Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/03/2025, 22:53

General

  • Target

    408c0676e16a5909a455e1f61c8c46061b679d5a6d5e1b33654a2a051f87ee19.exe

  • Size

    6.8MB

  • MD5

    4cd871f009acf628be79b499650c9352

  • SHA1

    59e34a6a22bc1409361f729374d69ffb93766d3a

  • SHA256

    408c0676e16a5909a455e1f61c8c46061b679d5a6d5e1b33654a2a051f87ee19

  • SHA512

    e4fd778092f18076ee16b226c69a2eea2d05d5aa9103e0b4814c052b9a6cb0054632df81dc4820e9e510bc74c754df620e09609945e6e57159ad83e934b1df4c

  • SSDEEP

    98304:fUZlBeW2WF4d/zB/Uc9C48vT4cv1McmJvzVYBqtq4eZ5Aqqx96lWutM:iFG/+kSpdF3B8voKy8H

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://letterdrive.shop/api

https://citydisco.bet/api

https://crosshairc.life/api

https://mrodularmall.top/api

https://jowinjoinery.icu/api

https://legenassedk.top/api

https://.htardwarehu.icu/api

https://cjlaspcorne.icu/api

https://bugildbett.top/api

https://rweaponrywo.digital/api

Extracted

Family

stealc

Botnet

brat

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 14 IoCs
  • Downloads MZ/PE file 12 IoCs
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 28 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 16 IoCs
  • Identifies Wine through registry keys 2 TTPs 14 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 59 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 52 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\408c0676e16a5909a455e1f61c8c46061b679d5a6d5e1b33654a2a051f87ee19.exe
    "C:\Users\Admin\AppData\Local\Temp\408c0676e16a5909a455e1f61c8c46061b679d5a6d5e1b33654a2a051f87ee19.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2592
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\V3Z16.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\V3Z16.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\V8h55.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\V8h55.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:412
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1s85b9.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1s85b9.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1108
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2208
            • C:\Users\Admin\AppData\Local\Temp\1092840001\d458b2a21e.exe
              "C:\Users\Admin\AppData\Local\Temp\1092840001\d458b2a21e.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2016
            • C:\Users\Admin\AppData\Local\Temp\1094253001\9e9bc803ae.exe
              "C:\Users\Admin\AppData\Local\Temp\1094253001\9e9bc803ae.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Downloads MZ/PE file
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3128
              • C:\Users\Admin\AppData\Local\Temp\GHWRATQBBVQN00A3ZPJLVB8T8.exe
                "C:\Users\Admin\AppData\Local\Temp\GHWRATQBBVQN00A3ZPJLVB8T8.exe"
                7⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:3872
            • C:\Users\Admin\AppData\Local\Temp\1094254001\c55b59e029.exe
              "C:\Users\Admin\AppData\Local\Temp\1094254001\c55b59e029.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Downloads MZ/PE file
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Loads dropped DLL
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3556
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                7⤵
                • Uses browser remote debugging
                • Enumerates system info in registry
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of WriteProcessMemory
                PID:2908
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7fffc16fcc40,0x7fffc16fcc4c,0x7fffc16fcc58
                  8⤵
                    PID:5108
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1780,i,18440745938938414878,511419886241371975,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1776 /prefetch:2
                    8⤵
                      PID:1852
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2168,i,18440745938938414878,511419886241371975,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2220 /prefetch:3
                      8⤵
                        PID:4004
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,18440745938938414878,511419886241371975,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2456 /prefetch:8
                        8⤵
                          PID:1764
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3208,i,18440745938938414878,511419886241371975,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3216 /prefetch:1
                          8⤵
                          • Uses browser remote debugging
                          PID:2924
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3256,i,18440745938938414878,511419886241371975,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3356 /prefetch:1
                          8⤵
                          • Uses browser remote debugging
                          PID:2116
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4552,i,18440745938938414878,511419886241371975,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4600 /prefetch:1
                          8⤵
                          • Uses browser remote debugging
                          PID:4380
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4776,i,18440745938938414878,511419886241371975,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4780 /prefetch:8
                          8⤵
                            PID:3864
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4824,i,18440745938938414878,511419886241371975,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4852 /prefetch:8
                            8⤵
                              PID:1936
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4336,i,18440745938938414878,511419886241371975,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4748 /prefetch:8
                              8⤵
                                PID:4192
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5052,i,18440745938938414878,511419886241371975,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3660 /prefetch:8
                                8⤵
                                  PID:3312
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4596,i,18440745938938414878,511419886241371975,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4796 /prefetch:8
                                  8⤵
                                    PID:4448
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5260,i,18440745938938414878,511419886241371975,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5168 /prefetch:8
                                    8⤵
                                      PID:4060
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5060,i,18440745938938414878,511419886241371975,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4332 /prefetch:8
                                      8⤵
                                        PID:2500
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5064,i,18440745938938414878,511419886241371975,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4820 /prefetch:8
                                        8⤵
                                          PID:3800
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5244,i,18440745938938414878,511419886241371975,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5056 /prefetch:2
                                          8⤵
                                          • Uses browser remote debugging
                                          PID:5616
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                                        7⤵
                                        • Uses browser remote debugging
                                        • Enumerates system info in registry
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                        • Suspicious use of FindShellTrayWindow
                                        PID:5164
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7fffc0d946f8,0x7fffc0d94708,0x7fffc0d94718
                                          8⤵
                                          • Checks processor information in registry
                                          • Enumerates system info in registry
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:5148
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,1849060080191405399,13952711735356718491,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2016 /prefetch:2
                                          8⤵
                                            PID:4524
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,1849060080191405399,13952711735356718491,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:3
                                            8⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:5352
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,1849060080191405399,13952711735356718491,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2456 /prefetch:2
                                            8⤵
                                              PID:5376
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2000,1849060080191405399,13952711735356718491,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2564 /prefetch:8
                                              8⤵
                                                PID:5432
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,1849060080191405399,13952711735356718491,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2532 /prefetch:2
                                                8⤵
                                                  PID:5472
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,1849060080191405399,13952711735356718491,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2988 /prefetch:2
                                                  8⤵
                                                    PID:5564
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,1849060080191405399,13952711735356718491,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3336 /prefetch:2
                                                    8⤵
                                                      PID:3928
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,1849060080191405399,13952711735356718491,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3408 /prefetch:2
                                                      8⤵
                                                        PID:916
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2000,1849060080191405399,13952711735356718491,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2664 /prefetch:1
                                                        8⤵
                                                        • Uses browser remote debugging
                                                        PID:5612
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2000,1849060080191405399,13952711735356718491,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:1
                                                        8⤵
                                                        • Uses browser remote debugging
                                                        PID:3800
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,1849060080191405399,13952711735356718491,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3200 /prefetch:2
                                                        8⤵
                                                          PID:5656
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,1849060080191405399,13952711735356718491,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3548 /prefetch:2
                                                          8⤵
                                                            PID:5684
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,1849060080191405399,13952711735356718491,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3896 /prefetch:2
                                                            8⤵
                                                              PID:5760
                                                        • C:\Users\Admin\AppData\Local\Temp\1094255001\c1e7bc4735.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\1094255001\c1e7bc4735.exe"
                                                          6⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Executes dropped EXE
                                                          • Identifies Wine through registry keys
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          • Suspicious use of SetThreadContext
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:4264
                                                          • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                            "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                            7⤵
                                                            • Downloads MZ/PE file
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5452
                                                        • C:\Users\Admin\AppData\Local\Temp\1094256001\3b1831c27a.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\1094256001\3b1831c27a.exe"
                                                          6⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Executes dropped EXE
                                                          • Identifies Wine through registry keys
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          • Suspicious use of SetThreadContext
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:6108
                                                          • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                            "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                            7⤵
                                                            • Downloads MZ/PE file
                                                            • System Location Discovery: System Language Discovery
                                                            PID:3172
                                                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2u1258.exe
                                                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2u1258.exe
                                                      4⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:32
                                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3F46L.exe
                                                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3F46L.exe
                                                    3⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:376
                                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4c441t.exe
                                                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4c441t.exe
                                                  2⤵
                                                  • Modifies Windows Defender DisableAntiSpyware settings
                                                  • Modifies Windows Defender Real-time Protection settings
                                                  • Modifies Windows Defender TamperProtection settings
                                                  • Modifies Windows Defender notification settings
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Windows security modification
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2172
                                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:2308
                                              • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                1⤵
                                                  PID:4264
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                  1⤵
                                                    PID:2912
                                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5996
                                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5528

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\ProgramData\mozglue.dll

                                                    Filesize

                                                    593KB

                                                    MD5

                                                    c8fd9be83bc728cc04beffafc2907fe9

                                                    SHA1

                                                    95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                    SHA256

                                                    ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                    SHA512

                                                    fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                  • C:\ProgramData\nss3.dll

                                                    Filesize

                                                    2.0MB

                                                    MD5

                                                    1cc453cdf74f31e4d913ff9c10acdde2

                                                    SHA1

                                                    6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                    SHA256

                                                    ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                    SHA512

                                                    dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                    Filesize

                                                    649B

                                                    MD5

                                                    781032a645d2c0352d828520d9dd7c3f

                                                    SHA1

                                                    500203bc76f405488f481b8702a060cb330a6da8

                                                    SHA256

                                                    ec5ed74c94e74f640d27abfcd56c2d4aa4747a79395b093e0989e1f02c618a4c

                                                    SHA512

                                                    dc28fcf9cb49cb11cff46ad69990e6fcd982c9c20c98ba48274124d9f42cada991dca4c7de2e8598d5ef004578a3df92d05ebf840e5e6983f876cf9b1c67d5d2

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\_locales\en_CA\messages.json

                                                    Filesize

                                                    851B

                                                    MD5

                                                    07ffbe5f24ca348723ff8c6c488abfb8

                                                    SHA1

                                                    6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                    SHA256

                                                    6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                    SHA512

                                                    7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\dasherSettingSchema.json

                                                    Filesize

                                                    854B

                                                    MD5

                                                    4ec1df2da46182103d2ffc3b92d20ca5

                                                    SHA1

                                                    fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                    SHA256

                                                    6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                    SHA512

                                                    939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                    Filesize

                                                    2B

                                                    MD5

                                                    d751713988987e9331980363e24189ce

                                                    SHA1

                                                    97d170e1550eee4afc0af065b78cda302a97674c

                                                    SHA256

                                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                    SHA512

                                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\9563932d-5320-4db3-af3e-cb0dce3bbc9a.dmp

                                                    Filesize

                                                    10.4MB

                                                    MD5

                                                    791a3ebd735e3050799b9503e2c51d42

                                                    SHA1

                                                    e6db6c39b850809eb1d9ad2cc985743028cdbe48

                                                    SHA256

                                                    2e625b0a26664dc26abacd0975855c740e0e24962888bbb6ccad99be8121941d

                                                    SHA512

                                                    b0a10847f13b217c70265522bdf00d77e91141de526e046202630b11e50b08c5a6960d620a673216d54b5847901ea0681172aef25f1ec41c8f228d7b28b7d5b8

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    0621e31d12b6e16ab28de3e74462a4ce

                                                    SHA1

                                                    0af6f056aff6edbbc961676656d8045cbe1be12b

                                                    SHA256

                                                    1fd3365fdb49f26471ce9e348ce54c9bc7b66230118302b32074029d88fb6030

                                                    SHA512

                                                    bf0aa5b97023e19013d01abd3387d074cdd5b57f98ec4b0241058b39f9255a7bbab296dce8617f3368601a3d751a6a66dc207d8dd3fc1cba9cac5f98e3127f6f

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    56361f50f0ee63ef0ea7c91d0c8b847a

                                                    SHA1

                                                    35227c31259df7a652efb6486b2251c4ee4b43fc

                                                    SHA256

                                                    7660beecfee70d695225795558f521c3fb2b01571c224b373d202760b02055c0

                                                    SHA512

                                                    94582035220d2a78dfea9dd3377bec3f4a1a1c82255b3b74f4e313f56eb2f7b089e36af9fceea9aa83b7c81432622c3c7f900008a1bdb6b1cd12c4073ae4b8a2

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\94d30c53-77d5-4ad1-9b52-b3f59ad3cd72.tmp

                                                    Filesize

                                                    1B

                                                    MD5

                                                    5058f1af8388633f609cadb75a75dc9d

                                                    SHA1

                                                    3a52ce780950d4d969792a2559cd519d7ee8c727

                                                    SHA256

                                                    cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                    SHA512

                                                    0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    206bff78a27de05d7fef20ced9992c60

                                                    SHA1

                                                    78ebfb225600296baf1bd7bc4a9be93ac495838b

                                                    SHA256

                                                    c2fb6df6a4192f465c2d3777c7cf5ac05607e1c39a9df10842501fc9ba12a936

                                                    SHA512

                                                    aaeb8c1361e5c87d3a38525c49458e243f242c74657a7d1111ce2d4f0a1fb6f5d94cea605fd4575a5bffc46e05ea17e49e43ee70ad93250742e7ec69fd0fdd68

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                    Filesize

                                                    264KB

                                                    MD5

                                                    f50f89a0a91564d0b8a211f8921aa7de

                                                    SHA1

                                                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                    SHA256

                                                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                    SHA512

                                                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0SGRQ25I\soft[1]

                                                    Filesize

                                                    987KB

                                                    MD5

                                                    f49d1aaae28b92052e997480c504aa3b

                                                    SHA1

                                                    a422f6403847405cee6068f3394bb151d8591fb5

                                                    SHA256

                                                    81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                                                    SHA512

                                                    41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\APYB1149\service[1].htm

                                                    Filesize

                                                    1B

                                                    MD5

                                                    cfcd208495d565ef66e7dff9f98764da

                                                    SHA1

                                                    b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                    SHA256

                                                    5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                    SHA512

                                                    31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                  • C:\Users\Admin\AppData\Local\Temp\1092840001\d458b2a21e.exe

                                                    Filesize

                                                    2.0MB

                                                    MD5

                                                    7aaf1e3889a0ab4f9a66f22d08a76d08

                                                    SHA1

                                                    546499bac49e62427ce9fc1912a344365aeebf34

                                                    SHA256

                                                    3b046168560dbaa020e88cc1d8401ec97817ec0e32477d638beeb1355633e95e

                                                    SHA512

                                                    d163e9ca6c7e888c6961c2112d0e49dcbfa8ff15abcb473d290ca07abd776bd226675befeeebbbccae128b249edcabf4746dc797ed8abfea0757d918f800f964

                                                  • C:\Users\Admin\AppData\Local\Temp\1094253001\9e9bc803ae.exe

                                                    Filesize

                                                    2.0MB

                                                    MD5

                                                    832ba14244cf596a6e9e5fbc9e8ec7c6

                                                    SHA1

                                                    96b0cabee843ccccf0a0f230639dbf6b2e651d08

                                                    SHA256

                                                    56db6ee33b98fadcc29927dabbf0e8c94cf7609c6b213690fcc6b389563ef11d

                                                    SHA512

                                                    2827a22a606bcdb3fff59efd2126ebdd563e931b520590819654b6d7bc31afa859de00c894cdd97cb5e7c662ae751aee13a35aaf98bc0414dab66f3772f3bc89

                                                  • C:\Users\Admin\AppData\Local\Temp\1094254001\c55b59e029.exe

                                                    Filesize

                                                    1.7MB

                                                    MD5

                                                    ebeed8ae64694a73885132e097b63daf

                                                    SHA1

                                                    d566f5804bd08f748837e7a5d730e4448bde7390

                                                    SHA256

                                                    2eb1ae27ce966a2cf0f689587d5e9d832d5280ede741d032d19eb1898d3dda85

                                                    SHA512

                                                    4a613b1f2c982f406d619e9cce17ce85fdb484c01584e0ae76bfc681d95225b720ecec75f23d8bae2b1aea882e841c022052ed95a610d48eb8e7261e1104b49a

                                                  • C:\Users\Admin\AppData\Local\Temp\1094255001\c1e7bc4735.exe

                                                    Filesize

                                                    3.7MB

                                                    MD5

                                                    6663c99b510f2c20ea97bb128d0c9025

                                                    SHA1

                                                    fa5f84dc5d3ea4868fef78c0621202236e41ea2a

                                                    SHA256

                                                    9a3c5396c75a5f07c9a546aedf334615a8425c2dd86cd0ec8cebab43f8eff498

                                                    SHA512

                                                    9a0c1926f25ed203cb42ed80eb9dd2c54f8a66df7ede31aef826b80d849a7a6875701a55793d1c5987b5ee59ba74f9bd5e268805fbd397389553fb67ba456128

                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4c441t.exe

                                                    Filesize

                                                    2.7MB

                                                    MD5

                                                    aa0cfbbf745ca7eccf6cc5ec6be763ed

                                                    SHA1

                                                    db20356489335ade3d620b847c299d0964713de5

                                                    SHA256

                                                    55f4ca5479842f5e0915cf1dd74ce1ffc528be222bf1c2c931ce8e949cce4897

                                                    SHA512

                                                    ca037ee68feaad7cbe58c6d4725cc74fe09a57ce64b0a4645325d922bcfb410aec9a52a4e7b9866e1aedc8b70d306803515bafaaf49a8867e38719fc8b5673fc

                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\V3Z16.exe

                                                    Filesize

                                                    5.2MB

                                                    MD5

                                                    a89e92348af5d36efd263c421a8df577

                                                    SHA1

                                                    5804d0993308fa99a2ed06fbb5b30666ef4e8ab0

                                                    SHA256

                                                    03c8e104b9035ec83bde822a34ba7e1781e9d8ca2798aebbed986fe7329f3cbd

                                                    SHA512

                                                    68da7ec4c8a0bcf9405beefea4ecb5613fa87f0d3529da65db2e699fafb3d6ea64f7913d937ac371494d5f3b785501b696bc8b4e044c2528d1e2fb958a2e6538

                                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3F46L.exe

                                                    Filesize

                                                    1.7MB

                                                    MD5

                                                    253d390f37e89a62253da0d299c56ee6

                                                    SHA1

                                                    de4c42e88ae58261296f015cab9b614272601218

                                                    SHA256

                                                    8019c360ae5efbb430b054821191847452cd2b17868401b126d39171a0b9ec61

                                                    SHA512

                                                    8fb9959305ddea682555650a62df5d458b377ed3aac96dc8b07f2a1dc7fd2c6b882ab93753908cab5d19f291a477323d5bd7a8eb93b1fba87a363f331778338e

                                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\V8h55.exe

                                                    Filesize

                                                    3.4MB

                                                    MD5

                                                    b4aab7d5d435f78572bfea258e794426

                                                    SHA1

                                                    ad69afee9b02559af072cb9f364aa115e0e0325d

                                                    SHA256

                                                    7bfad59ecc8edd793ca1aa696c4d51a650c2768a191a73ad087c88d2e016bd08

                                                    SHA512

                                                    4a6a43c4100642d4f18f3d65ee5248892a500dbfd035309898a5fae2ba9325816d711b92cc13c5c908c8d1d62cd3a76d65b2345efab7e7b5d4caafa44827326e

                                                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1s85b9.exe

                                                    Filesize

                                                    3.1MB

                                                    MD5

                                                    2b5392bfdf1c7fe72fbe6f267225b5e1

                                                    SHA1

                                                    e3c35474f3baecafa74bdc19be6ab3006d3890e1

                                                    SHA256

                                                    f21edef086e2b65d9943caa601c2314cf64e0baaeb3c39b926095936c33ff8c9

                                                    SHA512

                                                    225972d64f2e83bb7da5b25bc850b3c2df8444b74311920b558d567c58cd0afc8653e4804f1bc97f95642aebe9598603578c3c663e0ef7bffe0c5091182037a0

                                                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2u1258.exe

                                                    Filesize

                                                    3.0MB

                                                    MD5

                                                    4417ae41ad907ddab6bf675965995fd0

                                                    SHA1

                                                    cd86d3642e8657701f95f21e335655612ae03abb

                                                    SHA256

                                                    e97faec164d61fbf5f594c244c83669ef603304029f17c0508fd9fabc42b9d34

                                                    SHA512

                                                    ff0ef6c47c747cdec755fb16b1adedec8a45199ee4e4ccb87f211149fdbff166017de667c4743b93a8f642a9b072fdb9a9fa77b5cd77fe4153283ab5e26654b9

                                                  • C:\Users\Admin\AppData\Local\Temp\scoped_dir2908_71690910\CRX_INSTALL\_locales\en_CA\messages.json

                                                    Filesize

                                                    711B

                                                    MD5

                                                    558659936250e03cc14b60ebf648aa09

                                                    SHA1

                                                    32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                    SHA256

                                                    2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                    SHA512

                                                    1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                  • C:\Users\Admin\AppData\Local\Temp\scoped_dir2908_71690910\dedba692-8c17-4f3f-a62b-cd899b67eb88.tmp

                                                    Filesize

                                                    150KB

                                                    MD5

                                                    eae462c55eba847a1a8b58e58976b253

                                                    SHA1

                                                    4d7c9d59d6ae64eb852bd60b48c161125c820673

                                                    SHA256

                                                    ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad

                                                    SHA512

                                                    494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3

                                                  • C:\Users\Admin\Desktop\YCL.lnk

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    da9990d5970da5fa6b99ddd6ccd1d3c7

                                                    SHA1

                                                    dc1e66b16867b31bdcad8edab6af2f1562917409

                                                    SHA256

                                                    e6441d40537d60eef2b01414d0e8fb32f1c2b75eab323fe4629c8e78b44061dc

                                                    SHA512

                                                    252b20f4ff7bf8c222370b40d9eece2934ed406be5aea24740c150f845b2dfae8c6e788fa978949309b6a1449271fe1dbeddbd43c7fdb6b81841910179c2ee36

                                                  • memory/32-38-0x0000000000810000-0x0000000000B19000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/32-56-0x0000000000810000-0x0000000000B19000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/376-61-0x00000000007E0000-0x0000000000E6E000-memory.dmp

                                                    Filesize

                                                    6.6MB

                                                  • memory/376-60-0x00000000007E0000-0x0000000000E6E000-memory.dmp

                                                    Filesize

                                                    6.6MB

                                                  • memory/1108-21-0x0000000000D50000-0x0000000001065000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/1108-32-0x0000000000D50000-0x0000000001065000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2016-63-0x00000000007B0000-0x0000000000C62000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2016-55-0x00000000007B0000-0x0000000000C62000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2172-108-0x0000000000BD0000-0x0000000000E88000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/2172-68-0x0000000000BD0000-0x0000000000E88000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/2172-69-0x0000000000BD0000-0x0000000000E88000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/2172-70-0x0000000000BD0000-0x0000000000E88000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/2172-166-0x0000000000BD0000-0x0000000000E88000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/2208-71-0x0000000000600000-0x0000000000915000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2208-779-0x0000000000600000-0x0000000000915000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2208-814-0x0000000000600000-0x0000000000915000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2208-818-0x0000000000600000-0x0000000000915000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2208-809-0x0000000000600000-0x0000000000915000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2208-33-0x0000000000600000-0x0000000000915000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2208-160-0x0000000000600000-0x0000000000915000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2208-768-0x0000000000600000-0x0000000000915000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2208-813-0x0000000000600000-0x0000000000915000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2208-810-0x0000000000600000-0x0000000000915000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2208-657-0x0000000000600000-0x0000000000915000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2208-806-0x0000000000600000-0x0000000000915000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2208-812-0x0000000000600000-0x0000000000915000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2208-811-0x0000000000600000-0x0000000000915000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2208-67-0x0000000000600000-0x0000000000915000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2208-789-0x0000000000600000-0x0000000000915000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2308-89-0x0000000000600000-0x0000000000915000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2308-91-0x0000000000600000-0x0000000000915000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/3128-115-0x00000000005E0000-0x0000000000A95000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3128-86-0x00000000005E0000-0x0000000000A95000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3172-734-0x0000000000400000-0x000000000042F000-memory.dmp

                                                    Filesize

                                                    188KB

                                                  • memory/3172-732-0x0000000000400000-0x000000000042F000-memory.dmp

                                                    Filesize

                                                    188KB

                                                  • memory/3556-587-0x0000000000B30000-0x00000000011D3000-memory.dmp

                                                    Filesize

                                                    6.6MB

                                                  • memory/3556-594-0x0000000000B30000-0x00000000011D3000-memory.dmp

                                                    Filesize

                                                    6.6MB

                                                  • memory/3556-107-0x0000000000B30000-0x00000000011D3000-memory.dmp

                                                    Filesize

                                                    6.6MB

                                                  • memory/3556-719-0x0000000000B30000-0x00000000011D3000-memory.dmp

                                                    Filesize

                                                    6.6MB

                                                  • memory/3556-116-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                    Filesize

                                                    972KB

                                                  • memory/3556-769-0x0000000000B30000-0x00000000011D3000-memory.dmp

                                                    Filesize

                                                    6.6MB

                                                  • memory/3872-113-0x0000000000550000-0x0000000000A02000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3872-139-0x0000000000550000-0x0000000000A02000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4264-182-0x0000000000B00000-0x00000000014ED000-memory.dmp

                                                    Filesize

                                                    9.9MB

                                                  • memory/4264-712-0x0000000000B00000-0x00000000014ED000-memory.dmp

                                                    Filesize

                                                    9.9MB

                                                  • memory/4264-658-0x0000000000B00000-0x00000000014ED000-memory.dmp

                                                    Filesize

                                                    9.9MB

                                                  • memory/4264-659-0x0000000000B00000-0x00000000014ED000-memory.dmp

                                                    Filesize

                                                    9.9MB

                                                  • memory/5452-699-0x0000000000400000-0x000000000042F000-memory.dmp

                                                    Filesize

                                                    188KB

                                                  • memory/5452-711-0x0000000000400000-0x000000000042F000-memory.dmp

                                                    Filesize

                                                    188KB

                                                  • memory/5452-709-0x0000000000400000-0x000000000042F000-memory.dmp

                                                    Filesize

                                                    188KB

                                                  • memory/5452-727-0x0000000010000000-0x000000001001C000-memory.dmp

                                                    Filesize

                                                    112KB

                                                  • memory/5528-816-0x0000000000600000-0x0000000000915000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/5528-817-0x0000000000600000-0x0000000000915000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/5996-808-0x0000000000600000-0x0000000000915000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/6108-701-0x0000000000DF0000-0x00000000017DD000-memory.dmp

                                                    Filesize

                                                    9.9MB

                                                  • memory/6108-586-0x0000000000DF0000-0x00000000017DD000-memory.dmp

                                                    Filesize

                                                    9.9MB

                                                  • memory/6108-735-0x0000000000DF0000-0x00000000017DD000-memory.dmp

                                                    Filesize

                                                    9.9MB

                                                  • memory/6108-700-0x0000000000DF0000-0x00000000017DD000-memory.dmp

                                                    Filesize

                                                    9.9MB