Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2025, 12:55

General

  • Target

    49b35e.msi

  • Size

    4.7MB

  • MD5

    ecdd7739e76adee32b9cd61f4a132963

  • SHA1

    14e5ec6b9c6bdaab641009284e2f41067462bf21

  • SHA256

    59baa105734ae018e88a3abeee22657b083d2aaddf1c73e5564bf21382e5fa16

  • SHA512

    91526118167315f2258c1d4e7f2b1d68f8cd7865b8bedafdb1864a4d2084ba8312124aefacc9402a38dd47474e9aabe7ce988c18bfdef9ced275920bf376c229

  • SSDEEP

    98304:5Yqd1ASubUZwPEDYPo6sAPGJ60TGEtof1SvfRL8YwlYfRa6:LHr0PdsAPGJVTGEOdSvfSUa

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Uses browser remote debugging 2 TTPs 10 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks for any installed AV software in registry 1 TTPs 8 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 12 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3428
      • C:\Windows\system32\msiexec.exe
        msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\49b35e.msi
        2⤵
        • Enumerates connected drives
        • Event Triggered Execution: Installer Packages
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:5348
      • C:\Users\Admin\AppData\Local\Temp\31081\CasPol.exe
        "C:\Users\Admin\AppData\Local\Temp\31081\CasPol.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1292
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9236 --profile-directory="Default"
          3⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3212
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff7bacdcf8,0x7fff7bacdd04,0x7fff7bacdd10
            4⤵
              PID:5092
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2024,i,807213416806605114,17287215404457141565,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2020 /prefetch:2
              4⤵
                PID:4700
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1612,i,807213416806605114,17287215404457141565,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2268 /prefetch:3
                4⤵
                  PID:4824
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2424,i,807213416806605114,17287215404457141565,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2588 /prefetch:8
                  4⤵
                    PID:2876
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9236 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3272,i,807213416806605114,17287215404457141565,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3328 /prefetch:1
                    4⤵
                    • Uses browser remote debugging
                    PID:5104
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9236 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3280,i,807213416806605114,17287215404457141565,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3348 /prefetch:1
                    4⤵
                    • Uses browser remote debugging
                    PID:976
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9236 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4560,i,807213416806605114,17287215404457141565,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4456 /prefetch:2
                    4⤵
                    • Uses browser remote debugging
                    PID:4452
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9236 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4596,i,807213416806605114,17287215404457141565,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4548 /prefetch:2
                    4⤵
                    • Uses browser remote debugging
                    PID:4760
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9236 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4436,i,807213416806605114,17287215404457141565,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4488 /prefetch:1
                    4⤵
                    • Uses browser remote debugging
                    PID:5752
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=7775 --profile-directory="Default"
                  3⤵
                  • Uses browser remote debugging
                  • Enumerates system info in registry
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of FindShellTrayWindow
                  PID:4812
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x268,0x7fff7b7ff208,0x7fff7b7ff214,0x7fff7b7ff220
                    4⤵
                      PID:5328
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1960,i,12336983731521217254,2249283918772549074,262144 --variations-seed-version --mojo-platform-channel-handle=2316 /prefetch:3
                      4⤵
                        PID:1356
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2160,i,12336983731521217254,2249283918772549074,262144 --variations-seed-version --mojo-platform-channel-handle=2152 /prefetch:2
                        4⤵
                          PID:4632
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2556,i,12336983731521217254,2249283918772549074,262144 --variations-seed-version --mojo-platform-channel-handle=2576 /prefetch:8
                          4⤵
                            PID:2468
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=7775 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3620,i,12336983731521217254,2249283918772549074,262144 --variations-seed-version --mojo-platform-channel-handle=3656 /prefetch:1
                            4⤵
                            • Uses browser remote debugging
                            PID:4184
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=7775 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3632,i,12336983731521217254,2249283918772549074,262144 --variations-seed-version --mojo-platform-channel-handle=3712 /prefetch:1
                            4⤵
                            • Uses browser remote debugging
                            PID:5712
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --pdf-upsell-enabled --remote-debugging-port=7775 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=5012,i,12336983731521217254,2249283918772549074,262144 --variations-seed-version --mojo-platform-channel-handle=5004 /prefetch:2
                            4⤵
                            • Uses browser remote debugging
                            PID:2372
                    • C:\Windows\system32\msiexec.exe
                      C:\Windows\system32\msiexec.exe /V
                      1⤵
                      • Enumerates connected drives
                      • Drops file in Windows directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:5584
                      • C:\Windows\system32\srtasks.exe
                        C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                        2⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3620
                      • C:\Windows\syswow64\MsiExec.exe
                        C:\Windows\syswow64\MsiExec.exe -Embedding 60D3D931AB1B973F5FF639F625DC72A8
                        2⤵
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        PID:3576
                      • C:\Users\Admin\AppData\Local\Kart\GmRemote.exe
                        "C:\Users\Admin\AppData\Local\Kart\GmRemote.exe"
                        2⤵
                        • Checks for any installed AV software in registry
                        • Suspicious use of SetThreadContext
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: MapViewOfSection
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of WriteProcessMemory
                        PID:2984
                        • C:\Users\Admin\AppData\Local\Temp\31081\CasPol.exe
                          C:\Users\Admin\AppData\Local\Temp\31081\CasPol.exe
                          3⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Suspicious use of SetThreadContext
                          • Loads dropped DLL
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of WriteProcessMemory
                          PID:5240
                        • C:\Windows\SysWOW64\gpupdate.exe
                          C:\Windows\SysWOW64\gpupdate.exe
                          3⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2708
                    • C:\Windows\system32\vssvc.exe
                      C:\Windows\system32\vssvc.exe
                      1⤵
                      • Checks SCSI registry key(s)
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3920
                    • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                      1⤵
                        PID:5756
                      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                        1⤵
                          PID:864

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Config.Msi\e579955.rbs

                          Filesize

                          11KB

                          MD5

                          5582658a3aa6d895d7ff370de58bf512

                          SHA1

                          d637703e9546b3886154f102f0d15e26fc55c2e1

                          SHA256

                          2ec05ae40f4237e07f85cfe2ba976c3ce81dfd0f9a345aaff3f5efac1b57cc70

                          SHA512

                          b4999c5bf9e732fc44ec695b7e51807914d697c7846fae38826c4a673e67754d19e3a06d04ae22fc7f8aa4942ec1e8b8bf85b9839aa2f7423171a32367230f35

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                          Filesize

                          17KB

                          MD5

                          a32823b4c6b46986ac0d64dcf875dcac

                          SHA1

                          9ec461bf68555ab9b73ae4220f7f0cab88719888

                          SHA256

                          3976b631cf0f03ebbb3ab450b22a74c724e16bdccfaaa7edcefa8f3bc096aaf0

                          SHA512

                          0cdb1997011388684e49ba671546af2dc1bd6c891692f6932b102d8290df616494f8ea651d82fdbec5bb9733a2a09bb540cd27ee0283b0be1508b2985455cd01

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          79KB

                          MD5

                          a0b17e57f94db032b9be6da6aebac77b

                          SHA1

                          203350c9863b8418755fc429fc3d3e565d78b0d3

                          SHA256

                          97b115dfebc0fe78e7733a7cca6e8c87ca78354928d6c96771c35a8840b7aa41

                          SHA512

                          8553ef88cbdccd2f3bc3de8dfa0a5f62e5f6424970d8c71b8f8e93b75d7fe387e2921f726599e25c1c799743955f75f2a54f38355709a1d381fe2b94f14dbdfe

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          280B

                          MD5

                          8625e8ce164e1039c0d19156210674ce

                          SHA1

                          9eb5ae97638791b0310807d725ac8815202737d2

                          SHA256

                          2f65f9c3c54fe018e0b1f46e3c593d100a87758346d3b00a72cb93042daf60a2

                          SHA512

                          3c52b8876982fe41d816f9dfb05cd888c551cf7efd266a448050c87c3fc52cc2172f53c83869b87d7643ce0188004c978570f35b0fcc1cb50c9fffea3dec76a6

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                          Filesize

                          33KB

                          MD5

                          12b773dd7c37f3b159347895633bcfb5

                          SHA1

                          680b2fe3d002c272bf2a9409f36d90ac208072f3

                          SHA256

                          0641379a87928bf6b12e762ffa42121eff88e2118b4c946595ac6f01d02452bd

                          SHA512

                          09638e724d4ab907c0af6c2d35f09ef4fc9cce634271252d019e57226e06d9f02a0836135aa27d65dd14ce42d484ffff4ea63890d4eed268340440a9c9465156

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                          Filesize

                          41KB

                          MD5

                          e67b251d9a2637f761cb67e06c303c10

                          SHA1

                          2dcc41b9de6d654556a81a0e912842b62e5e9c77

                          SHA256

                          1251b5d54f23e9be70851cd7f928041469fbaac5c4d28ffb36ccd360b5c06505

                          SHA512

                          1b36b404ea0f13972d24f0fb2959948d32059c2a753e88e5fee3b5f6893d075f9654bdc462f75100d16551cfb838b2a02573e7e6c119a22d9de35b28a4579105

                        • C:\Users\Admin\AppData\Local\Temp\31081\CasPol.exe

                          Filesize

                          99KB

                          MD5

                          f61fa5ce25f885a9b1f549055c9911ed

                          SHA1

                          aba1c035b06017b0b0bd1c712669646e4f3765ab

                          SHA256

                          57e9675902b443085e37ead57dfed97de6bb61321682bc93aff30f16b5ca5aeb

                          SHA512

                          02e3db343037294fd3b774f954c9a617a50715e6b89d7c409f3c7dc5a1cf5ed9418158c442e9e80111994da139a9a16db33ac68a833d6d115c4a41bdf75751ac

                        • C:\Users\Admin\AppData\Local\Temp\494682d0

                          Filesize

                          2.8MB

                          MD5

                          9f2b0e4d218442927581577f52997f8d

                          SHA1

                          ab74e08d3a230260a545036c4ab423db1e4746e8

                          SHA256

                          47d20fa8d26cd6659bdcd45bce3a2666706d1e0b52b69ee023b58ac7e61bd936

                          SHA512

                          4f7db2f85793056884876be3506710833c2bed20b0fb0d13db0e347f28b4935fa20b1d5968b63f9877ea473aed6c8bf28dc91af0cacaeee43d63f31a87e44e8b

                        • C:\Users\Admin\AppData\Local\Temp\4cb810b9

                          Filesize

                          2.7MB

                          MD5

                          f6f7652d68a5f19c66f9cd75fde73043

                          SHA1

                          ac0345fda60fea0489bbc9d77a845cf4e0cb01da

                          SHA256

                          70b8a08fc00601e31ace5703419fc65c17958310994306beda45946538f76919

                          SHA512

                          7661e017cb73bbaf136a54bf3aa33543f53530677cc5c19456b2f29fc257958c03ef0ad75f91b6bffe1bdb76adedbd1e209729409c9d1c885624a2ec0d3b2463

                        • C:\Users\Admin\AppData\Local\Temp\4cb810b9

                          Filesize

                          2.7MB

                          MD5

                          b02d1c75995364aac0c304d72701ec87

                          SHA1

                          b5f2e49d94c09819e759fa1d796f38179e765761

                          SHA256

                          896d8d18bcde84a91a913cb327fc1729580c5d291b7d1d2f4792e5f439951453

                          SHA512

                          4a2624df2b2dfd601f33bd03b621f972e205b9c9047fbea6ccc067e331f554c4ba56c52d8c4d13a9cbffab681914df0c877ee3501125bf169db06dfea9701e8a

                        • C:\Users\Admin\AppData\Local\nimdA\llg\background.js

                          Filesize

                          596B

                          MD5

                          aa0e77ec6b92f58452bb5577b9980e6f

                          SHA1

                          237872f2b0c90e8cbe61eaa0e2919d6578cacd3f

                          SHA256

                          aad1c9be17f64d7700feb2d38df7dc7446a48bf001ae42095b59b11fd24dfcde

                          SHA512

                          37366bd1e0a59036fe966f2e2fe3a0f7dce6f11f2ed5bf7724afb61ea5e8d3e01bdc514f0deb3beb6febfd8b4d08d45e4e729c23cc8f4cae4f6d11f18fc39fa6

                        • C:\Users\Admin\AppData\Local\nimdA\llg\content.js

                          Filesize

                          1KB

                          MD5

                          4b7f99a315e4bba73c4bd6bd945287b3

                          SHA1

                          44862b156b032278c9a1272783684ed0a9e0d2bd

                          SHA256

                          4f64af6108a2de6cdab0e03dbb010095d1e450aebe03ec5edff342adf1ab40cd

                          SHA512

                          1290a37d2342758a432964a5d8a188c2d2230c6383a82c0fd78cb1d4ddc1d86cbcf35394e00f3a5aac00bf19e9e4c181042fff42e6ec42096387193baacbb4ca

                        • C:\Users\Admin\AppData\Local\nimdA\llg\icon.png

                          Filesize

                          5KB

                          MD5

                          2c905a6e4a21a3fa14adc1d99b7cbc03

                          SHA1

                          bd8682b580d951e3df05dfd467abba6b87bb43d9

                          SHA256

                          cc3631ced23f21ae095c1397770e685f12f6ad788c8fa2f15487835a77a380fb

                          SHA512

                          753e28bab9d50b7882a1308f6072f80fda99edeaa476fafc7e647d29f5c9c15f5c404689c866f8f198b7f1ed41bae3cc55ae4d15528b0df966a47cbc4b31caf6

                        • C:\Users\Admin\AppData\Local\nimdA\llg\jquery.js

                          Filesize

                          93KB

                          MD5

                          3c9137d88a00b1ae0b41ff6a70571615

                          SHA1

                          1797d73e9da4287351f6fbec1b183c19be217c2a

                          SHA256

                          24262baafef17092927c3dafe764aaa52a2a371b83ed2249cca7e414df99fac1

                          SHA512

                          31730738e73937ee0086849cb3d6506ea383ca2eac312b8d08e25c60563df5702fc2b92b3778c4b2b66e7fddd6965d74b5a4df5132df3f02faed01dcf3c7bcae

                        • C:\Users\Admin\AppData\Local\nimdA\llg\manifest.json

                          Filesize

                          569B

                          MD5

                          2835dd0a0aef8405d47ab7f73d82eaa5

                          SHA1

                          851ea2b4f89fc06f6a4cd458840dd5c660a3b76c

                          SHA256

                          2aafd1356d876255a99905fbcafb516de31952e079923b9ddf33560bbe5ed2f3

                          SHA512

                          490327e218b0c01239ac419e02a4dc2bd121a08cb7734f8e2ba22e869b60175d599104ba4b45ef580e84e312fe241b3d565fac958b874d6256473c2f987108cc

                        • C:\Windows\Installer\MSI99A0.tmp

                          Filesize

                          386KB

                          MD5

                          72b1c6699ddc2baab105d32761285df2

                          SHA1

                          fc85e9fb190f205e6752624a5231515c4ee4e155

                          SHA256

                          bf7f6f7e527ab8617766bb7a21c21b2895b5275c0e808756c2aadcd66eff8a97

                          SHA512

                          cde1e754d8dfb2fa55db243517b5dd3d75b209ea6387ef2e4be6157875e536db2373f23434a9e66c119150301c7b7cdf97de5a5544d94c03247b4ae716cbc170

                        • C:\Windows\Installer\e579952.msi

                          Filesize

                          4.7MB

                          MD5

                          ecdd7739e76adee32b9cd61f4a132963

                          SHA1

                          14e5ec6b9c6bdaab641009284e2f41067462bf21

                          SHA256

                          59baa105734ae018e88a3abeee22657b083d2aaddf1c73e5564bf21382e5fa16

                          SHA512

                          91526118167315f2258c1d4e7f2b1d68f8cd7865b8bedafdb1864a4d2084ba8312124aefacc9402a38dd47474e9aabe7ce988c18bfdef9ced275920bf376c229

                        • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

                          Filesize

                          24.1MB

                          MD5

                          5db9d7847810d47d567ec42d362fa0ab

                          SHA1

                          2f3ac5b0836b2cfa9295b19342661788f6730d0f

                          SHA256

                          20cae2c450fea384385cde2a26fccbc49ce9c6b4864319b6af9cd00cd6c4cf83

                          SHA512

                          ecb4b8b786de408e88f8d9558b13bc689020a5b380aa93bae9f79c1e803b074d498e2e9c7ff71bdf23b261e2817f822c03fa943bd3e426f596774a1a92fc872b

                        • \??\Volume{3fa30589-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{4237a319-b7df-447c-9bb9-ce1a8c8905db}_OnDiskSnapshotProp

                          Filesize

                          6KB

                          MD5

                          22043b2c7065a53eb06c7b054833150c

                          SHA1

                          b0f75567a460d93b43b3b3d0f0e4a46d2d292554

                          SHA256

                          3d6ab08cbef56c2d7fcef52202288ffa6b621d920c0566d1217ac49bcddb2d76

                          SHA512

                          0e55d46839fbc0d81a4a6b862859349db26722decf73e6729eec837a5b232cfda549963493022e8769353d432fd8782d740c2f61b1ed9ea0185e7d1bac827bc6

                        • memory/1292-1426-0x0000000006C30000-0x000000000715C000-memory.dmp

                          Filesize

                          5.2MB

                        • memory/1292-1428-0x0000000006970000-0x00000000069D6000-memory.dmp

                          Filesize

                          408KB

                        • memory/1292-1416-0x0000000005820000-0x0000000005870000-memory.dmp

                          Filesize

                          320KB

                        • memory/1292-1417-0x0000000005BF0000-0x0000000005DB2000-memory.dmp

                          Filesize

                          1.8MB

                        • memory/1292-1438-0x0000000005DC0000-0x0000000005DFC000-memory.dmp

                          Filesize

                          240KB

                        • memory/1292-1437-0x00000000016E0000-0x00000000016F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/1292-1434-0x0000000008350000-0x000000000835A000-memory.dmp

                          Filesize

                          40KB

                        • memory/1292-1415-0x0000000000400000-0x00000000004D4000-memory.dmp

                          Filesize

                          848KB

                        • memory/1292-1427-0x0000000005B80000-0x0000000005B9E000-memory.dmp

                          Filesize

                          120KB

                        • memory/1292-1425-0x0000000006680000-0x00000000066F6000-memory.dmp

                          Filesize

                          472KB

                        • memory/2984-56-0x00000000756C0000-0x000000007570F000-memory.dmp

                          Filesize

                          316KB

                        • memory/2984-51-0x00000000756C0000-0x000000007570F000-memory.dmp

                          Filesize

                          316KB

                        • memory/2984-44-0x0000000000480000-0x00000000008F9000-memory.dmp

                          Filesize

                          4.5MB

                        • memory/2984-52-0x00007FFF99A90000-0x00007FFF99C85000-memory.dmp

                          Filesize

                          2.0MB

                        • memory/5240-68-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-108-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-98-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-96-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-94-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-92-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-90-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-88-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-82-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-80-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-101-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-86-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-1404-0x0000000006520000-0x00000000065E8000-memory.dmp

                          Filesize

                          800KB

                        • memory/5240-1405-0x0000000006D30000-0x0000000006DF6000-memory.dmp

                          Filesize

                          792KB

                        • memory/5240-1406-0x0000000006320000-0x000000000636C000-memory.dmp

                          Filesize

                          304KB

                        • memory/5240-1407-0x0000000006FB0000-0x0000000007004000-memory.dmp

                          Filesize

                          336KB

                        • memory/5240-116-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-104-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-106-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-102-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-110-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-112-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-115-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-118-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-120-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-123-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-84-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-65-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-70-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-72-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-74-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-76-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-78-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-66-0x0000000005FF0000-0x000000000615B000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-64-0x0000000006270000-0x0000000006302000-memory.dmp

                          Filesize

                          584KB

                        • memory/5240-63-0x0000000006720000-0x0000000006CC4000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/5240-62-0x0000000005FF0000-0x0000000006160000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5240-61-0x0000000005810000-0x00000000059AC000-memory.dmp

                          Filesize

                          1.6MB

                        • memory/5240-57-0x0000000075230000-0x00000000754C1000-memory.dmp

                          Filesize

                          2.6MB