Resubmissions

28/03/2025, 17:07

250328-vng79syxes 10

28/03/2025, 17:01

250328-vjwj4a1jt7 8

Analysis

  • max time kernel
    168s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2025, 17:07

Errors

Reason
Machine shutdown

General

  • Target

    image_2025-03-28_170136899.png

  • Size

    253KB

  • MD5

    2e0003e2bf5591f8e2ab3fbf939610b6

  • SHA1

    b2020e09179a81ce5fe0409c6b1958439ce599db

  • SHA256

    1031187bca73c151782d84b2c0f6efd74fd843071968351baa0b41b4bc59e939

  • SHA512

    c30cb129be0d67e13b1ff504dadd268b10ebd86cc1d62feb97aeaf609e428ecf40dab15908104cc038423cad96279f3e1ad5f4c0ef7b823411d4918589d34b2a

  • SSDEEP

    6144:b52wGQvtCDocvRj3csBfp2UrwyoSYUe/uS9lW:VVCBvRIsD2PyoScuelW

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • UAC bypass 3 TTPs 2 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Downloads MZ/PE file 3 IoCs
  • Checks computer location settings 2 TTPs 12 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Obfuscated with Agile.Net obfuscator 2 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Drops file in Program Files directory 53 IoCs
  • Drops file in Windows directory 2 IoCs
  • Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies data under HKEY_USERS 17 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 51 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Windows\system32\mspaint.exe
    "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\image_2025-03-28_170136899.png"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3840
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
    1⤵
      PID:4164
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2572
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffa3f0adcf8,0x7ffa3f0add04,0x7ffa3f0add10
        2⤵
          PID:4100
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1996,i,9224335432067107041,6260783738851889281,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=1988 /prefetch:2
          2⤵
            PID:1764
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1912,i,9224335432067107041,6260783738851889281,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2228 /prefetch:3
            2⤵
            • Downloads MZ/PE file
            PID:5620
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2400,i,9224335432067107041,6260783738851889281,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2416 /prefetch:8
            2⤵
              PID:5388
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3184,i,9224335432067107041,6260783738851889281,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3196 /prefetch:1
              2⤵
                PID:540
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3204,i,9224335432067107041,6260783738851889281,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3232 /prefetch:1
                2⤵
                  PID:5952
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4308,i,9224335432067107041,6260783738851889281,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4332 /prefetch:2
                  2⤵
                    PID:4420
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=2404,i,9224335432067107041,6260783738851889281,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4656 /prefetch:1
                    2⤵
                      PID:2636
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5396,i,9224335432067107041,6260783738851889281,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5428 /prefetch:8
                      2⤵
                        PID:4692
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5632,i,9224335432067107041,6260783738851889281,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5644 /prefetch:8
                        2⤵
                          PID:2796
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5856,i,9224335432067107041,6260783738851889281,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5864 /prefetch:8
                          2⤵
                            PID:3780
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5884,i,9224335432067107041,6260783738851889281,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5636 /prefetch:8
                            2⤵
                              PID:640
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5880,i,9224335432067107041,6260783738851889281,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=6008 /prefetch:8
                              2⤵
                                PID:548
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5868,i,9224335432067107041,6260783738851889281,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5696 /prefetch:8
                                2⤵
                                  PID:4688
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5480,i,9224335432067107041,6260783738851889281,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5860 /prefetch:1
                                  2⤵
                                    PID:2168
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=3212,i,9224335432067107041,6260783738851889281,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3640 /prefetch:1
                                    2⤵
                                      PID:916
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5500,i,9224335432067107041,6260783738851889281,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=6080 /prefetch:1
                                      2⤵
                                        PID:4960
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5864,i,9224335432067107041,6260783738851889281,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=6012 /prefetch:8
                                        2⤵
                                          PID:688
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5976,i,9224335432067107041,6260783738851889281,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5984 /prefetch:8
                                          2⤵
                                            PID:1548
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5936,i,9224335432067107041,6260783738851889281,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5796 /prefetch:8
                                            2⤵
                                              PID:3792
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=3324,i,9224335432067107041,6260783738851889281,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5532 /prefetch:2
                                              2⤵
                                                PID:2192
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5992,i,9224335432067107041,6260783738851889281,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3632 /prefetch:8
                                                2⤵
                                                  PID:4704
                                                • C:\Users\Admin\Downloads\MrsMajor3.0.exe
                                                  "C:\Users\Admin\Downloads\MrsMajor3.0.exe"
                                                  2⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  PID:3428
                                                  • C:\Windows\system32\wscript.exe
                                                    "C:\Windows\system32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\5C54.tmp\5C55.tmp\5C56.vbs //Nologo
                                                    3⤵
                                                    • UAC bypass
                                                    • Checks computer location settings
                                                    • System policy modification
                                                    PID:2436
                                                    • C:\Users\Admin\AppData\Local\Temp\5C54.tmp\eulascr.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\5C54.tmp\eulascr.exe"
                                                      4⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      PID:4036
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6336,i,9224335432067107041,6260783738851889281,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=6348 /prefetch:8
                                                  2⤵
                                                    PID:2324
                                                  • C:\Users\Admin\Downloads\MrsMajor2.0.exe
                                                    "C:\Users\Admin\Downloads\MrsMajor2.0.exe"
                                                    2⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    PID:4692
                                                    • C:\Windows\system32\wscript.exe
                                                      "C:\Windows\sysnative\wscript.exe" C:\Users\Admin\AppData\Local\Temp\DED2.tmp\DED3.vbs
                                                      3⤵
                                                      • Checks computer location settings
                                                      • Drops file in Program Files directory
                                                      PID:696
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /c cd\&cd "C:\Users\Admin\AppData\Local\Temp" & eula32.exe
                                                        4⤵
                                                          PID:2588
                                                          • C:\Users\Admin\AppData\Local\Temp\eula32.exe
                                                            eula32.exe
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:1124
                                                    • C:\Users\Admin\Downloads\MrsMajor2.0.exe
                                                      "C:\Users\Admin\Downloads\MrsMajor2.0.exe"
                                                      2⤵
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1708
                                                      • C:\Windows\system32\wscript.exe
                                                        "C:\Windows\sysnative\wscript.exe" C:\Users\Admin\AppData\Local\Temp\E913.tmp\E914.vbs
                                                        3⤵
                                                          PID:4732
                                                      • C:\Users\Admin\Downloads\MrsMajor2.0.exe
                                                        "C:\Users\Admin\Downloads\MrsMajor2.0.exe"
                                                        2⤵
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1356
                                                        • C:\Windows\system32\wscript.exe
                                                          "C:\Windows\sysnative\wscript.exe" C:\Users\Admin\AppData\Local\Temp\ED39.tmp\ED3A.vbs
                                                          3⤵
                                                            PID:4340
                                                        • C:\Users\Admin\Downloads\MrsMajor2.0.exe
                                                          "C:\Users\Admin\Downloads\MrsMajor2.0.exe"
                                                          2⤵
                                                          • Checks computer location settings
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          PID:732
                                                          • C:\Windows\system32\wscript.exe
                                                            "C:\Windows\sysnative\wscript.exe" C:\Users\Admin\AppData\Local\Temp\EDF5.tmp\EDF6.vbs
                                                            3⤵
                                                              PID:4932
                                                          • C:\Users\Admin\Downloads\MrsMajor2.0.exe
                                                            "C:\Users\Admin\Downloads\MrsMajor2.0.exe"
                                                            2⤵
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:4908
                                                            • C:\Windows\system32\wscript.exe
                                                              "C:\Windows\sysnative\wscript.exe" C:\Users\Admin\AppData\Local\Temp\43A6.tmp\43A7.vbs
                                                              3⤵
                                                                PID:4284
                                                            • C:\Users\Admin\Downloads\MrsMajor2.0.exe
                                                              "C:\Users\Admin\Downloads\MrsMajor2.0.exe"
                                                              2⤵
                                                              • Checks computer location settings
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:4168
                                                              • C:\Windows\system32\wscript.exe
                                                                "C:\Windows\sysnative\wscript.exe" C:\Users\Admin\AppData\Local\Temp\6102.tmp\6103.vbs
                                                                3⤵
                                                                  PID:6120
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1148,i,9224335432067107041,6260783738851889281,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=6328 /prefetch:8
                                                                2⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:2348
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6320,i,9224335432067107041,6260783738851889281,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=6348 /prefetch:8
                                                                2⤵
                                                                  PID:2092
                                                                • C:\Users\Admin\Downloads\BossDaMajor.exe
                                                                  "C:\Users\Admin\Downloads\BossDaMajor.exe"
                                                                  2⤵
                                                                  • Checks computer location settings
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:5588
                                                                  • C:\Windows\system32\wscript.exe
                                                                    "C:\Windows\sysnative\wscript.exe" C:\Users\Admin\AppData\Local\Temp\A8C9.tmp\A8CA.vbs
                                                                    3⤵
                                                                    • Checks computer location settings
                                                                    • Drops file in Program Files directory
                                                                    PID:732
                                                                    • C:\Windows\System32\notepad.exe
                                                                      "C:\Windows\System32\notepad.exe"
                                                                      4⤵
                                                                        PID:4864
                                                                      • C:\Windows\System32\wscript.exe
                                                                        "C:\Windows\System32\wscript.exe" "C:\Program files\mrsmajor\mrsmajorlauncher.vbs" RunAsAdministrator
                                                                        4⤵
                                                                        • Modifies WinLogon for persistence
                                                                        • Modifies Windows Defender DisableAntiSpyware settings
                                                                        • UAC bypass
                                                                        • Disables RegEdit via registry modification
                                                                        • Checks computer location settings
                                                                        • Modifies system executable filetype association
                                                                        • Drops file in Program Files directory
                                                                        • Access Token Manipulation: Create Process with Token
                                                                        • Modifies Control Panel
                                                                        • Modifies registry class
                                                                        • System policy modification
                                                                        PID:5152
                                                                        • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                                                                          "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" "C:\Program Files\mrsmajor\def_resource\f11.mp4"
                                                                          5⤵
                                                                          • Enumerates connected drives
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Modifies registry class
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          PID:3968
                                                                          • C:\Windows\SysWOW64\unregmp2.exe
                                                                            "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
                                                                            6⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:3376
                                                                            • C:\Windows\system32\unregmp2.exe
                                                                              "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
                                                                              7⤵
                                                                              • Enumerates connected drives
                                                                              PID:452
                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 2352
                                                                            6⤵
                                                                            • Program crash
                                                                            PID:1940
                                                                        • C:\Windows\System32\shutdown.exe
                                                                          "C:\Windows\System32\shutdown.exe" -r -t 03
                                                                          5⤵
                                                                            PID:4684
                                                                  • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                    "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                    1⤵
                                                                      PID:3788
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                      1⤵
                                                                        PID:2484
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
                                                                        1⤵
                                                                        • Drops file in Windows directory
                                                                        PID:5976
                                                                      • C:\Windows\system32\AUDIODG.EXE
                                                                        C:\Windows\system32\AUDIODG.EXE 0x304 0x2f8
                                                                        1⤵
                                                                          PID:1876
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3968 -ip 3968
                                                                          1⤵
                                                                            PID:1604
                                                                          • C:\Windows\system32\LogonUI.exe
                                                                            "LogonUI.exe" /flags:0x4 /state0:0xa38d4055 /state1:0x41c64e6d
                                                                            1⤵
                                                                            • Modifies data under HKEY_USERS
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:5604

                                                                          Network

                                                                          MITRE ATT&CK Enterprise v15

                                                                          Replay Monitor

                                                                          Loading Replay Monitor...

                                                                          Downloads

                                                                          • C:\Program Files\MicrosoftWindowsServicesEtc\GetReady.exe

                                                                            Filesize

                                                                            52KB

                                                                            MD5

                                                                            57f3795953dafa8b5e2b24ba5bfad87f

                                                                            SHA1

                                                                            47719bd600e7527c355dbdb053e3936379d1b405

                                                                            SHA256

                                                                            5319958efc38ea81f61854eb9f6c8aee32394d4389e52fe5c1f7f7ef6b261725

                                                                            SHA512

                                                                            172006e8deed2766e7fa71e34182b5539309ec8c2ac5f63285724ef8f59864e1159c618c0914eb05692df721794eb4726757b2ccf576f0c78a6567d807cbfb98

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\66a89bb9-2f35-4e67-a8e6-6c52cab4cf5d.tmp

                                                                            Filesize

                                                                            12KB

                                                                            MD5

                                                                            3a01f156fa8fcf69ab5877ee3806105f

                                                                            SHA1

                                                                            af9a6d664d8622a521105cc2a4dee47b6114ad71

                                                                            SHA256

                                                                            92daf76ab2c4ad9dd5b7ab3c563ea75f5875fe961815728e239ae84a93c6d79d

                                                                            SHA512

                                                                            96b914b26e663f1a0bcd24dc90f2bb435b5f59c34e689060a5140abcb28e69cc609d0787acd862c0e1b504e4407413a2822a2a283cad63a7de8219dd5173ce9b

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                            Filesize

                                                                            649B

                                                                            MD5

                                                                            187e1703f367a81069448ac0b7b70406

                                                                            SHA1

                                                                            df4bcbc100a192987124f3d2618ff323bccc521c

                                                                            SHA256

                                                                            67cbd741e2d425293b43253d4aeb8a75b067260954c5d69fab38cb3eb7c030e6

                                                                            SHA512

                                                                            fc2d02b625f69fa30114228b1a72b44c570a06beb2e811421c2be5c29ded5d539c55e9a6c5e6557142f05406fbec14ec6d1ed1fb3c10170e6777804438b2964e

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                            Filesize

                                                                            3KB

                                                                            MD5

                                                                            fc063a0ae9ea95c0cd778bee63cde642

                                                                            SHA1

                                                                            ccd403258a52017bf2c4fedd5c7cb587bcbc5c71

                                                                            SHA256

                                                                            e38ea57e8a427bcc4c0b30287726a89ff09a1ed8ea9009cd37bca206354fbc05

                                                                            SHA512

                                                                            e2a77a0b6a7f8122bbd1602f06d3356f47d7e3f33abeaa9a1a9475c61f8267ad46fa48cc307001f98f2a5f9800d24209a76d7bf1eef6c0390888883311224c60

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.90.1_0\dasherSettingSchema.json

                                                                            Filesize

                                                                            854B

                                                                            MD5

                                                                            4ec1df2da46182103d2ffc3b92d20ca5

                                                                            SHA1

                                                                            fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                                            SHA256

                                                                            6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                                            SHA512

                                                                            939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                            Filesize

                                                                            5KB

                                                                            MD5

                                                                            140535f3a836e901f5c1a38e7f9d5910

                                                                            SHA1

                                                                            95327d8ddd8f53429e487022a6f76d92e8fca8b5

                                                                            SHA256

                                                                            c9511da2613dd53d0115a301d3c5fd8e726943ac98b851261b9d6585cf4f9f0b

                                                                            SHA512

                                                                            c3ff9ecbca11d4725f08308951d1ffa3a589c4a4d3cc0bed83ed07f0a28b0041e0ba12e42f1f14bf74a186107b6f7d40f1913d6e1471400882718ac17cfa784b

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                            Filesize

                                                                            2B

                                                                            MD5

                                                                            d751713988987e9331980363e24189ce

                                                                            SHA1

                                                                            97d170e1550eee4afc0af065b78cda302a97674c

                                                                            SHA256

                                                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                            SHA512

                                                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                            Filesize

                                                                            12KB

                                                                            MD5

                                                                            c5089b78705b525f6a88f523c7dc4f0b

                                                                            SHA1

                                                                            4ac095742e6bc445481715922e5c868af60c03f3

                                                                            SHA256

                                                                            b6420d7b619d389d2e015e5318c344f163c0fee83a1556cb2b49dfeff68e3cda

                                                                            SHA512

                                                                            721beb4b80f06b261006d9306593bb9733cb10c8b26ac44124d167a4d920f6f57024118479c3d0ebdc57a2a32ba93544ab4a26af36357220bd21e90f670b5209

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                            Filesize

                                                                            12KB

                                                                            MD5

                                                                            c53796511483abd39f116beed9e54ba0

                                                                            SHA1

                                                                            9e0e5f0094852896f7f04817dd4febc2478966fc

                                                                            SHA256

                                                                            a4cb0900914fb69005ed0b07afccad78a28672eccd0815bbdf9096f53e5c5dbb

                                                                            SHA512

                                                                            da27a9580c31db6e3a221d9aa35cf25e540b2fcf85433075182477016dbeb9e1ca968cf72f98d4db985021635f542e630c101be1e5e12de0c399147e83bb93ea

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                            Filesize

                                                                            12KB

                                                                            MD5

                                                                            1c8898b8c4e2c3adaff15f6bd639862b

                                                                            SHA1

                                                                            5906463da0ffea71655404c572d6dd8b282f5423

                                                                            SHA256

                                                                            3663f006792156c3d0e9d7d39007dbe6d787159b2388bcfcf30889bdb38610c7

                                                                            SHA512

                                                                            572cb294585f94b4f3f0c227ae6de475fa866dd20c9a19f801db9273ad543482510bb2a166fc45788e92095c3d33fd1eb4946ba62ba0c04fbf206e1f9889643a

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                            Filesize

                                                                            12KB

                                                                            MD5

                                                                            85361361dc0fe5c7ca67c47cb755b019

                                                                            SHA1

                                                                            c38b254ed0d222d1906ebdcbe0b862cb42319418

                                                                            SHA256

                                                                            52bcf7675130ce2102d1ff4bac6010f3f292cce316179ab359d580b1928e4bb2

                                                                            SHA512

                                                                            ff20a7209bee35a7ee34362c322b15efdde1200026d5c6cf6c334b70b8196410de633730fa6f8735be701a2bb2a8f61ab9146999ddff4a5abdc003be41771007

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                            Filesize

                                                                            12KB

                                                                            MD5

                                                                            ec601b520fff9f9677868705f0bd4998

                                                                            SHA1

                                                                            c29ff80da06443409f8f6600022bd56595485127

                                                                            SHA256

                                                                            d8786791682c4d225c6194100f1c6bcd9daaf9454e33f82ec855b2582690b4aa

                                                                            SHA512

                                                                            fd9b4f43cd399f71d3ab7915159925f52c3dcfbe1d38f85aa17ccbf503ea91853d0396121701cecd9043a3f3dba5e4c5e6fe2a7e820dadc719d9fd53bdad2deb

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                            Filesize

                                                                            12KB

                                                                            MD5

                                                                            7250ca6962cf3953b0cae47f757e14b8

                                                                            SHA1

                                                                            ec1b1f5e86e8d3413b6faa736fee44861f1e03d7

                                                                            SHA256

                                                                            6b71bd3ea2ee73a4ae928541c40515a1150c0251ec9cb6eafc6f40709354bbcd

                                                                            SHA512

                                                                            eebf93729f903285ea84c76cfbf9368b96ee78066c5e7cc9bb9dbcca7d537d7790dc387b62c2a25d8f4e66a258d2aea5d48f2244929bdf6b18e08279735189b0

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                            Filesize

                                                                            11KB

                                                                            MD5

                                                                            5874902f75046b89f2c6c507a8a6e870

                                                                            SHA1

                                                                            211ee5ddaea7813bbb139a706c3be55f24bbe92e

                                                                            SHA256

                                                                            be4c15c1a7ac7e445f555c4ab4a420d4b8ba0e9d76d674640d2ce90d18285564

                                                                            SHA512

                                                                            066416ece4d2c0d21744e728710a7e32611a87e3657c62590cf2a540c3e3d3b1b142d2ee664a5e8b3407f50f639c8cbe41843c9dad54c235be8f811b1bca27e0

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                            Filesize

                                                                            18KB

                                                                            MD5

                                                                            f9254033da83e6d435a2d37937d35a9e

                                                                            SHA1

                                                                            05efddb5f54d4648ff73f56d18135cc206cd3173

                                                                            SHA256

                                                                            f86c8ccb25c841c7ec48c8479348bd2b493dfd58ba45f9519097d30a935a9f11

                                                                            SHA512

                                                                            dce5e3c4d7ab65f645dbdd870c3692506ac00d45b13a26017ee1404ed8f0ee208d5313f6bda4aa21f5f6aebfeff5ac0dee960ce137f6c07d80a7832efe52a35b

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                            Filesize

                                                                            15KB

                                                                            MD5

                                                                            7f6480721f669d53a3667bb5d8ceca3b

                                                                            SHA1

                                                                            5a680d99373487c7ca4ef0ec9d78b67d06278a8a

                                                                            SHA256

                                                                            3b82b11bc144b1bddc983ba11d858f2a76c0e7deba1d09c988750c1e7084144a

                                                                            SHA512

                                                                            d907dbb5c8abea3f6a849e84a05d3503b7f4960798131b1d4a3766e8a0281c6d7de6c254da4f2ddb5d7c00d0d6ed5ee231099b863dd3b82ba7aa6c1778b5253a

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                            Filesize

                                                                            72B

                                                                            MD5

                                                                            d11d9a22b98f1413638e772b06575f91

                                                                            SHA1

                                                                            43f7b5705d52040d825a4a6a1f7aeb0ee405665b

                                                                            SHA256

                                                                            8ee96aacc2da563422edb7536603ecd1ee300a5c7834583454425ff707cadd07

                                                                            SHA512

                                                                            5d18fe152e15a5540d01d90c844807fa3e7595991ba1a5ce1e0b1c362c61af7bea5d90f0c22feefd2930a528152df8a7c1732c5f130da940a5537bf981401f30

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                            Filesize

                                                                            72B

                                                                            MD5

                                                                            f16cbd46667eb60682ba6819df5391f3

                                                                            SHA1

                                                                            e9264881c6f728e967d1c062a532100eebd7ab87

                                                                            SHA256

                                                                            bec70c6f028f23e491c4475efae7a0ec32f5156a8178f7501c21487cbc4e69a2

                                                                            SHA512

                                                                            d3899965092ec417cd348a960ea355e7ab0eefa33fdb17cb063e6db7a3e59f366d1f7abd295339369ce3136dbf4e9d333fb6c873048ce3fc6b9305a617be5aad

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57fc13.TMP

                                                                            Filesize

                                                                            48B

                                                                            MD5

                                                                            52ed77d4ffebddf99773a0481f905e64

                                                                            SHA1

                                                                            9727db8159f388468621d31ac5ca8f7b7bc4199a

                                                                            SHA256

                                                                            b0c5380df62f77546adaed4a2c1e53c29c3205658762982451d185809b07f22e

                                                                            SHA512

                                                                            916d56ca095a19d32c4e963a7b8dbe1bd29ad6e26c71784a8930b332052a59fcdf76484eadc5294afb3255581663c4c548cab0d5211a34cfdfc4749bf8b025b5

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\blob_storage\f2a0d884-7985-4b99-b232-586db6f7014c\0

                                                                            Filesize

                                                                            20.6MB

                                                                            MD5

                                                                            2637afbedab09115d71d70172f8dc64e

                                                                            SHA1

                                                                            891075f5b066edb1fbb5b1ae2057c2e8801f2757

                                                                            SHA256

                                                                            f9794a7dae9e8cf5eca1cfa47c8b313443c6a57d5b60735e53d91f61c9e8f92f

                                                                            SHA512

                                                                            c1da5b2e41bb2385aa7119523b9f5286689d8dac53bb400249ab12647efab372818cc5ee8832d6051e19ac5ed25e38101c3dcfa869f02465686f1b47fe0428d0

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\d4ab9826-9fab-44ab-a408-d0c32c1889f0.tmp

                                                                            Filesize

                                                                            10KB

                                                                            MD5

                                                                            9446030a4b3f6146bfacda6aa137cbff

                                                                            SHA1

                                                                            b7b0c6511182d16f3cb537e6f4f86f1815d01eed

                                                                            SHA256

                                                                            83557ba29b72a9a748939b930cf7d59133aff6a598c955a82ccab2033b428239

                                                                            SHA512

                                                                            b348104aa5c79bb9a913181f56cf0a37130dfc7cbc610819c7fb7df843df898a622cc57441b66dfa450fa1a832874893a521e62b15a8bc4721bdf97989d2d335

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                            Filesize

                                                                            155KB

                                                                            MD5

                                                                            cce9941610c4290df4269e9e9791590e

                                                                            SHA1

                                                                            85690e2b2916b32fabdab5b46d8ba3f2cf55840b

                                                                            SHA256

                                                                            755c8b26d5df1c50c795b854b6c3a2114ba24741211fc5137eb7310cb1ff38c2

                                                                            SHA512

                                                                            a001e929618b55c51ea79bd0332ff0dfd164c13d728257f233669b4f30a2614fba5126c9965095e27328be2d5bde5324342c861e311f129bed0e571589382786

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                            Filesize

                                                                            79KB

                                                                            MD5

                                                                            501674e02293e7b7bfd7381baba0f997

                                                                            SHA1

                                                                            5ede1ec698e98e6c1b1ac0f26cc9c0a9de82cde6

                                                                            SHA256

                                                                            169b6280b2561272fe9273d1693401bc7a13694c5885b00961263f8461401e06

                                                                            SHA512

                                                                            b6910c091196343d8bb0e730073deb6b683d3fb849d7083f89c3b6a1e8f511d12ca65384c2d10b16b92d77ef81938d86f536f48f6655a1110f492bda2d95be1e

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                            Filesize

                                                                            155KB

                                                                            MD5

                                                                            f971e5e77929b6f8523e4f9c7d8979b2

                                                                            SHA1

                                                                            d4aabbe0883dd85e8463d862ae5e6e88e0d40b10

                                                                            SHA256

                                                                            f918497f322726d33f02147647c264f9f25dc4a475b6aca5ffa76a4db179cf3c

                                                                            SHA512

                                                                            71a927009c425c302a33aff6e871c0840670144716ad7baab780ff7d1f03fed9938055b1e0fd12a3f5dd69c60846524dd666152c64b51f7b70c1cad60edea9af

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

                                                                            Filesize

                                                                            384KB

                                                                            MD5

                                                                            82afb9dc5e51ad3b2c1695ddf9bf4881

                                                                            SHA1

                                                                            c3867fb6cbc2932fa81474ec93e77e7be25d976f

                                                                            SHA256

                                                                            a2e9a26e9b0038253f615c78447fe1cc3c3856d54112a5d00f30711acd33e259

                                                                            SHA512

                                                                            4086d2136ccbe84bff7295aa20f4c6e367403ef34e6900ae69901bf264904cc8747472aabf76701d9febef9872ad9890e94c98c724ffdef68b99f3f0bad2abf5

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML.bak

                                                                            Filesize

                                                                            9KB

                                                                            MD5

                                                                            7050d5ae8acfbe560fa11073fef8185d

                                                                            SHA1

                                                                            5bc38e77ff06785fe0aec5a345c4ccd15752560e

                                                                            SHA256

                                                                            cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

                                                                            SHA512

                                                                            a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

                                                                          • C:\Users\Admin\AppData\Local\Temp\5C54.tmp\5C55.tmp\5C56.vbs

                                                                            Filesize

                                                                            352B

                                                                            MD5

                                                                            3b8696ecbb737aad2a763c4eaf62c247

                                                                            SHA1

                                                                            4a2d7a2d61d3f4c414b4e5d2933cd404b8f126e5

                                                                            SHA256

                                                                            ce95f7eea8b303bc23cfd6e41748ad4e7b5e0f0f1d3bdf390eadb1e354915569

                                                                            SHA512

                                                                            713d9697b892b9dd892537e8a01eab8d0265ebf64867c8beecf7a744321257c2a5c11d4de18fcb486bb69f199422ce3cab8b6afdbe880481c47b06ba8f335beb

                                                                          • C:\Users\Admin\AppData\Local\Temp\5C54.tmp\eulascr.exe

                                                                            Filesize

                                                                            143KB

                                                                            MD5

                                                                            8b1c352450e480d9320fce5e6f2c8713

                                                                            SHA1

                                                                            d6bd88bf33de7c5d4e68b233c37cc1540c97bd3a

                                                                            SHA256

                                                                            2c343174231b55e463ca044d19d47bd5842793c15954583eb340bfd95628516e

                                                                            SHA512

                                                                            2d8e43b1021da08ed1bf5aff110159e6bc10478102c024371302ccfce595e77fd76794658617b5b52f9a50190db250c1ba486d247d9cd69e4732a768edbb4cbc

                                                                          • C:\Users\Admin\AppData\Local\Temp\5a530dfd-bc51-4992-a05d-f09d41a331d4\AgileDotNetRT64.dll

                                                                            Filesize

                                                                            75KB

                                                                            MD5

                                                                            42b2c266e49a3acd346b91e3b0e638c0

                                                                            SHA1

                                                                            2bc52134f03fcc51cb4e0f6c7cf70646b4df7dd1

                                                                            SHA256

                                                                            adeed015f06efa363d504a18acb671b1db4b20b23664a55c9bc28aef3283ca29

                                                                            SHA512

                                                                            770822fd681a1d98afe03f6fbe5f116321b54c8e2989fb07491811fd29fca5b666f1adf4c6900823af1271e342cacc9293e9db307c4eef852d1a253b00347a81

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\DED3.vbs

                                                                            Filesize

                                                                            2KB

                                                                            MD5

                                                                            fd76266c8088a4dca45414c36c7e9523

                                                                            SHA1

                                                                            6b19bf2904a0e3b479032e101476b49ed3ae144a

                                                                            SHA256

                                                                            f853dddb0f9f1b74b72bccdb5191c28e18d466b5dbc205f7741a24391375cd6f

                                                                            SHA512

                                                                            3cd49395368e279ac9a63315583d3804aa89ec8bb6112754973451a7ea7b68140598699b30eef1b0e94c3286d1e6254e2063188282f7e6a18f1349877adeb072

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\AppKill.bat

                                                                            Filesize

                                                                            671B

                                                                            MD5

                                                                            d4e987817d2e5d6ed2c12633d6f11101

                                                                            SHA1

                                                                            3f38430a028f9e3cb66c152e302b3586512dd9c4

                                                                            SHA256

                                                                            5549670ef8837c6e3c4e496c1ea2063670618249d4151dea4d07d48ab456690c

                                                                            SHA512

                                                                            b84fef88f0128b46f1e2f9c5dff2cb620ee885bed6c90dcf4a5dc51c77bea492c92b8084d8dc8b4277b47b2493a2d9d3f348c6e229bf3da9041ef90e0fd8b6c4

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\CallFunc.vbs

                                                                            Filesize

                                                                            388B

                                                                            MD5

                                                                            5f9737f03289963a6d7a71efab0813c4

                                                                            SHA1

                                                                            ba22dfae8d365cbf8014a630f23f1d8574b5cf85

                                                                            SHA256

                                                                            a767894a68ebc490cb5ab2b7b04dd12b7465553ce7ba7e41e1ea45f1eaef5275

                                                                            SHA512

                                                                            5f4fb691e6da90e8e0872378a7b78cbd1acbf2bd75d19d65f17bf5b1cea95047d66b79fd1173703fcfef42cfc116ca629b9b37e355e44155e8f3b98f2d916a2a

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\DgzRun.vbs

                                                                            Filesize

                                                                            341B

                                                                            MD5

                                                                            a91417f7c55510155771f1f644dd6c7e

                                                                            SHA1

                                                                            41bdb69c5baca73f49231d5b5f77975b79e55bdf

                                                                            SHA256

                                                                            729f7540887cf32a5d4e1968a284c46cf904752821c734bd970ecd30a848477a

                                                                            SHA512

                                                                            f786699c1ab9d7c74dd9eb9d76a76728980b29e84999a166a47b7ee102d8e545901ed0fcb30331712490a36de2d726115b661ad3900cdc2bfcfc601d00b76b07

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\Major.exe

                                                                            Filesize

                                                                            60KB

                                                                            MD5

                                                                            d604c29940864c64b4752d31e2deb465

                                                                            SHA1

                                                                            c1698ea4e5d1ba1c9b78973556f97e8f6dbbdef3

                                                                            SHA256

                                                                            da0233f5e5e9a34e8dd4f6911444ca1f3e29bb9cbd958a9f4508ac7d72ccd55d

                                                                            SHA512

                                                                            89a4a14574ba19fe319c766add0111feeb4320c08bf75f55a898d9acc783d5a862a6433758a413cc719b9179dcf873f1c850d1084851b8fc37aa1e3deabfcf54

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\NotMuch.exe

                                                                            Filesize

                                                                            122KB

                                                                            MD5

                                                                            87a43b15969dc083a0d7e2ef73ee4dd1

                                                                            SHA1

                                                                            657c7ff7e3f325bcbc88db9499b12c636d564a5f

                                                                            SHA256

                                                                            cf830a2d66d3ffe51341de9e62c939b2bb68583afbc926ddc7818c3a71e80ebb

                                                                            SHA512

                                                                            8a02d24f5dab33cdaf768bca0d7a1e3ea75ad515747ccca8ee9f7ffc6f93e8f392ab377f7c2efa5d79cc0b599750fd591358a557f074f3ce9170283ab5b786a1

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\RuntimeChecker.exe

                                                                            Filesize

                                                                            58KB

                                                                            MD5

                                                                            cd58990b1b7f6c68f56244c41ab91665

                                                                            SHA1

                                                                            7ccca9958d6aebbe3883b55f115b041b827bd2e7

                                                                            SHA256

                                                                            51f59e877a1c2a1c2760c677def7395ef2868c2ee3e56ffdc3ace570afa50428

                                                                            SHA512

                                                                            011bdd417ec3bf72daa2b32d3816b696be8b87423740dc2a0182e23515651deeb870a94f3415a73480145f9f5e36c1a3a492410b77ca95d7fab8b9826e9198cc

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\WinScrew.exe

                                                                            Filesize

                                                                            52KB

                                                                            MD5

                                                                            1aaafedd9f259acca75708f4af10b5be

                                                                            SHA1

                                                                            f6b4ea28d304e1f9205c1c0b970d60ee989402f2

                                                                            SHA256

                                                                            429e01b0e06b02a55bafb1527629f8d4c5f64d9b21ac9f81484a3928fdce6dc9

                                                                            SHA512

                                                                            a995ebf4d142452aabb419f0cacfa5412d03532840cb08c37dd7c00001dee521bf9d0da66ac4346b07dffd91fe01fa3115fa05811acbd43d380320dca1be4aa8

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\breakrule.exe

                                                                            Filesize

                                                                            58KB

                                                                            MD5

                                                                            bcb0ac4822de8aeb86ea8a83cd74d7ca

                                                                            SHA1

                                                                            8e2b702450f91dde3c085d902c09dd265368112e

                                                                            SHA256

                                                                            5eafebd52fbf6d0e8abd0cc9bf42d36e5b6e4d85b8ebe59f61c9f2d6dccc65e4

                                                                            SHA512

                                                                            b73647a59eeb92f95c4d7519432ce40ce9014b292b9eb1ed6a809cca30864527c2c827fe49c285bb69984f33469704424edca526f9dff05a6244b33424df01d1

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\bsod.exe

                                                                            Filesize

                                                                            1.2MB

                                                                            MD5

                                                                            8f6a3b2b1af3a4aacd8df1734d250cfe

                                                                            SHA1

                                                                            505b3bd8e936cb5d8999c1b319951ffebab335c9

                                                                            SHA256

                                                                            6581eeab9fd116662b4ca73f6ef00fb96e0505d01cfb446ee4b32bbdeefe1361

                                                                            SHA512

                                                                            c1b5f845c005a1a586080e9da9744e30c7f3eda1e3aaba9c351768f7dea802e9f39d0227772413756ab63914ae4a2514e6ce52c494a91e92c3a1f08badb40264

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\checker.bat

                                                                            Filesize

                                                                            151B

                                                                            MD5

                                                                            f59801d5c49713770bdb2f14eff34e2f

                                                                            SHA1

                                                                            91090652460c3a197cfad74d2d3c16947d023d63

                                                                            SHA256

                                                                            3382484b5a6a04d05500e7622da37c1ffaef3a1343395942bc7802bf2a19b53f

                                                                            SHA512

                                                                            c1c3a78f86e7938afbe391f0e03065b04375207704e419fe77bf0810d1e740c3ef8926c878884ad81b429ec41e126813a68844f600e124f5fa8d28ef17b4b7bc

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\clingclang.wav

                                                                            Filesize

                                                                            13.1MB

                                                                            MD5

                                                                            1c723b3b9420e04cb8845af8b62a37fa

                                                                            SHA1

                                                                            3331a0f04c851194405eb9a9ff49c76bfa3d4db0

                                                                            SHA256

                                                                            6831f471ee3363e981e6a1eb0d722f092b33c9b73c91f9f2a9aafa5cb4c56b29

                                                                            SHA512

                                                                            41f4005ec2a7e0ee8e0e5f52b9d97f25a64a25bb0f00c85c07c643e4e63ea361b4d86733a0cf719b30ea6af225c4fcaca494f22e8e2f73cda9db906c5a0f12ae

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\data\eula32.exe

                                                                            Filesize

                                                                            1.2MB

                                                                            MD5

                                                                            cbc127fb8db087485068044b966c76e8

                                                                            SHA1

                                                                            d02451bd20b77664ce27d39313e218ab9a9fdbf9

                                                                            SHA256

                                                                            c5704419b3eec34fb133cf2509d12492febdcb8831efa1ab014edeac83f538d9

                                                                            SHA512

                                                                            200ee39287f056b504cc23beb1b301a88b183a3806b023d936a2d44a31bbfd08854f6776082d4f7e2232c3d2f606cd5d8229591ecdc86a2bbcfd970a1ee33d41

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\data\excursor.ani

                                                                            Filesize

                                                                            17KB

                                                                            MD5

                                                                            289624a46bb7ec6d91d5b099343b7f24

                                                                            SHA1

                                                                            2b0aab828ddb252baf4ed99994f716d136cd7948

                                                                            SHA256

                                                                            b93b0cb2bb965f5758cb0c699fbc827a64712d6f248aaf810cde5fa5ef3227eb

                                                                            SHA512

                                                                            8c77696fe1c897f56ea3afdecf67ad1128274815942cd4c73d30bf0a44dd1a690d8c2f4b0be08e604853084e5515020c2e913d6e044f9801b6223c1912eec8f8

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\data\fileico.ico

                                                                            Filesize

                                                                            38KB

                                                                            MD5

                                                                            a62eeca905717738a4355dc5009d0fc6

                                                                            SHA1

                                                                            dd4cc0d3f203d395dfdc26834fc890e181d33382

                                                                            SHA256

                                                                            d13f7fd44f38136dae1cdf147ba9b673e698f77c0a644ccd3c12e3a71818a0cd

                                                                            SHA512

                                                                            47ffac6dc37dac4276579cd668fd2524ab1591b594032adbeb609d442f3a28235a2d185c66d8b78b6827ac51d62d97bdc3dffc3ffbaa70cf13d4d5f1dc5f16c2

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\data\runner32s.exe

                                                                            Filesize

                                                                            58KB

                                                                            MD5

                                                                            87815289b110cf33af8af1decf9ff2e9

                                                                            SHA1

                                                                            09024f9ec9464f56b7e6c61bdd31d7044bdf4795

                                                                            SHA256

                                                                            a97ea879e2b51972aa0ba46a19ad4363d876ac035502a2ed2df27db522bc6ac4

                                                                            SHA512

                                                                            8d9024507fa83f578b375c86f38970177313ec3dd9fae794b6e7f739e84fa047a9ef56bf190f6f131d0c7c5e280e729208848b152b3ca492a54af2b18e70f5dc

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\data\thetruth.jpg

                                                                            Filesize

                                                                            483KB

                                                                            MD5

                                                                            7907845316bdbd32200b82944d752d9c

                                                                            SHA1

                                                                            1e5c37db25964c5dd05f4dce392533a838a722a9

                                                                            SHA256

                                                                            4e3baea3d98c479951f9ea02e588a3b98b1975055c1dfdf67af4de6e7b41e476

                                                                            SHA512

                                                                            72a64fab025928d60174d067990c35caa3bb6dadacf9c66e5629ee466016bc8495e71bed218e502f6bde61623e0819485459f25f3f82836e632a52727335c0a0

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\healgen.vbs

                                                                            Filesize

                                                                            302B

                                                                            MD5

                                                                            8837818893ce61b6730dd8a83d625890

                                                                            SHA1

                                                                            a9d71d6d6d0c262d41a60b6733fb23cd7b8c7614

                                                                            SHA256

                                                                            cc6d0f847fde710096b01abf905c037594ff4afae6e68a8b6af0cc59543e29bb

                                                                            SHA512

                                                                            6f17d46098e3c56070ced4171d4c3a0785463d92db5f703b56b250ab8615bcb6e504d4c5a74d05308a62ea36ae31bc29850187943b54add2b50422fb03125516

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\majordared.exe

                                                                            Filesize

                                                                            8.8MB

                                                                            MD5

                                                                            570d35aabee1887f7f6ab3f0a1e76984

                                                                            SHA1

                                                                            ae989563c3be21ee9043690dcaac3a426859d083

                                                                            SHA256

                                                                            fa24bc7bc366f2ad579d57a691fb0d10d868e501221df0c32a98e705d2d61e43

                                                                            SHA512

                                                                            9b68a8acacba451bbf028656c181fae29c5bcaed6a7ff4c1fc26ab708b62ca4be7bba9c777c598926d23331570617d20a0ce439f014461eccd8c3f595d21a54f

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\majorlist.exe

                                                                            Filesize

                                                                            51KB

                                                                            MD5

                                                                            230970ec5286b34a6b2cda9afdd28368

                                                                            SHA1

                                                                            e3198d3d3b51d245a62a0dc955f2b1449608a295

                                                                            SHA256

                                                                            3cdafc944b48d45a0d5dc068652486a970124ebe1379a7a04e5cf1dcf05c37c8

                                                                            SHA512

                                                                            52912b6b2ba55c540316fcfc6f45d68771d1c22ddf4eb09c2cc15fb8ddd214812c18fd75cd61b561c29f660e2bf20290a101b85da1e0bbf8dfbf90b791892b57

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\majorsod.exe

                                                                            Filesize

                                                                            58KB

                                                                            MD5

                                                                            b561c360c46744f55be79a25e1844e3c

                                                                            SHA1

                                                                            ed0f7eb00b4f1ae6cf92ad75e5701014f3d03d56

                                                                            SHA256

                                                                            d1094e91960ded15444c6f50756adc451a7c0b495b2ea28319b7184ba96236f7

                                                                            SHA512

                                                                            0a3a75d08f1d7afcd7a476fc71157983e04b0c26b00ace4d505aa644e5da3e242dd0f6afdb3c93f29ba0b08d2702d0e96b49acba4ed260330068b13f93973e9f

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\rsod.exe

                                                                            Filesize

                                                                            74KB

                                                                            MD5

                                                                            91a0740cfb043e1f4d8461f8cbe2ff19

                                                                            SHA1

                                                                            92e1ad31c34c4102e5cb2cc69f3793b2a1d5304e

                                                                            SHA256

                                                                            dcaabfd6955d3fec26a86217d1b1ab7e979c301d498473e4d885145ce031fc3b

                                                                            SHA512

                                                                            c60067655e5f191708af9b25382869e3ce65cd3ea2d6cac70f8cae4132942cfd6a8aa9dde1e2b7f3f12997d6d7411e21dc73ab4cd83ec555d74b82b86778a613

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\weird\GetReady.bat

                                                                            Filesize

                                                                            345B

                                                                            MD5

                                                                            3dbccaadafb7f0227c1839be5ca07015

                                                                            SHA1

                                                                            bd636f73235d52d172ad8932a8e4a6a8b17389a0

                                                                            SHA256

                                                                            33a0c62f3f66bce3fc1beb37aca8ad731bfa5590177d933d9d4eae016019242a

                                                                            SHA512

                                                                            d981670f9d492d97931ab260a7d7d27d4f97621a1ef3e20246d4be2a9b4cfc01e01174a1d46432b4a3d937ad135c97eec9ef7bbc7da46034388843887df4637e

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\weird\Major.vbs

                                                                            Filesize

                                                                            2KB

                                                                            MD5

                                                                            9192fd494155eab424110765c751559e

                                                                            SHA1

                                                                            b54fcc1e29617b3eee1c7bb215c048498881b641

                                                                            SHA256

                                                                            cbd3b0f294e8f11592a3ad80d1070d81746f806a48183b93c345251422ccbf0d

                                                                            SHA512

                                                                            b8c48916535f3721e7f47be6af671765c3befefcd407c6ea5fabcf9ada119747408d662f61fb436f98a7c33050b6674da54dddf25e683429204a96555ec6e801

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\weird\RuntimeChecker.vbs

                                                                            Filesize

                                                                            440B

                                                                            MD5

                                                                            fe44b78a465853c0ac0744c6ab05ea40

                                                                            SHA1

                                                                            f32dacd91b9547fce9a8a2846a4e17c33295aab3

                                                                            SHA256

                                                                            989d947c51c878bcefecb53d867a3c182c2d67129a87a5f6773eb6ef2bbf9b2e

                                                                            SHA512

                                                                            6b945e16786833c2e2e9867315b8859c413687fc72d4c8576b9c0a1aed2dc65249468317dd49f2ecf777e27c9969b7a7abc72b4d9b7c182dc7999051377515db

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\weird\WinScrew.bat

                                                                            Filesize

                                                                            336B

                                                                            MD5

                                                                            04067ca733ee8b2ab2f068edc8b75a0f

                                                                            SHA1

                                                                            973cb577f6ab2463040918c3661333553a3132c8

                                                                            SHA256

                                                                            3aef33c03777abe62feef0a840ac6a087caafc05adfe801464fd1c52eac656a0

                                                                            SHA512

                                                                            5423a1e668211f269a3d787548e11d18de7365d6c2525c2de61014854f1ab5a51b5de9eda70fb21d6ebe356cb52e93b3f406c71ed7fbcaedd2b023b6fa9c13f8

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\weird\breakrule.vbs

                                                                            Filesize

                                                                            108B

                                                                            MD5

                                                                            2609fde7a9604c73be5083e4bcfa0e20

                                                                            SHA1

                                                                            068c89f703fb11663143b9927f2a0c9f9f59c0e3

                                                                            SHA256

                                                                            17d014cb4abbaced3acce9b6d7a1b595cd6e2dd814e41f06ceddcdc08e93eebe

                                                                            SHA512

                                                                            439fee7cc198cb3fef4ef14693141e52c305579a4ff2da0842323f57dcffade03f3b01ac288080fed423511937a4c1e2080f5a79f967a963fe34253f541824cb

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\weird\bsod.bat

                                                                            Filesize

                                                                            133B

                                                                            MD5

                                                                            c94bb8d71863b05b95891389bed6365e

                                                                            SHA1

                                                                            07bb402d67f8b1fc601687f1df2622369413db3b

                                                                            SHA256

                                                                            3900e3b60b4691311e050c4cf8fac82ff178a06e3d04d5d6b2d7ea12cf5d53d1

                                                                            SHA512

                                                                            00e7ab3a91862faaf5ac5ca3de6dbf2cbb8aac4aba277e1e14b2ecf4650eea2e68134e0df549dca35ab715ed46e36fa9cfee1ba7bb3520511723bf567566682d

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\weird\cmd.vbs

                                                                            Filesize

                                                                            11B

                                                                            MD5

                                                                            b181d5a4055b4a620dd7c44c5065bbe7

                                                                            SHA1

                                                                            36320f257026b923b923ad2c0e7fa93a257806e0

                                                                            SHA256

                                                                            4d2639e890d6d5988eb9cb6f8cb50647048bbfeeb83fc604c52567e7381c876c

                                                                            SHA512

                                                                            0bec0cf2e5b93065701c5458c1d7e047312971d7bbed3ce5444db710654fa0d84eabb7d7c243130e3cb2dae38eb05874929b5b08547174a6065f8accd4e0433d

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\weird\majorlist.bat

                                                                            Filesize

                                                                            105B

                                                                            MD5

                                                                            4cc606c63f423fda5324c962db709562

                                                                            SHA1

                                                                            091250ffc64db9bea451885350abed2b7748014c

                                                                            SHA256

                                                                            839301ef07178c100e7f4d47874faf995ae5d11dfd527dda096a284c8114671b

                                                                            SHA512

                                                                            f29ef2bc694f497499545d1fa4e14ca93c06049fff582af3a6caf3885153491a1cd9e96ab5a6746051aa972421f876c008e5d5b671bd34c3922b61c84151097f

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\weird\majorsod.vbs

                                                                            Filesize

                                                                            126B

                                                                            MD5

                                                                            fecb9e50c1f01d9d6101f273cb860260

                                                                            SHA1

                                                                            18c413f577c289004db6156bd133e5db70258044

                                                                            SHA256

                                                                            8863b595563e92d73b29090ff83191b2fa1297507be588aa7e1cf910e77c7feb

                                                                            SHA512

                                                                            2c30641b099d5b6c3af40cb41e70160c1f4294bb30dc3162b018e9552b48fc899d1a63d3e366bfb71fcf6803bcc518cf8d504ce60684ce221028a9bf2bc07f9d

                                                                          • C:\Users\Admin\AppData\Local\Temp\DED2.tmp\MicrosoftWindowsServicesEtc\weird\runner32s.vbs

                                                                            Filesize

                                                                            383B

                                                                            MD5

                                                                            5f427dc44f33906509423d24fa0590c0

                                                                            SHA1

                                                                            b896f7667381a594d3751e05f258925b81c231c0

                                                                            SHA256

                                                                            9aae0707b1d5d3b7ed3bf5cc8fbb530aebd195e3e2f18312f3f7f1aa43e031b4

                                                                            SHA512

                                                                            bd28c386772062ef945f24c8ad7a25f158856af36e31d2c9b14674cedfd34b4f48ed531cd40a7eb291384d83665ffe154f0786c1a7ee1616256cf30125120961

                                                                          • C:\Users\Admin\AppData\Local\Temp\E913.tmp\MicrosoftWindowsServicesEtc\xRun.vbs

                                                                            Filesize

                                                                            93B

                                                                            MD5

                                                                            26ec8d73e3f6c1e196cc6e3713b9a89f

                                                                            SHA1

                                                                            cb2266f3ecfef4d59bd12d7f117c2327eb9c55fa

                                                                            SHA256

                                                                            ed588fa361979f7f9c6dbb4e6a1ae6e075f2db8d79ea6ca2007ba8e3423671b0

                                                                            SHA512

                                                                            2b3ad279f1cdc2a5b05073116c71d79e190bfa407da09d8268d56ac2a0c4cc0c31161a251686ac67468d0ba329c302a301c542c22744d9e3a3f5e7ffd2b51195

                                                                          • C:\Users\Admin\AppData\Local\Temp\E913.tmp\MicrosoftWindowsServicesEtc\xRunReg.vbs

                                                                            Filesize

                                                                            134B

                                                                            MD5

                                                                            8267192f547f8914ff36eff80ca3f402

                                                                            SHA1

                                                                            23bdeb19fb37059e1293dd80d8be69480c957c73

                                                                            SHA256

                                                                            cdd4f356ca256c707960bc42b97649111a830e6f951ca6a3cf80853e3c342947

                                                                            SHA512

                                                                            cd684cb73496ca925fd8604fbbf286b842e2b02ce18b19d63618e8355dcec02bce700fb09b25da932545845b01a7f8d9986fa486db504b92a42d7c0ace21e9e2

                                                                          • C:\Users\Admin\AppData\Local\Temp\scoped_dir2572_379588180\efe42387-c309-4d0d-9863-214d3f3cd22f.tmp

                                                                            Filesize

                                                                            152KB

                                                                            MD5

                                                                            dd9bf8448d3ddcfd067967f01e8bf6d7

                                                                            SHA1

                                                                            d7829475b2bd6a3baa8fabfaf39af57c6439b35e

                                                                            SHA256

                                                                            fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                                            SHA512

                                                                            65347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de

                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            708673eb943bba4b1c37fc737e39f4b1

                                                                            SHA1

                                                                            62c09ef7f0952b74b9839c8d497b3381bac9f0e9

                                                                            SHA256

                                                                            ed0c3e5913db55ced1a356b224fadb89526d95d79bdc943d8a47e21056c6dd28

                                                                            SHA512

                                                                            881c76a815dca5e3ad45350d86578112a0a33b7856b8a91b9d5c17afbb3561d3424134fae34aaf8b88a410ae517c92cab61f93e88db5d22620bdc8689babcd10

                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms

                                                                            Filesize

                                                                            3KB

                                                                            MD5

                                                                            75e9156e83c1e65bd22c00653ca05e1d

                                                                            SHA1

                                                                            068f5145cff985ea9acd8cef1afa24f48fe970c8

                                                                            SHA256

                                                                            32cba00eeaff5edf05494e5dc7b247d9b7a8be3d1252df97f6f5abda5ef97467

                                                                            SHA512

                                                                            07b4ff0bf0b9c233d37f593ed84add8a7990d3df0451c29c6b6fdd71cb0077a72b57efa3b16d123b584a68c9ef6cf872cdff9d61b7d6227d5a0aece7ce8bd1b7

                                                                          • C:\Users\Admin\Desktop\MRS MAJOR WANTS TO MEET YOU 5.txt

                                                                            Filesize

                                                                            27B

                                                                            MD5

                                                                            e20f623b1d5a781f86b51347260d68a5

                                                                            SHA1

                                                                            7e06a43ba81d27b017eb1d5dcc62124a9579f96e

                                                                            SHA256

                                                                            afeebe824fc4a955a673d3d8569a0b49dfbc43c6cc1d4e3d66d9855c28a7a179

                                                                            SHA512

                                                                            2e74cccdd158ce1ffde84573d43e44ec6e488d00282a661700906ba1966ad90968a16c405a9640b9d33db03b33753733c9b7078844b0f6ac3af3de0c3c044c0b

                                                                          • C:\Users\Admin\Downloads\BossDaMajor.exe

                                                                            Filesize

                                                                            1.9MB

                                                                            MD5

                                                                            38ff71c1dee2a9add67f1edb1a30ff8c

                                                                            SHA1

                                                                            10f0defd98d4e5096fbeb321b28d6559e44d66db

                                                                            SHA256

                                                                            730a41a7656f606a22e9f0d68782612d6e00ab8cfe1260160b9e0b00bc2e442a

                                                                            SHA512

                                                                            8347782951f2647fe433482cb13186653afa32ee9f5be83a138c4ed47ff34d8de66a26e74b5a28ea21c1529b2078401922a9a26803772677b70489967c10f3e9

                                                                          • C:\Users\Admin\Downloads\MrsMajor2.0.exe

                                                                            Filesize

                                                                            25.6MB

                                                                            MD5

                                                                            247a35851fdee53a1696715d67bd0905

                                                                            SHA1

                                                                            d2e86020e1d48e527e81e550f06c651328bd58a4

                                                                            SHA256

                                                                            5dd4ea169cabf9226f54bb53e63ea6a1b5880a0d1222242aee378efb6255b57d

                                                                            SHA512

                                                                            a173801aaef4fab608d99b52223b5b2400d69b91edcbf33c21fcb47bd832eef9d771dfd36da350a502a371ed1739c869a7c2b4dca456c93f2feed9ac9c647c7c

                                                                          • C:\Users\Admin\Downloads\MrsMajor3.0.exe

                                                                            Filesize

                                                                            381KB

                                                                            MD5

                                                                            35a27d088cd5be278629fae37d464182

                                                                            SHA1

                                                                            d5a291fadead1f2a0cf35082012fe6f4bf22a3ab

                                                                            SHA256

                                                                            4a75f2db1dbd3c1218bb9994b7e1c690c4edd4e0c1a675de8d2a127611173e69

                                                                            SHA512

                                                                            eb0be3026321864bd5bcf53b88dc951711d8c0b4bcbd46800b90ca5116a56dba22452530e29f3ccbbcc43d943bdefc8ed8ca2d31ba2e7e5f0e594f74adba4ab5

                                                                          • memory/1124-1508-0x00000000053C0000-0x00000000053CA000-memory.dmp

                                                                            Filesize

                                                                            40KB

                                                                          • memory/1124-1507-0x00000000053E0000-0x0000000005472000-memory.dmp

                                                                            Filesize

                                                                            584KB

                                                                          • memory/1124-1506-0x0000000005990000-0x0000000005F34000-memory.dmp

                                                                            Filesize

                                                                            5.6MB

                                                                          • memory/1124-1505-0x00000000008D0000-0x0000000000A0C000-memory.dmp

                                                                            Filesize

                                                                            1.2MB

                                                                          • memory/3968-1841-0x0000000004500000-0x0000000004510000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/3968-1823-0x0000000004500000-0x0000000004510000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/3968-1824-0x0000000004500000-0x0000000004510000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/3968-1826-0x0000000004500000-0x0000000004510000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/3968-1825-0x0000000004500000-0x0000000004510000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/3968-1827-0x00000000071C0000-0x00000000071D0000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/3968-1829-0x0000000004500000-0x0000000004510000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/3968-1828-0x0000000004500000-0x0000000004510000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/4036-1027-0x000000001DD60000-0x000000001DF22000-memory.dmp

                                                                            Filesize

                                                                            1.8MB

                                                                          • memory/4036-1019-0x0000000000CB0000-0x0000000000CDA000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/4036-1026-0x00007FFA397C0000-0x00007FFA3990E000-memory.dmp

                                                                            Filesize

                                                                            1.3MB

                                                                          • memory/4036-1028-0x000000001E460000-0x000000001E988000-memory.dmp

                                                                            Filesize

                                                                            5.2MB