Analysis

  • max time kernel
    128s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2025, 19:53

General

  • Target

    60.msi

  • Size

    4.7MB

  • MD5

    ecdd7739e76adee32b9cd61f4a132963

  • SHA1

    14e5ec6b9c6bdaab641009284e2f41067462bf21

  • SHA256

    59baa105734ae018e88a3abeee22657b083d2aaddf1c73e5564bf21382e5fa16

  • SHA512

    91526118167315f2258c1d4e7f2b1d68f8cd7865b8bedafdb1864a4d2084ba8312124aefacc9402a38dd47474e9aabe7ce988c18bfdef9ced275920bf376c229

  • SSDEEP

    98304:5Yqd1ASubUZwPEDYPo6sAPGJ60TGEtof1SvfRL8YwlYfRa6:LHr0PdsAPGJVTGEOdSvfSUa

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Uses browser remote debugging 2 TTPs 10 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks for any installed AV software in registry 1 TTPs 8 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 12 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3488
      • C:\Windows\system32\msiexec.exe
        msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\60.msi
        2⤵
        • Enumerates connected drives
        • Event Triggered Execution: Installer Packages
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:1020
      • C:\Users\Admin\AppData\Local\Temp\31081\CasPol.exe
        "C:\Users\Admin\AppData\Local\Temp\31081\CasPol.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5876
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9197 --profile-directory="Default"
          3⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3860
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9695bdcf8,0x7ff9695bdd04,0x7ff9695bdd10
            4⤵
              PID:5956
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2052,i,10522763601017559061,11143239183294494464,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2044 /prefetch:2
              4⤵
                PID:1588
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1628,i,10522763601017559061,11143239183294494464,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2292 /prefetch:3
                4⤵
                  PID:4972
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2416,i,10522763601017559061,11143239183294494464,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2460 /prefetch:8
                  4⤵
                    PID:5660
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9197 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3268,i,10522763601017559061,11143239183294494464,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3332 /prefetch:1
                    4⤵
                    • Uses browser remote debugging
                    PID:6056
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9197 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3276,i,10522763601017559061,11143239183294494464,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3368 /prefetch:1
                    4⤵
                    • Uses browser remote debugging
                    PID:5832
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9197 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4552,i,10522763601017559061,11143239183294494464,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4616 /prefetch:2
                    4⤵
                    • Uses browser remote debugging
                    PID:808
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9197 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4584,i,10522763601017559061,11143239183294494464,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4636 /prefetch:2
                    4⤵
                    • Uses browser remote debugging
                    PID:5772
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9197 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4872,i,10522763601017559061,11143239183294494464,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4904 /prefetch:1
                    4⤵
                    • Uses browser remote debugging
                    PID:2532
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9175 --profile-directory="Default"
                  3⤵
                  • Uses browser remote debugging
                  • Enumerates system info in registry
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of FindShellTrayWindow
                  PID:4740
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x264,0x7ff96959f208,0x7ff96959f214,0x7ff96959f220
                    4⤵
                      PID:2076
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1928,i,7016530374558815633,5136963518383285945,262144 --variations-seed-version --mojo-platform-channel-handle=2232 /prefetch:3
                      4⤵
                        PID:2524
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2204,i,7016530374558815633,5136963518383285945,262144 --variations-seed-version --mojo-platform-channel-handle=2200 /prefetch:2
                        4⤵
                          PID:2564
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2604,i,7016530374558815633,5136963518383285945,262144 --variations-seed-version --mojo-platform-channel-handle=2620 /prefetch:8
                          4⤵
                            PID:2644
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9175 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3560,i,7016530374558815633,5136963518383285945,262144 --variations-seed-version --mojo-platform-channel-handle=3640 /prefetch:1
                            4⤵
                            • Uses browser remote debugging
                            PID:5252
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9175 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3568,i,7016530374558815633,5136963518383285945,262144 --variations-seed-version --mojo-platform-channel-handle=3656 /prefetch:1
                            4⤵
                            • Uses browser remote debugging
                            PID:1432
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --pdf-upsell-enabled --remote-debugging-port=9175 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4984,i,7016530374558815633,5136963518383285945,262144 --variations-seed-version --mojo-platform-channel-handle=5008 /prefetch:2
                            4⤵
                            • Uses browser remote debugging
                            PID:4612
                    • C:\Windows\system32\msiexec.exe
                      C:\Windows\system32\msiexec.exe /V
                      1⤵
                      • Enumerates connected drives
                      • Drops file in Windows directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:3588
                      • C:\Windows\system32\srtasks.exe
                        C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                        2⤵
                          PID:5488
                        • C:\Windows\syswow64\MsiExec.exe
                          C:\Windows\syswow64\MsiExec.exe -Embedding 96980C80F8610DFCC34F801032EB70E4
                          2⤵
                          • Loads dropped DLL
                          • System Location Discovery: System Language Discovery
                          PID:5452
                        • C:\Users\Admin\AppData\Local\Kart\GmRemote.exe
                          "C:\Users\Admin\AppData\Local\Kart\GmRemote.exe"
                          2⤵
                          • Checks for any installed AV software in registry
                          • Suspicious use of SetThreadContext
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: MapViewOfSection
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          • Suspicious use of WriteProcessMemory
                          PID:4052
                          • C:\Users\Admin\AppData\Local\Temp\31081\CasPol.exe
                            C:\Users\Admin\AppData\Local\Temp\31081\CasPol.exe
                            3⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • Suspicious use of SetThreadContext
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of WriteProcessMemory
                            PID:4084
                          • C:\Windows\SysWOW64\gpupdate.exe
                            C:\Windows\SysWOW64\gpupdate.exe
                            3⤵
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1576
                      • C:\Windows\system32\vssvc.exe
                        C:\Windows\system32\vssvc.exe
                        1⤵
                        • Checks SCSI registry key(s)
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2584
                      • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                        1⤵
                          PID:5712
                        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                          1⤵
                            PID:1084

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Config.Msi\e57c16e.rbs

                            Filesize

                            11KB

                            MD5

                            ba2dec7e02d38099102ea0ffcfc2439d

                            SHA1

                            44f072b6e27bbd79086357f5251cc16fdb15d34a

                            SHA256

                            3cf1eb89b599a1537a0e8a638ee939eecc15098fa99d97203305c619f4456968

                            SHA512

                            43fcbc14e779e05048b0d1570d27a9a2b410bf3606fe05c273b0c07f31001975925a0b82447a4fde486736826414df3f8617d631f7ba5ccc5ce590fdb77a7f19

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                            Filesize

                            2B

                            MD5

                            d751713988987e9331980363e24189ce

                            SHA1

                            97d170e1550eee4afc0af065b78cda302a97674c

                            SHA256

                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                            SHA512

                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                            Filesize

                            17KB

                            MD5

                            6a95acbc0723234ece21850a18b7473c

                            SHA1

                            217a61385d4fbecf11f95a4a9a2231b7cd3e330e

                            SHA256

                            48db1d1eec2d86468ad040cd45632a37152e0ca41cd1c52c05c691a002d30ee7

                            SHA512

                            077def11a1f2cab652fcbdc682defdcd45a72114db432ee3e2643cb345741cec803b5107928a9b9b29dae75ddff4fc583b8df075bbe61495942c0877a761b855

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            80KB

                            MD5

                            406f58b468d1d9d68fd474e2ae31e7a2

                            SHA1

                            5329e38d9355fcee26b2c8fb629eb87017b1d3f5

                            SHA256

                            8afaee1ed57c364243533bd5bff57eb3e9ec712677f7f2aa0e612518f357fe99

                            SHA512

                            9146734eda37a28a8d6d084b93c0884f669bac1ce5558c8b86506e05b38939c483f265ca149d30016139d496de1ddc92d825f3607a18d005db62d3dd838e7c91

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                            Filesize

                            280B

                            MD5

                            df2d1721cd4e4eff7049314710dc7c11

                            SHA1

                            f5aed0158b2c0a00302f743841188881d811637a

                            SHA256

                            ba336ffd1b01965d7ab0e5fac5415e43cb594139c76b19e4c0d9b5b3b67c1e93

                            SHA512

                            11fd520176193f284563c7d050e6a7ab4e9895bac49fdc05759bab2c8a69f224858ccc784b351fc1d3ee5d39345430f9234623c9390978d7daf6a08ff5576ef4

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                            Filesize

                            33KB

                            MD5

                            f517b877cca80c9d8670512b9183d9d1

                            SHA1

                            2d652742b161a3d29059e05f88be1d418a2f377c

                            SHA256

                            af9e3e9525af68cb6486df8d75a3aee221ef1ec823a949066efbc929ad112475

                            SHA512

                            254d09e866a0e910bd8cab66ba6002d5248317f1295cce74bb3e09408f3c1875f37fa561681c09b4d79617413892b361f775ce5485eb3e912cd6dd5df5e48828

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                            Filesize

                            40KB

                            MD5

                            f9ed5f7f15628eea006610c379d27774

                            SHA1

                            8219240a8cd3b77c1f8a84c583f2f1e8340ac9be

                            SHA256

                            9746b788e59976fd6b2842d707b6d489974411512ad1da756bf32f9110494831

                            SHA512

                            c7c7d97fc8e7f22375c385ab079294f66d8d9b693dfb4cd995c86f06b89180cf925e47cb51393f126d481f944316e4d8d79f0365461ec135ba87122bc8140f74

                          • C:\Users\Admin\AppData\Local\Temp\31081\CasPol.exe

                            Filesize

                            99KB

                            MD5

                            f61fa5ce25f885a9b1f549055c9911ed

                            SHA1

                            aba1c035b06017b0b0bd1c712669646e4f3765ab

                            SHA256

                            57e9675902b443085e37ead57dfed97de6bb61321682bc93aff30f16b5ca5aeb

                            SHA512

                            02e3db343037294fd3b774f954c9a617a50715e6b89d7c409f3c7dc5a1cf5ed9418158c442e9e80111994da139a9a16db33ac68a833d6d115c4a41bdf75751ac

                          • C:\Users\Admin\AppData\Local\Temp\8498669c

                            Filesize

                            2.8MB

                            MD5

                            9f2b0e4d218442927581577f52997f8d

                            SHA1

                            ab74e08d3a230260a545036c4ab423db1e4746e8

                            SHA256

                            47d20fa8d26cd6659bdcd45bce3a2666706d1e0b52b69ee023b58ac7e61bd936

                            SHA512

                            4f7db2f85793056884876be3506710833c2bed20b0fb0d13db0e347f28b4935fa20b1d5968b63f9877ea473aed6c8bf28dc91af0cacaeee43d63f31a87e44e8b

                          • C:\Users\Admin\AppData\Local\Temp\882c7176

                            Filesize

                            2.7MB

                            MD5

                            d1dab07d2c116df6e67a733a83ef9921

                            SHA1

                            fe5cc3f89fcb77eb0bb863a70c43d443bc350dfe

                            SHA256

                            792400d38569dc7a5c7d1506e8c3a873f950766ae6ff1fd01fe0c8ec0b520faf

                            SHA512

                            9220ae804eac81970868cc42e7733f6e8d9caa313959811298a0cf979ba34e0452e62c4b4b123def41b6600832d050b7416d7ba558afdf5797e6f3d27e771997

                          • C:\Users\Admin\AppData\Local\Temp\882c7176

                            Filesize

                            2.7MB

                            MD5

                            c417e90440bf67a31793d2b8c39c3eee

                            SHA1

                            b425307049d99f925a953c19197aa1427092d5a8

                            SHA256

                            26fe00aebb7e592e584e1258f7348ebf2795f6d3b3f0e13adf321f32c817616b

                            SHA512

                            c9af36f15856920aa2dc2a51e2185fbb639ceb2e31b5f8db82c4327b32520fa1cec761ec79203bfdf7e05441e6506430aaee42552f6032a05a32faef98e9cce5

                          • C:\Users\Admin\AppData\Local\nimdA\llg\background.js

                            Filesize

                            596B

                            MD5

                            aa0e77ec6b92f58452bb5577b9980e6f

                            SHA1

                            237872f2b0c90e8cbe61eaa0e2919d6578cacd3f

                            SHA256

                            aad1c9be17f64d7700feb2d38df7dc7446a48bf001ae42095b59b11fd24dfcde

                            SHA512

                            37366bd1e0a59036fe966f2e2fe3a0f7dce6f11f2ed5bf7724afb61ea5e8d3e01bdc514f0deb3beb6febfd8b4d08d45e4e729c23cc8f4cae4f6d11f18fc39fa6

                          • C:\Users\Admin\AppData\Local\nimdA\llg\content.js

                            Filesize

                            1KB

                            MD5

                            345243667b140f7277bccedad366974e

                            SHA1

                            5a7bb014308a5950c2dee904b2cb96c518b34272

                            SHA256

                            da0ef8db0d713de9201e499707b74e22ab9d1eb7827a275461bdaeba893cc858

                            SHA512

                            8d9ed0d4d8c7383ef1a74ad64eb8ece41794eb7f93cc1224f2a0939820c0a4caf88ec891e7a350d7a74302caa3547b800b7fbb3193e63828b404862ebad80302

                          • C:\Users\Admin\AppData\Local\nimdA\llg\icon.png

                            Filesize

                            5KB

                            MD5

                            2c905a6e4a21a3fa14adc1d99b7cbc03

                            SHA1

                            bd8682b580d951e3df05dfd467abba6b87bb43d9

                            SHA256

                            cc3631ced23f21ae095c1397770e685f12f6ad788c8fa2f15487835a77a380fb

                            SHA512

                            753e28bab9d50b7882a1308f6072f80fda99edeaa476fafc7e647d29f5c9c15f5c404689c866f8f198b7f1ed41bae3cc55ae4d15528b0df966a47cbc4b31caf6

                          • C:\Users\Admin\AppData\Local\nimdA\llg\jquery.js

                            Filesize

                            93KB

                            MD5

                            3c9137d88a00b1ae0b41ff6a70571615

                            SHA1

                            1797d73e9da4287351f6fbec1b183c19be217c2a

                            SHA256

                            24262baafef17092927c3dafe764aaa52a2a371b83ed2249cca7e414df99fac1

                            SHA512

                            31730738e73937ee0086849cb3d6506ea383ca2eac312b8d08e25c60563df5702fc2b92b3778c4b2b66e7fddd6965d74b5a4df5132df3f02faed01dcf3c7bcae

                          • C:\Users\Admin\AppData\Local\nimdA\llg\manifest.json

                            Filesize

                            569B

                            MD5

                            2835dd0a0aef8405d47ab7f73d82eaa5

                            SHA1

                            851ea2b4f89fc06f6a4cd458840dd5c660a3b76c

                            SHA256

                            2aafd1356d876255a99905fbcafb516de31952e079923b9ddf33560bbe5ed2f3

                            SHA512

                            490327e218b0c01239ac419e02a4dc2bd121a08cb7734f8e2ba22e869b60175d599104ba4b45ef580e84e312fe241b3d565fac958b874d6256473c2f987108cc

                          • C:\Windows\Installer\MSIC1AA.tmp

                            Filesize

                            386KB

                            MD5

                            72b1c6699ddc2baab105d32761285df2

                            SHA1

                            fc85e9fb190f205e6752624a5231515c4ee4e155

                            SHA256

                            bf7f6f7e527ab8617766bb7a21c21b2895b5275c0e808756c2aadcd66eff8a97

                            SHA512

                            cde1e754d8dfb2fa55db243517b5dd3d75b209ea6387ef2e4be6157875e536db2373f23434a9e66c119150301c7b7cdf97de5a5544d94c03247b4ae716cbc170

                          • C:\Windows\Installer\e57c16b.msi

                            Filesize

                            4.7MB

                            MD5

                            ecdd7739e76adee32b9cd61f4a132963

                            SHA1

                            14e5ec6b9c6bdaab641009284e2f41067462bf21

                            SHA256

                            59baa105734ae018e88a3abeee22657b083d2aaddf1c73e5564bf21382e5fa16

                            SHA512

                            91526118167315f2258c1d4e7f2b1d68f8cd7865b8bedafdb1864a4d2084ba8312124aefacc9402a38dd47474e9aabe7ce988c18bfdef9ced275920bf376c229

                          • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

                            Filesize

                            24.1MB

                            MD5

                            01c77d21293d1184d0945e17a1a2f111

                            SHA1

                            ecda24402f8f74a87fffe5b52e69d58be1bd23c4

                            SHA256

                            38400d496934ada8fdc3ccf95120a39ca3a1a94720e44256dfacb653b451eb52

                            SHA512

                            fe9b75ea544275fe4408eaec6c871902bd6083829e9fb16e96972d2245b64225efffdbba47c53fb0d27f8596026a2a76add7a8bad1e0a318428c53c6dda3c86b

                          • \??\Volume{2c2b4495-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{0e8de5b7-9066-4bd9-a2e2-60fea036eb37}_OnDiskSnapshotProp

                            Filesize

                            6KB

                            MD5

                            27d67eaddcffaa31863c1335b0524b50

                            SHA1

                            320fc9c91dba50483f7446616d39b3424cb3fb2c

                            SHA256

                            13b45b647181c5c6ef8ba45be4fd4f2d863b8bbe5974abc3919ae9ca155a70e8

                            SHA512

                            d148d17465b3faabcf928e40759d8f5b9f0df35ca828eaa0412da4e4744afe4e8a7f6d03b627aa137b7e988a011370145ca7d1412ec25ccc3ded060f37ab7ae6

                          • memory/4052-56-0x0000000074CE0000-0x0000000074D2F000-memory.dmp

                            Filesize

                            316KB

                          • memory/4052-50-0x00007FF987C30000-0x00007FF987E25000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/4052-49-0x0000000074CE0000-0x0000000074D2F000-memory.dmp

                            Filesize

                            316KB

                          • memory/4052-42-0x0000000000110000-0x0000000000589000-memory.dmp

                            Filesize

                            4.5MB

                          • memory/4084-78-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-1407-0x0000000007800000-0x0000000007854000-memory.dmp

                            Filesize

                            336KB

                          • memory/4084-106-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-104-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-102-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-100-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-96-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-92-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-90-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-88-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-86-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-110-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-74-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-72-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-70-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-112-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-98-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-94-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-80-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-76-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-68-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-67-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-1404-0x0000000006D20000-0x0000000006DE8000-memory.dmp

                            Filesize

                            800KB

                          • memory/4084-1405-0x0000000006F40000-0x0000000007006000-memory.dmp

                            Filesize

                            792KB

                          • memory/4084-1406-0x0000000006C40000-0x0000000006C8C000-memory.dmp

                            Filesize

                            304KB

                          • memory/4084-108-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-57-0x0000000074850000-0x0000000074AE1000-memory.dmp

                            Filesize

                            2.6MB

                          • memory/4084-59-0x0000000001110000-0x00000000012E2000-memory.dmp

                            Filesize

                            1.8MB

                          • memory/4084-63-0x0000000006270000-0x000000000640C000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/4084-114-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-64-0x0000000006940000-0x0000000006AB0000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-65-0x0000000007060000-0x0000000007604000-memory.dmp

                            Filesize

                            5.6MB

                          • memory/4084-66-0x0000000006B90000-0x0000000006C22000-memory.dmp

                            Filesize

                            584KB

                          • memory/4084-84-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-82-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-118-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-122-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-116-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4084-120-0x0000000006940000-0x0000000006AAB000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/5876-1440-0x00000000065A0000-0x00000000065DC000-memory.dmp

                            Filesize

                            240KB

                          • memory/5876-1439-0x0000000006540000-0x0000000006552000-memory.dmp

                            Filesize

                            72KB

                          • memory/5876-1436-0x0000000007E80000-0x0000000007E8A000-memory.dmp

                            Filesize

                            40KB

                          • memory/5876-1430-0x0000000006960000-0x00000000069C6000-memory.dmp

                            Filesize

                            408KB

                          • memory/5876-1429-0x0000000006880000-0x000000000689E000-memory.dmp

                            Filesize

                            120KB

                          • memory/5876-1428-0x0000000006C80000-0x00000000071AC000-memory.dmp

                            Filesize

                            5.2MB

                          • memory/5876-1427-0x00000000066D0000-0x0000000006746000-memory.dmp

                            Filesize

                            472KB

                          • memory/5876-1419-0x0000000005380000-0x0000000005542000-memory.dmp

                            Filesize

                            1.8MB

                          • memory/5876-1418-0x00000000050C0000-0x0000000005110000-memory.dmp

                            Filesize

                            320KB

                          • memory/5876-1417-0x0000000000400000-0x00000000004D4000-memory.dmp

                            Filesize

                            848KB