Malware Analysis Report

2025-08-10 20:05

Sample ID 250704-pcfbmshk7w
Target 2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rhadamanthys_smoke-loader_stop
SHA256 341546d09a1e6bb9645d22fcdf85b0c3be08c4a4a0391de589c12d404750ab79
Tags
discovery persistence spyware stealer
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V16

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

341546d09a1e6bb9645d22fcdf85b0c3be08c4a4a0391de589c12d404750ab79

Threat Level: Shows suspicious behavior

The file 2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rhadamanthys_smoke-loader_stop was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery persistence spyware stealer

Executes dropped EXE

Reads user/profile data of web browsers

Adds Run key to start application

Drops autorun.inf file

Drops file in System32 directory

Drops file in Program Files directory

Unsigned PE

System Location Discovery: System Language Discovery

NTFS ADS

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-07-04 12:10

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-07-04 12:10

Reported

2025-07-04 12:13

Platform

win10v2004-20250610-en

Max time kernel

127s

Max time network

146s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\905c0769f9a06c95a24ddf945\patcher.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" C:\905c0769f9a06c95a24ddf945\patcher.exe N/A

Drops autorun.inf file

Description Indicator Process Target
File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File opened for modification C:\Windows\SysWOW64\:\autorun.inf C:\905c0769f9a06c95a24ddf945\patcher.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\:\autorun.inf C:\905c0769f9a06c95a24ddf945\patcher.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\VPREVIEW.EXE C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\dbcicons.exe C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File created C:\Program Files\Google\Chrome\Application\chrome_proxy.exe C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File created C:\Program Files\Microsoft Office\root\Office16\SELFCERT.EXE C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\outicon.exe C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\pubs.exe C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\sscicons.exe C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe$ C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe$ C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File created C:\Program Files\Java\jdk-1.8\bin\javap.exe C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe$ C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SPREADSHEETCOMPARE.EXE$ C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File created C:\Program Files\Microsoft Office\root\Office16\MSOSREC.EXE C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File opened for modification C:\Program Files\Windows Media Player\wmlaunch.exe C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File opened for modification C:\Program Files (x86)\Google\GoogleUpdater\134.0.6985.0\disabledupdater.exe$ C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File created C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\elevation_service.exe C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File created C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe$ C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\BHO\ie_to_edge_stub.exe C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File created C:\Program Files\Java\jdk-1.8\bin\javaws.exe C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\SETLANG.EXE C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File opened for modification C:\Program Files\Windows Mail\wabmig.exe C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\MicrosoftEdgeUpdateOnDemand.exe C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\SkypeSrv\SKYPESERVER.EXE$ C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\msedge_proxy.exe C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\notification_helper.exe C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File opened for modification C:\Program Files\Windows Media Player\wmplayer.exe C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe$ C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File created C:\Program Files\Java\jdk-1.8\bin\extcheck.exe C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\WORDICON.EXE C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\pptico.exe C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe$ C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe$ C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe$ C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File created C:\Program Files\Java\jdk-1.8\bin\rmic.exe C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File created C:\Program Files\Mozilla Firefox\nmhproxy.exe C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe$ C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe$ C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-0C0A-1000-0000000FF1CE}\misc.exe$ C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File created C:\Program Files\Java\jdk-1.8\bin\klist.exe C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File opened for modification C:\Program Files\Windows Media Player\wmpconfig.exe C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\PilotshubApp.exe C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File created C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File created C:\Program Files\Microsoft Office\root\Office16\POWERPNT.EXE C:\905c0769f9a06c95a24ddf945\patcher.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\GetHelp.exe C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\CLVIEW.EXE$ C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\905c0769f9a06c95a24ddf945\patcher.exe N/A

NTFS ADS

Description Indicator Process Target
File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 5784 wrote to memory of 4492 N/A C:\Windows\system32\cmd.exe C:\905c0769f9a06c95a24ddf945\patcher.exe
PID 5784 wrote to memory of 4492 N/A C:\Windows\system32\cmd.exe C:\905c0769f9a06c95a24ddf945\patcher.exe
PID 5784 wrote to memory of 4492 N/A C:\Windows\system32\cmd.exe C:\905c0769f9a06c95a24ddf945\patcher.exe

Processes

C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe

"C:\Users\Admin\AppData\Local\Temp\2025-07-04_43b4206a450ae2e6ca31f8cfc092e469_amadey_black-basta_darkgate_elex_hawkeye_luca-stealer_rh.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c C:\905c0769f9a06c95a24ddf945\patcher.exe

C:\905c0769f9a06c95a24ddf945\patcher.exe

C:\905c0769f9a06c95a24ddf945\patcher.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 150.171.27.10:443 g.bing.com tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.180.3:80 c.pki.goog tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp

Files

memory/5484-0-0x0000000000400000-0x000000000040D000-memory.dmp

C:\905c0769f9a06c95a24ddf945\patcher.exe

MD5 43b4206a450ae2e6ca31f8cfc092e469
SHA1 686b1d9f5eddf3cb42e6aaef8d8dbfb7f5426be9
SHA256 341546d09a1e6bb9645d22fcdf85b0c3be08c4a4a0391de589c12d404750ab79
SHA512 6d6e494e34ac264fe1e88caaf9b5968a6466e6c43af434e6b1cda0ef60563b7a027d021d4e388e744bf94088fbfe33e93650062d0fb2f9421e0477019eb50a29

C:\Program Files\7-Zip\7z.exe

MD5 6e2cef7a7443fee3b865d443bd9b3afb
SHA1 ac017ea8f9c2c3bda53f2471e717d260bed98783
SHA256 3e51aa0301b4422cd009396f1ab93eac50e849db127e3142fe58aa46dc1a4102
SHA512 b73c9c8a5ac452a05156e45ffead3ba50f96aad7bcda5992b3f00d7e219ae678ad1f01aedb5c4622e02ce71287a12fb4f950ed329a08dc4c2a5195ec22fd8f82

C:\Program Files\Google\Chrome\Application\chrome_proxy.exe

MD5 170690e6614c59b6e2ee93097d7cc7dc
SHA1 f1e30c7245248185b1b627d64c9d4a32943a925e
SHA256 f3f1de804931989e8bf2e1b812a9e37566c2ed603e93df96e23434bee8403989
SHA512 f6d0475d7f6a7db35fbf0086394b8cff4d0803091ddfcf01889139c562f15c06378d4e830f0742f192db265ad6d23f5c52203fbdc14301e03437c1594a9fddf7

C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\ohub32.exe

MD5 e10aa649adda15d923df0fd7e2a73490
SHA1 99d66999e594f32e496e79b3d2554e0f971b44e8
SHA256 476da456fee5e0ac30e39ae6d47b5ba02d74b026559329fb6f33431efb4650c3
SHA512 8a6431b557449c01f7d4eada3ee9d0fad1343389333ae78cbaddd58f779bc3aaf6a674668b7bc704492618ec3d163707d5909b4fc57fc97076eac1943e1375d7

C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\osmadminicon.exe

MD5 d8ebcc90d830ef7b1983934b859060ab
SHA1 44fd131754b985f6d02eb87ebed23b2dd9ed1526
SHA256 15785edf1450d18acb6f24f8f495213f1a824f3c3588ab446baf2602a69402f4
SHA512 8989d8e406ee8cc43f2c12a571418265f7026e3c8a3846133535d67addf2dedb9e4a1092b500c7f66c6ea359a0da1f432a12f48139b7bf9e1251168a301930a6

memory/5484-1571-0x0000000000400000-0x000000000040D000-memory.dmp

memory/4492-1572-0x0000000000400000-0x000000000040D000-memory.dmp

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe$

MD5 dfc66a5fd14d92dc07cb066226df197e
SHA1 3774b7eb10194688b8f8e061a201de995e0fe74c
SHA256 555a24ddd523c13b09d58418b7ebf157b3569bd09d2a72d5b9916278d2d3d006
SHA512 da5ef7a0f235ce38d80b92c2711e61f646ffe899b53b3802900beb4441073350b36d7f34ca198bdab683f2c4bfd0c70c5253d46c25ede4f18d742c7540752856

C:\Program Files (x86)\Google\GoogleUpdater\134.0.6985.0\disabledupdater.exe$

MD5 e6644a495e91294b0e32e4f04cc911e7
SHA1 20c0f56b6adbebf55a149d63374480ae997fd5f5
SHA256 84f799a7a638df3413d1cbd3fd0d58e458a493942243c2b3df6aaf26a0839a6a
SHA512 ba8a9f3e7f14364cc7640893eeb8f858f0ae5f21ed843a8182a2c4dc4968e2621294004b43586802e6df7164abad14d46dc4f10c5f1d382dc9563ea5ff454884

C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\notification_click_helper.exe

MD5 e66ab12ba339069d20139e481ee0b2e4
SHA1 d6cf7299a0c94527fa118b48efc58a67cececcf7
SHA256 5219b2b8af8593aa14a20eb224c5083c60982f3143882f62a6e32dd0ca106737
SHA512 bb6247915d1592f9177403fa86e116b2ff834494947275198ac29777c3fd1bd3bea2929873d32071f29473cebc245534b8354515fcd6975b1106c676d55ffabc

C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDriveStandaloneUpdater.exe

MD5 e88acb1dc6cab8323ee168b92850b66d
SHA1 7519df4a502d9fb4dc0b9fd656740dccabad8ea2
SHA256 7d985a87e7db0a63f073df1fc609c5ca332ef0d514933796dc0b07eb96aae6c1
SHA512 8b929ce71309a98751115216e2466fbd340b5486a226973f4e8b6430e304cd29f60f216dc6be49364534a9c9855d796ffdafd110590194c50128c7d7bcca5956