesize

                                          1KB

                                          MD5

                                          07a2285ff1a91767d069e1659528bc14

                                          SHA1

                                          b3a7bfcbfba852905bab99b5b32391235316a98e

                                          SHA256

                                          cc99421d22d0f594c10c696c59a15f4c496ae0705a60ca8a531d895f3f00e0ed

                                          SHA512

                                          aa8fe89186ac36b634d07c25ce0f8fdd3f784255f1e788559433926a94a45d5d35ef440c3fea0387598db7ff6115af5e4ec1d6d7783deb3c3ddef78a0d267d24

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          98539e7871df957efa87019ae5a97e19

                                          SHA1

                                          08e34eac5c55f1149cbcae90f40d4e6cbf094a7f

                                          SHA256

                                          5af74f1e7269b864e8635e7f66c1d7b0d3d19a58fa02c2c2c93aad7e15620e01

                                          SHA512

                                          e0460bb2cafc5227a9484fbb66b9040675af3927b9c4beba677e575a9cad1535258c8355eeeb161cacc63149d5283e66acae5ec46ffab954920a7744ab7dd718

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          5KB

                                          MD5

                                          91ba5bfdfa499e9b1c52cd3eb3b077f1

                                          SHA1

                                          e5a128af38da30d731a35980dc8ac50d8f40d315

                                          SHA256

                                          2b8b2ee94a294a4dd8cc1192479a860d0a0ad061dbcfe3f957ca9cecdfeccab6

                                          SHA512

                                          93ee476dfe6682e38f99b620ad5ee447d6aafc5738bd21b7ce51072b2de8566fe5e3d0e2d380d33f554965832d476d2e20426b7f6c21c287f6a8a67f67b02ea0

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          fe9a78399d112d693ce955e64814850a

                                          SHA1

                                          8907513b665661d3ca33166491cd03a3c05b7d95

                                          SHA256

                                          a1a6c56a30e145cea92f5b35b8219a0ba01648114c9791b5bbc69c00cec726eb

                                          SHA512

                                          b060458a6a4db6eb9a20c95c5b128b5d3ffc4c3b5af8dcac8ed06d7e68c7c481a47c8bf13570479492aefcd722507c8869a9799cbebb874e99a08a50cbd2761c

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                          Filesize

                                          1KB

                                          MD5

                                          1796d4c557ceb4e0835eb8f7222d8c0a

                                          SHA1

                                          157b62fc59c787d7ffa660e97942a0f26cb6fb98

                                          SHA256

                                          c6551a527fa5f1e7afb4efd67bb36617d3bd018c43eae936037dd1d7afe47139

                                          SHA512

                                          522aa273ff7e2e610ecb6a1da5f2c009493beca6c8205b9e236194caf40918151150b8732a8d455578a2edc105d6516bf8b122978f52b03e06d0abbdd12d31ea

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57ec83.TMP

                                          Filesize

                                          707B

                                          MD5

                                          846f285e7ba8e0047c63f47bc42be101

                                          SHA1

                                          c295b5ca44e20757b309b64cc1ea27823b76e54d

                                          SHA256

                                          1e7b6dfe6a8dfa630c36dae3be36e4073cc2ba13d2e7eaa554db417c6a75c855

                                          SHA512

                                          542da15e90213f4b592ecee9a2572cd783ad13ddeeb9e36d3fbf70ebeeb3a748d69fa6e64d39818e912a87b3794e1df198196cf099518e8e431a3b5e54b27d32

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                          Filesize

                                          16B

                                          MD5

                                          6752a1d65b201c13b62ea44016eb221f

                                          SHA1

                                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                          SHA256

                                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                          SHA512

                                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          10KB

                                          MD5

                                          70f16ef276e39b10fe4448b0c910b15d

                                          SHA1

                                          f183165d07c1110da7fbf178bece00f0fdda3420

                                          SHA256

                                          e5ad23c5b8008cb792260970caf54efc0c7c3c0dae471e58088bb055fe430a6b

                                          SHA512

                                          fbaa5a359e2a50f505471f63a1228254da5e6b0a35f46741a27ac8dcfc281b1b2c1ea36c60eb8a9dfed4388c589338986224f085b0f2fbd4976e0fe95d8469dd

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          10KB

                                          MD5

                                          0fc24bd1db0d61da53dc33990a7b52e1

                                          SHA1

                                          d93879a833bc4131cc3fd18a9df4b7178885f7f3

                                          SHA256

                                          5e0a1c127e1e281754281a926b9fad21c791d49ae7ef0cb36024e0317f4e769c

                                          SHA512

                                          35e4208c6a5f7b5170e288862f9c4bfed5b093db85cf4f3baefba68f1d8e51dcb8e78c4ab0cfa0d20e1db6698d977297e703513c25f62d2d7631c26ad202d8a7

                                        • C:\Users\Admin\AppData\Local\Temp\177979\Flows.com

                                          Filesize

                                          1KB

                                          MD5

                                          8f9d821f8d7a79581a2ab3a0986a78f1

                                          SHA1

                                          b7bf35a298f8c440c28957e54f636dd91e35e31c

                                          SHA256

                                          a22de98030a228592c7d75a2c6fae0a637d7b4e8a2c52da61fef50f88478a86c

                                          SHA512

                                          0989650bd42270d5dc15bc77f8ee01e37b8dcbb3043a623cc5c1e8fff9bba8970b149cbc57281f4facb41509455f5af684a03cf96fadaedcb50d1e0f856ab9d6

                                        • C:\Users\Admin\AppData\Local\Temp\177979\Flows.com

                                          Filesize

                                          925KB

                                          MD5

                                          62d09f076e6e0240548c2f837536a46a

                                          SHA1

                                          26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

                                          SHA256

                                          1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

                                          SHA512

                                          32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

                                        • C:\Users\Admin\AppData\Local\Temp\177979\I

                                          Filesize

                                          477KB

                                          MD5

                                          8ce37257e647eafc2b435f2b56f2b33e

                                          SHA1

                                          beb990946ba7aa30d7f3f0c5242c5ff74ad2290d

                                          SHA256

                                          7385853f9d1e0473cffea742bdc89c69eabae19750402f7644c5e9c7274685db

                                          SHA512

                                          9e43b761faee231f440d405a429cdd4c45e155602988929ace1f34946951d18fd08a6b833e866642001a58b42971cee678667e5490adfb80f004a025f377e7d6

                                        • C:\Users\Admin\AppData\Local\Temp\Age

                                          Filesize

                                          60KB

                                          MD5

                                          84692b422690f4852cb88836dbb1e0b0

                                          SHA1

                                          931fd3f161113cb84407455b7786dd63bba3c15a

                                          SHA256

                                          cc2f5e9bac8af1aaf86d2c004f1b2234261b6722c1b821c2153d1835372ee875

                                          SHA512

                                          74f5610074976dc96c6e387e9719f789b4a2c4ec0cb1cafd20452df7b268a9468672a38169c447d534261ab7b085c135828bc0c84dc5831d5c82e3cd36161fa7

                                        • C:\Users\Admin\AppData\Local\Temp\Baby

                                          Filesize

                                          133KB

                                          MD5

                                          a86c655555e2e198272d833d78eb743b

                                          SHA1

                                          0f6bb609d65d8ae521f15f2306162e69469c57c8

                                          SHA256

                                          d6108619ca2f1670ef01ec58fd62d98c84877c7d6cec6075f27e7b926d71de12

                                          SHA512

                                          26b4319d1fd657f3e66395fd8db2b229358d487c685a4d6ac42d61c7604eb9920b2da6c16fcfd6e81ed512edc715630122fd8b9a6066ee3e96c0155ea1273eb5

                                        • C:\Users\Admin\AppData\Local\Temp\Box

                                          Filesize

                                          71KB

                                          MD5

                                          1b2da465247a01a3b76472249a3d0deb

                                          SHA1

                                          616f32ade9272c6d240506b8a74bdcccea9304ae

                                          SHA256

                                          94d5c530034c5ec9506c5e3b52def91b4e79b9222d7da2b712d00fe6f002d35b

                                          SHA512

                                          dfe9da0f3b449c24c751d4c0cda6a0377d1070461c4f25b1900057a02108c5768e350f0c0e217716cec77001a4f629e14f64d55894ff19f73f36c3e24abbeef4

                                        • C:\Users\Admin\AppData\Local\Temp\Burner

                                          Filesize

                                          64KB

                                          MD5

                                          878f18ed4b302e6c94d0a190d145f697

                                          SHA1

                                          c67320a66d6148485dec9075081db6957ef50e3c

                                          SHA256

                                          96e0e15abacaa99c9120b398a4d0c9eecfb08d789666940b74759ce913979713

                                          SHA512

                                          8545bcf1a979bae7c1de2aa34a5198ec772161d021e3fb302de4bb631a6796dddc9093f91b7ba14e4d41327c463bb61d2ff0b1fa8bb48c7cdc9808d5cc2f652f

                                        • C:\Users\Admin\AppData\Local\Temp\Challenges

                                          Filesize

                                          94KB

                                          MD5

                                          0fd905bd29e18e664e3d3d9a6bb06ae6

                                          SHA1

                                          f532f1ba93228a60a483b40e4cd9c41e08877a27

                                          SHA256

                                          958643e7eba918e3867e1813480038d19716f39740d882755b7030ad8ac3bffc

                                          SHA512

                                          22416b891d9cb11adb5a5483e7eda868df6e5439ccfc635c077206c030d1814070c52718dedd3307983982d92a57b9644afd66f8e4936905da04ad4a3837f7a2

                                        • C:\Users\Admin\AppData\Local\Temp\Columns

                                          Filesize

                                          56KB

                                          MD5

                                          1c070e2cfeee36acf2fc7eb8c940ea66

                                          SHA1

                                          bb0e3d8db79e93bc732227bf3b5328c34e2dc254

                                          SHA256

                                          9a34487568789c5baff8a4fc46f0759d8d7cc06189ccbff928c3f6f2a0cb3cbd

                                          SHA512

                                          d58a8eaa563a6f092d062f5d31b16195c48b9ac5a657c8e2dbcf658c000b24bbc092d2526a4976f820318a0586037b9e707b1b2f06b8c972e34b7f767c5024c7

                                        • C:\Users\Admin\AppData\Local\Temp\Flyer

                                          Filesize

                                          476KB

                                          MD5

                                          0338ef5a811b1886bc1c34f368cb2ffa

                                          SHA1

                                          d4c5d8a923c3271e1fd283ec1d8163b67db4dbbf

                                          SHA256

                                          3ddd2fe9b650e01e2f8b8940c47d5fc5039962a2f5315646c0baad6a2fdb0fa2

                                          SHA512

                                          8b0596bc09da58e88a959d3d73128e1db6c3095b283ee2e96be7048d055988c27b45f4a256ccaa22d489082262722900b8d01afd511efb8187153265266aced8

                                        • C:\Users\Admin\AppData\Local\Temp\Franklin

                                          Filesize

                                          93KB

                                          MD5

                                          56e4414823fd2b7142284ed6d5a363b7

                                          SHA1

                                          64ee8eff5dc6de329ca71d2bdc8280a55dde95ba

                                          SHA256

                                          c5a5cfbf1ad6b80af7b467a232a5c016f8e077e5e33a84c306bea7fd3c5b319b

                                          SHA512

                                          6e8f863ac5473e528a6eef96c07a56bdf2cd5572f2df68cf6745d5819c367160edcb098a378ef4d7de4814aa4a09705d1d11be2aa949c44b7d56f201952881bd

                                        • C:\Users\Admin\AppData\Local\Temp\Ideas

                                          Filesize

                                          31KB

                                          MD5

                                          e50136a38f613d17b3e7b16494046b5b

                                          SHA1

                                          b506c206443b8b883529722b940a6a9c0af54bc0

                                          SHA256

                                          f005bdf7c5860d111c22ea7092d268d78a911b00e2639d01adbbf9525d0fdbca

                                          SHA512

                                          c3cff90c63c92563af8549b11f1186cacb5a8eca237a24a3858da385740cbf338d0768d02574f81e42876a30bd023e8e5d822e8e9eeabb6cebf41ec400c2363d

                                        • C:\Users\Admin\AppData\Local\Temp\Ideas

                                          Filesize

                                          60KB

                                          MD5

                                          7b55e663410315b46b7c6cf9694f2608

                                          SHA1

                                          052f23cbbb5534826753018adc62f29cc7ae94d9

                                          SHA256

                                          37e34e0e46968b68e412ea504b05c5156252dae0b70e0687ba90271f04bb45d1

                                          SHA512

                                          dc4c6c0b7b3d633aa7d07bac7ee093867c043086bab2d0a450a726f9eef7a75f9b6406b567a1dcfbbc6d4fe87b89dfbb772f41e4aa2a90e0464edde3ea6a1479

                                        • C:\Users\Admin\AppData\Local\Temp\Indeed

                                          Filesize

                                          147KB

                                          MD5

                                          09c30eb57d7b8d5b6d2bed9172d72dba

                                          SHA1

                                          fc927ce49b240a9074d7cebc24ca184edbd8a1bf

                                          SHA256

                                          b321aaeea6b3b59d803228074d3d92a1f3c708c6b7ea46147c95511215cc105b

                                          SHA512

                                          fc34121fbbef228a8b250142cc10d47de6969f13d22d539c5e4411fe0af2c1117636413092e8fd756354b634a42f47bd6e584700ca79f8ab3113ad64f6ad2fd4

                                        • C:\Users\Admin\AppData\Local\Temp\Intensity

                                          Filesize

                                          1KB

                                          MD5

                                          f61e65c8b5e558627396ed8261aee6a4

                                          SHA1

                                          9a35551af1d6bf2ffa97d15ec9c5b39d0f6d505a

                                          SHA256

                                          86d914001ade248c24ebdc8e38e39565c4f5bc2bd05deb357cae22d805707d72

                                          SHA512

                                          65be47472dca6c4eb8e099d54dedb8169486449832ff29ed563d632954d48789731b16fb442717efed0b5742e7a672c11e032fd4ccfde6b6e0cd77a32e8c9b92

                                        • C:\Users\Admin\AppData\Local\Temp\Keyword

                                          Filesize

                                          124KB

                                          MD5

                                          6349c17c75b1138329f07491744a9ed4

                                          SHA1

                                          840c353b3f6a3dfc0b75bb389e2d9903c98890d2

                                          SHA256

                                          15c91f0da6a7118a864f230d59149f8d56bf3d50404fd5b5c2b610a5dab0d293

                                          SHA512

                                          bea4e290e2b7a246e42facd5a987894b267881f26154d67f56b179168b1da9c9338d41f9808f63e1d0de8995c50e321e44d228d1cef761ea8faf9f159904b787

                                        • C:\Users\Admin\AppData\Local\Temp\Metadata

                                          Filesize

                                          68KB

                                          MD5

                                          2a0bf741f448dd30696be8f465b5b833

                                          SHA1

                                          b4a2c57793378236bf3c50c1fb45fcc1920fbbca

                                          SHA256

                                          3a3a09f732bb2b46fd1ef87e67088be5614dffe9fa661afa8acf2d7764ab7496

                                          SHA512

                                          269a5e255b674017086e2bc74ef8c6f7f14176e923283cbf8113ebcd5d585b485f5b43f9aec6ae9ffcdb6e8d5248c8bb70e65b3647ff7f10409938313ec96c5e

                                        • C:\Users\Admin\AppData\Local\Temp\Monday

                                          Filesize

                                          84KB

                                          MD5

                                          b8eac858c394e989430167327a8ae7cf

                                          SHA1

                                          c7226e8012f0888b7bec48d0afade50534db1fdc

                                          SHA256

                                          45dd80aa6a648289f7f13b413884b6e288018c8178bce3df58c53b49e51f68fc

                                          SHA512

                                          5f6005be3db377c0050189d8ddab64f1e43e61f0471a6239d03af705f51cdb3d64ba3011fdb8c9c7d569cf4321f0abb13a0fcf1f088397fae390d5bcc4aaf802

                                        • C:\Users\Admin\AppData\Local\Temp\Mutual

                                          Filesize

                                          67KB

                                          MD5

                                          07d393f56efd3b9326606b437b71f1d4

                                          SHA1

                                          bd63b40e51e2e6c68a266e9f06f20b94e29c882c

                                          SHA256

                                          f0ef7a9e9dce3aebcf8e05805ba9c1c912c4faae9e01b9ca3efd2ec83f528414

                                          SHA512

                                          ad6471df9322535eb862d86cbd342ddf3e744932889972d310412b06c0a66af807f708c115232f29278c074ec9611896e91876a99ba468494bd4304a1378f559

                                        • C:\Users\Admin\AppData\Local\Temp\Native

                                          Filesize

                                          90KB

                                          MD5

                                          b09fe66fe9ba0c96d5f09e3cceaf61a8

                                          SHA1

                                          04e173e7bc1d3c632d206b2f38bdd2bac4b40a21

                                          SHA256

                                          b5f56cd6ac094dec19e7b1ff1ed162dc07d4ca3af7579adca5ac9c43a44640dd

                                          SHA512

                                          746a22266eb2c8d8d89de5dd3c605ead29d2bf0b172bdedcd6d298126dcc02522707e488c3400cd2edb7cd0265a7e12212b16ff336f148a39a252055c653a959

                                        • C:\Users\Admin\AppData\Local\Temp\On

                                          Filesize

                                          114KB

                                          MD5

                                          6c1c4f39f2bb55057641898e3d376930

                                          SHA1

                                          b43b16c85687517d3dd83f82b6b421304f7e628d

                                          SHA256

                                          48e5d116dc1494dbd8905eec10832aa7ce19f4f812d91514ab6fce5ce6f57cf7

                                          SHA512

                                          ff4ee5c654f50bea1fb92ace656c952ef573759f08ce072468d5029e6c38d77609a200de54f49c68c9fecf6ed515dd2864ba3acb1a5ce523d6a3efae9745a3f0

                                        • C:\Users\Admin\AppData\Local\Temp\Peak

                                          Filesize

                                          30KB

                                          MD5

                                          20718b8b13d6d0de153980d6759d39e5

                                          SHA1

                                          d3ac2a4ea8dcbe0f74f4ac148c4567aeb6f707ad

                                          SHA256

                                          abaa9a49fce5f6ee29eb407c9aa85961ab8f256a322e3309cf7c874ef7a56e9b

                                          SHA512

                                          2864b793a479410ea6ba152490ff313e40a6357444245fb4935777d9ebf854918bc5ddbf8d4b3d348a94b5931501664cc1d41b5617b10e62bdd24efba60fd0fc

                                        • C:\Users\Admin\AppData\Local\Temp\Scheduled

                                          Filesize

                                          56KB

                                          MD5

                                          99b09fb9fba65c428078b8ccd89f90ea

                                          SHA1

                                          c1ec375fa1c9ac8323fa156596ff7694b4b18dc4

                                          SHA256

                                          86bc96aaf2de8304b80d0ee08ea403686c2dca2c5c623eb7692ab85b41217910

                                          SHA512

                                          8fe7a7ed45a52ce4b6b0b0a325349d14598953f056f331d4aba128c11dbcf06f6b1f1ee58e92dcc7f7569e60fc97561118841dba8a77b0c32e2ee95dde964e24

                                        • C:\Users\Admin\AppData\Local\Temp\Three

                                          Filesize

                                          19KB

                                          MD5

                                          2e94c6d5accc6a1afec513fc9bffce73

                                          SHA1

                                          f58f072d322645b8160adf57e4de7383dd5668c6

                                          SHA256

                                          6f8378f9fbde1d7f59f5ff455f8aab61eea7fa7c591f05bf88f761be2cbaeb65

                                          SHA512

                                          c62b03e9320333c174b04988d33af71dfbd9a37aaa8518847a2bf14a29a1c761481c6869d59b7f089a775cc06f023fc93c5924da47f2ca25fb696e4fccfd4ffe

                                        • C:\Users\Admin\Downloads\Unconfirmed 121064.crdownload

                                          Filesize

                                          12.4MB

                                          MD5

                                          b6c0c203eb8675d248bc6ed8c3513701

                                          SHA1

                                          46cce4d61d379cc9c47cc23acd8a7e0a97a81ab9

                                          SHA256

                                          baaf365bb38e0594cb34084be2ffe72d040da9caf876a9f2b6a893d3001a5aa9

                                          SHA512

                                          988170a7343405a06fb013aa2bef317fd6e1c401b68ee98dc746e4f875ef93d6927f8c8cfbe82ea47efafa558172dcc6f6201339fcc781edb69c2b989d5c9aa7

                                        • memory/4956-1073-0x0000000003F30000-0x0000000003F8B000-memory.dmp

                                          Filesize

                                          364KB

                                        • memory/4956-1076-0x0000000003F30000-0x0000000003F8B000-memory.dmp

                                          Filesize

                                          364KB

                                        • memory/4956-1077-0x0000000003F30000-0x0000000003F8B000-memory.dmp

                                          Filesize

                                          364KB

                                        • memory/4956-1075-0x0000000003F30000-0x0000000003F8B000-memory.dmp

                                          Filesize

                                          364KB

                                        • memory/4956-1074-0x0000000003F30000-0x0000000003F8B000-memory.dmp

                                          Filesize

                                          364KB