Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

10/12/2022, 10:44

221210-mta25sab8x 10

09/12/2022, 20:12

221209-yza5waha7v 10

04/12/2022, 13:12

221204-qfsa2sbh74 10

01/12/2022, 14:04

221201-rda5esef46 10

30/11/2022, 14:19

221130-rms2lagf28 10

29/11/2022, 15:31

221129-syd79afa3z 10

29/11/2022, 09:15

221129-k73m7shf6s 10

29/11/2022, 09:08

221129-k31caahc7x 10

Analysis

  • max time kernel
    1859s
  • max time network
    1849s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 13:12

General

  • Target

    ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe

  • Size

    146KB

  • MD5

    2c6e6e290972fcd5e556efccfd51f174

  • SHA1

    ec3de0785e4ccd0282e92e35c915ddb72832fd83

  • SHA256

    ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e

  • SHA512

    a7077bf87ad233413322dd55d4c1ed684d5ebd70e9451307d9f70ba1888688fa5b375a6006803da9e9cc800be7bc928230ad26a889e88c907854a8bc73ad539f

  • SSDEEP

    1536:KQsw8LQ+Z9DjjSD60zzeE2G95Vz6B6yRTj9AU44YxSs2gdIuV8Vm3PkO0v0RDQBK:KjiSd/LHG9516B6cv44WdX80/VDmGp

Malware Config

Extracted

Path

C:\_readme.txt

Family

djvu

Ransom Note
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-5UcwRdS3ED Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0611djfsieEzyLgcsh7AtBZ4UXI56nqwQltkzjkfNYsUiDJjQLL
URLs

https://we.tl/t-5UcwRdS3ED

Extracted

Family

djvu

C2

http://fresherlights.com/lancer/get.php

Attributes
  • extension

    .uyit

  • offline_id

    HtkmULXEgJoZa495hFUJlvKCD0OwnxklbkoITjt1

  • payload_url

    http://uaery.top/dl/build2.exe

    http://fresherlights.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-5UcwRdS3ED Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0611djfsieE

rsa_pubkey.plain

Extracted

Family

vidar

Version

56

Botnet

517

C2

https://t.me/asifrazatg

https://steamcommunity.com/profiles/76561199439929669

Attributes
  • profile_id

    517

Signatures

  • DcRat 4 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detected Djvu ransomware 10 IoCs
  • Detects Smokeloader packer 5 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 31 IoCs
  • Modifies extensions of user files 5 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 10 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 27 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 12 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: MapViewOfSection 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • DcRat
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4260
  • C:\Users\Admin\AppData\Local\Temp\ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe
    "C:\Users\Admin\AppData\Local\Temp\ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1848
  • C:\Users\Admin\AppData\Roaming\bdisagw
    C:\Users\Admin\AppData\Roaming\bdisagw
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:4604
  • C:\Users\Admin\AppData\Local\Temp\D74B.exe
    C:\Users\Admin\AppData\Local\Temp\D74B.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1004
    • C:\Users\Admin\AppData\Local\Temp\D74B.exe
      C:\Users\Admin\AppData\Local\Temp\D74B.exe
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Checks computer location settings
      • Drops Chrome extension
      PID:4984
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://search-spd.com/reginst/prg/914fb86c/102/0/"
        3⤵
        • Adds Run key to start application
        • Enumerates system info in registry
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        PID:4320
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xf8,0x108,0x7ff85ebb46f8,0x7ff85ebb4708,0x7ff85ebb4718
          4⤵
            PID:4324
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,6327367483481554423,14728848738411158332,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:2
            4⤵
              PID:4852
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,6327367483481554423,14728848738411158332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:3
              4⤵
                PID:4212
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,6327367483481554423,14728848738411158332,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:8
                4⤵
                  PID:4168
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6327367483481554423,14728848738411158332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
                  4⤵
                    PID:4772
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6327367483481554423,14728848738411158332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:1
                    4⤵
                      PID:4964
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2100,6327367483481554423,14728848738411158332,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5188 /prefetch:8
                      4⤵
                        PID:5052
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,6327367483481554423,14728848738411158332,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2792 /prefetch:2
                        4⤵
                          PID:804
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2100,6327367483481554423,14728848738411158332,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4484 /prefetch:8
                          4⤵
                            PID:4932
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6327367483481554423,14728848738411158332,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:1
                            4⤵
                              PID:2848
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6327367483481554423,14728848738411158332,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:1
                              4⤵
                                PID:4896
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6327367483481554423,14728848738411158332,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2592 /prefetch:1
                                4⤵
                                  PID:1044
                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,6327367483481554423,14728848738411158332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6768 /prefetch:8
                                  4⤵
                                    PID:3660
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                                    4⤵
                                    • Drops file in Program Files directory
                                    PID:3592
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff6d9c65460,0x7ff6d9c65470,0x7ff6d9c65480
                                      5⤵
                                        PID:368
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,6327367483481554423,14728848738411158332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6768 /prefetch:8
                                      4⤵
                                        PID:3764
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2100,6327367483481554423,14728848738411158332,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6856 /prefetch:8
                                        4⤵
                                          PID:4760
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2100,6327367483481554423,14728848738411158332,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6676 /prefetch:8
                                          4⤵
                                            PID:4740
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2100,6327367483481554423,14728848738411158332,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6628 /prefetch:8
                                            4⤵
                                              PID:3452
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://search-spd.com/reginst/prg/914fb86c/102/0/"
                                            3⤵
                                            • Enumerates system info in registry
                                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                            PID:4180
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff862954f50,0x7ff862954f60,0x7ff862954f70
                                              4⤵
                                                PID:4244
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1648,16114020761271543817,8254082769270773799,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2020 /prefetch:8
                                                4⤵
                                                  PID:420
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1648,16114020761271543817,8254082769270773799,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1660 /prefetch:2
                                                  4⤵
                                                    PID:4976
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1648,16114020761271543817,8254082769270773799,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 /prefetch:8
                                                    4⤵
                                                      PID:3576
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,16114020761271543817,8254082769270773799,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2960 /prefetch:1
                                                      4⤵
                                                        PID:5012
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,16114020761271543817,8254082769270773799,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2940 /prefetch:1
                                                        4⤵
                                                          PID:4520
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,16114020761271543817,8254082769270773799,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1112 /prefetch:1
                                                          4⤵
                                                            PID:3732
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1648,16114020761271543817,8254082769270773799,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 /prefetch:8
                                                            4⤵
                                                              PID:1628
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1648,16114020761271543817,8254082769270773799,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3748 /prefetch:8
                                                              4⤵
                                                                PID:1200
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,16114020761271543817,8254082769270773799,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:1
                                                                4⤵
                                                                  PID:180
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,16114020761271543817,8254082769270773799,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3104 /prefetch:1
                                                                  4⤵
                                                                    PID:4340
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,16114020761271543817,8254082769270773799,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:1
                                                                    4⤵
                                                                      PID:4584
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1648,16114020761271543817,8254082769270773799,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4692 /prefetch:8
                                                                      4⤵
                                                                        PID:4484
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1648,16114020761271543817,8254082769270773799,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4636 /prefetch:2
                                                                        4⤵
                                                                          PID:3844
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1648,16114020761271543817,8254082769270773799,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4452 /prefetch:8
                                                                          4⤵
                                                                            PID:4588
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1648,16114020761271543817,8254082769270773799,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1552 /prefetch:8
                                                                            4⤵
                                                                              PID:2224
                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1648,16114020761271543817,8254082769270773799,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3744 /prefetch:8
                                                                              4⤵
                                                                                PID:5112
                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\107.294.200\software_reporter_tool.exe
                                                                                "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\107.294.200\software_reporter_tool.exe" --engine=2 --scan-locations=1,2,3,4,5,6,7,8,10 --disabled-locations=9,11 --session-id=qIOIsgOlfkIap2UZus4h5Y0Ad2bnUi5TyMHTBZ25 --registry-suffix=ESET --enable-crash-reporting --srt-field-trial-group-name=Off
                                                                                4⤵
                                                                                • Executes dropped EXE
                                                                                PID:3916
                                                                                • \??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\107.294.200\software_reporter_tool.exe
                                                                                  "c:\users\admin\appdata\local\google\chrome\user data\swreporter\107.294.200\software_reporter_tool.exe" --crash-handler "--database=c:\users\admin\appdata\local\Google\Software Reporter Tool" --url=https://clients2.google.com/cr/report --annotation=plat=Win32 --annotation=prod=ChromeFoil --annotation=ver=107.294.200 --initial-client-data=0x278,0x27c,0x280,0x254,0x284,0x7ff69a375960,0x7ff69a375970,0x7ff69a375980
                                                                                  5⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:2448
                                                                                • \??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\107.294.200\software_reporter_tool.exe
                                                                                  "c:\users\admin\appdata\local\google\chrome\user data\swreporter\107.294.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_3916_FXDNUCJJEENXWHAP" --sandboxed-process-id=2 --init-done-notifier=752 --sandbox-mojo-pipe-token=11087387539204517922 --mojo-platform-channel-handle=728 --engine=2
                                                                                  5⤵
                                                                                  • Executes dropped EXE
                                                                                  • Loads dropped DLL
                                                                                  PID:3676
                                                                                • \??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\107.294.200\software_reporter_tool.exe
                                                                                  "c:\users\admin\appdata\local\google\chrome\user data\swreporter\107.294.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_3916_FXDNUCJJEENXWHAP" --sandboxed-process-id=3 --init-done-notifier=992 --sandbox-mojo-pipe-token=2567805312870703634 --mojo-platform-channel-handle=988
                                                                                  5⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:2624
                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1648,16114020761271543817,8254082769270773799,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3076 /prefetch:8
                                                                                4⤵
                                                                                  PID:4684
                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1648,16114020761271543817,8254082769270773799,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:8
                                                                                  4⤵
                                                                                    PID:1704
                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,16114020761271543817,8254082769270773799,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3748 /prefetch:1
                                                                                    4⤵
                                                                                      PID:4468
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1648,16114020761271543817,8254082769270773799,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3592 /prefetch:8
                                                                                      4⤵
                                                                                        PID:3148
                                                                                • C:\Users\Admin\AppData\Local\Temp\DDC4.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\DDC4.exe
                                                                                  1⤵
                                                                                  • Executes dropped EXE
                                                                                  • Checks SCSI registry key(s)
                                                                                  • Suspicious behavior: MapViewOfSection
                                                                                  PID:3796
                                                                                • C:\Users\Admin\AppData\Local\Temp\E0D2.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\E0D2.exe
                                                                                  1⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:3124
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 340
                                                                                    2⤵
                                                                                    • Program crash
                                                                                    PID:3956
                                                                                • C:\Users\Admin\AppData\Local\Temp\E45D.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\E45D.exe
                                                                                  1⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:2972
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 340
                                                                                    2⤵
                                                                                    • Program crash
                                                                                    PID:2532
                                                                                • C:\Users\Admin\AppData\Local\Temp\E895.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\E895.exe
                                                                                  1⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of SetThreadContext
                                                                                  • Suspicious use of WriteProcessMemory
                                                                                  PID:3420
                                                                                  • C:\Users\Admin\AppData\Local\Temp\E895.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\E895.exe
                                                                                    2⤵
                                                                                    • DcRat
                                                                                    • Executes dropped EXE
                                                                                    • Checks computer location settings
                                                                                    • Adds Run key to start application
                                                                                    PID:3484
                                                                                    • C:\Windows\SysWOW64\icacls.exe
                                                                                      icacls "C:\Users\Admin\AppData\Local\49fae39c-fadd-4617-9b37-d031083b863d" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                                                                                      3⤵
                                                                                      • Modifies file permissions
                                                                                      PID:3940
                                                                                    • C:\Users\Admin\AppData\Local\Temp\E895.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\E895.exe" --Admin IsNotAutoStart IsNotTask
                                                                                      3⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of SetThreadContext
                                                                                      PID:4368
                                                                                      • C:\Users\Admin\AppData\Local\Temp\E895.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\E895.exe" --Admin IsNotAutoStart IsNotTask
                                                                                        4⤵
                                                                                        • Executes dropped EXE
                                                                                        • Modifies extensions of user files
                                                                                        • Checks computer location settings
                                                                                        PID:424
                                                                                        • C:\Users\Admin\AppData\Local\985194c7-f264-4e00-bd8b-44ce3a1a610d\build2.exe
                                                                                          "C:\Users\Admin\AppData\Local\985194c7-f264-4e00-bd8b-44ce3a1a610d\build2.exe"
                                                                                          5⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of SetThreadContext
                                                                                          PID:660
                                                                                          • C:\Users\Admin\AppData\Local\985194c7-f264-4e00-bd8b-44ce3a1a610d\build2.exe
                                                                                            "C:\Users\Admin\AppData\Local\985194c7-f264-4e00-bd8b-44ce3a1a610d\build2.exe"
                                                                                            6⤵
                                                                                            • Executes dropped EXE
                                                                                            • Checks computer location settings
                                                                                            • Loads dropped DLL
                                                                                            • Checks processor information in registry
                                                                                            PID:3704
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\985194c7-f264-4e00-bd8b-44ce3a1a610d\build2.exe" & exit
                                                                                              7⤵
                                                                                                PID:1104
                                                                                                • C:\Windows\SysWOW64\timeout.exe
                                                                                                  timeout /t 6
                                                                                                  8⤵
                                                                                                  • Delays execution with timeout.exe
                                                                                                  PID:2188
                                                                                          • C:\Users\Admin\AppData\Local\985194c7-f264-4e00-bd8b-44ce3a1a610d\build3.exe
                                                                                            "C:\Users\Admin\AppData\Local\985194c7-f264-4e00-bd8b-44ce3a1a610d\build3.exe"
                                                                                            5⤵
                                                                                            • Executes dropped EXE
                                                                                            PID:2508
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                                                                                              6⤵
                                                                                              • DcRat
                                                                                              • Creates scheduled task(s)
                                                                                              PID:4200
                                                                                  • C:\Windows\system32\regsvr32.exe
                                                                                    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\164D.dll
                                                                                    1⤵
                                                                                    • Suspicious use of WriteProcessMemory
                                                                                    PID:4920
                                                                                    • C:\Windows\SysWOW64\regsvr32.exe
                                                                                      /s C:\Users\Admin\AppData\Local\Temp\164D.dll
                                                                                      2⤵
                                                                                      • Loads dropped DLL
                                                                                      PID:2508
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2972 -ip 2972
                                                                                    1⤵
                                                                                      PID:4816
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3124 -ip 3124
                                                                                      1⤵
                                                                                        PID:4228
                                                                                      • C:\Users\Admin\AppData\Local\Temp\1A16.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\1A16.exe
                                                                                        1⤵
                                                                                        • Executes dropped EXE
                                                                                        • Checks SCSI registry key(s)
                                                                                        • Suspicious behavior: MapViewOfSection
                                                                                        PID:1184
                                                                                      • C:\Users\Admin\AppData\Local\Temp\4FFC.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\4FFC.exe
                                                                                        1⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:2568
                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 340
                                                                                          2⤵
                                                                                          • Program crash
                                                                                          PID:3764
                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2568 -ip 2568
                                                                                        1⤵
                                                                                          PID:3812
                                                                                        • C:\Users\Admin\AppData\Local\Temp\6A5B.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\6A5B.exe
                                                                                          1⤵
                                                                                          • Executes dropped EXE
                                                                                          • Checks SCSI registry key(s)
                                                                                          • Suspicious behavior: MapViewOfSection
                                                                                          PID:2244
                                                                                        • C:\Users\Admin\AppData\Local\Temp\6EF0.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\6EF0.exe
                                                                                          1⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:1680
                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 340
                                                                                            2⤵
                                                                                            • Program crash
                                                                                            PID:3284
                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1680 -ip 1680
                                                                                          1⤵
                                                                                            PID:3972
                                                                                          • C:\Windows\SysWOW64\explorer.exe
                                                                                            C:\Windows\SysWOW64\explorer.exe
                                                                                            1⤵
                                                                                            • Accesses Microsoft Outlook profiles
                                                                                            • outlook_office_path
                                                                                            • outlook_win_path
                                                                                            PID:1928
                                                                                          • C:\Windows\explorer.exe
                                                                                            C:\Windows\explorer.exe
                                                                                            1⤵
                                                                                              PID:448
                                                                                            • C:\Windows\System32\CompPkgSrv.exe
                                                                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                              1⤵
                                                                                                PID:1120
                                                                                              • C:\Windows\System32\CompPkgSrv.exe
                                                                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                1⤵
                                                                                                  PID:2872
                                                                                                • C:\Users\Admin\AppData\Local\Temp\9773.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\9773.exe
                                                                                                  1⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of SetThreadContext
                                                                                                  PID:2408
                                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                                                                                                    2⤵
                                                                                                      PID:3868
                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 436
                                                                                                      2⤵
                                                                                                      • Program crash
                                                                                                      PID:976
                                                                                                  • C:\Windows\SysWOW64\explorer.exe
                                                                                                    C:\Windows\SysWOW64\explorer.exe
                                                                                                    1⤵
                                                                                                      PID:1284
                                                                                                    • C:\Windows\explorer.exe
                                                                                                      C:\Windows\explorer.exe
                                                                                                      1⤵
                                                                                                      • Suspicious behavior: MapViewOfSection
                                                                                                      PID:2000
                                                                                                    • C:\Windows\SysWOW64\explorer.exe
                                                                                                      C:\Windows\SysWOW64\explorer.exe
                                                                                                      1⤵
                                                                                                        PID:3124
                                                                                                      • C:\Windows\explorer.exe
                                                                                                        C:\Windows\explorer.exe
                                                                                                        1⤵
                                                                                                        • Suspicious behavior: MapViewOfSection
                                                                                                        PID:3104
                                                                                                      • C:\Windows\SysWOW64\explorer.exe
                                                                                                        C:\Windows\SysWOW64\explorer.exe
                                                                                                        1⤵
                                                                                                          PID:2552
                                                                                                        • C:\Windows\SysWOW64\explorer.exe
                                                                                                          C:\Windows\SysWOW64\explorer.exe
                                                                                                          1⤵
                                                                                                            PID:448
                                                                                                          • C:\Windows\SysWOW64\explorer.exe
                                                                                                            C:\Windows\SysWOW64\explorer.exe
                                                                                                            1⤵
                                                                                                              PID:2076
                                                                                                            • C:\Windows\explorer.exe
                                                                                                              C:\Windows\explorer.exe
                                                                                                              1⤵
                                                                                                                PID:2532
                                                                                                              • C:\Windows\SysWOW64\explorer.exe
                                                                                                                C:\Windows\SysWOW64\explorer.exe
                                                                                                                1⤵
                                                                                                                  PID:1588
                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2408 -ip 2408
                                                                                                                  1⤵
                                                                                                                    PID:5000
                                                                                                                  • C:\Users\Admin\AppData\Roaming\bdisagw
                                                                                                                    C:\Users\Admin\AppData\Roaming\bdisagw
                                                                                                                    1⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Checks SCSI registry key(s)
                                                                                                                    PID:3920
                                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                                                                                    C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                                                                                    1⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    PID:4764
                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                      /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                                                                                                                      2⤵
                                                                                                                      • DcRat
                                                                                                                      • Creates scheduled task(s)
                                                                                                                      PID:3656
                                                                                                                  • C:\Users\Admin\AppData\Roaming\faisagw
                                                                                                                    C:\Users\Admin\AppData\Roaming\faisagw
                                                                                                                    1⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Checks SCSI registry key(s)
                                                                                                                    PID:1564
                                                                                                                  • C:\Users\Admin\AppData\Roaming\tjisagw
                                                                                                                    C:\Users\Admin\AppData\Roaming\tjisagw
                                                                                                                    1⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    PID:4520
                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 4520 -s 340
                                                                                                                      2⤵
                                                                                                                      • Program crash
                                                                                                                      PID:4824
                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4520 -ip 4520
                                                                                                                    1⤵
                                                                                                                      PID:1320
                                                                                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                                                      1⤵
                                                                                                                      • Enumerates system info in registry
                                                                                                                      • Modifies registry class
                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                      PID:2240
                                                                                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                                                      1⤵
                                                                                                                      • Enumerates system info in registry
                                                                                                                      • Modifies registry class
                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                      PID:3992
                                                                                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                                                      1⤵
                                                                                                                      • Enumerates system info in registry
                                                                                                                      • Modifies registry class
                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                      PID:1680
                                                                                                                    • C:\Users\Admin\AppData\Roaming\tjisagw
                                                                                                                      C:\Users\Admin\AppData\Roaming\tjisagw
                                                                                                                      1⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      PID:2036
                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 304
                                                                                                                        2⤵
                                                                                                                        • Program crash
                                                                                                                        PID:724
                                                                                                                    • C:\Users\Admin\AppData\Roaming\bdisagw
                                                                                                                      C:\Users\Admin\AppData\Roaming\bdisagw
                                                                                                                      1⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Checks SCSI registry key(s)
                                                                                                                      PID:1980
                                                                                                                    • C:\Users\Admin\AppData\Roaming\faisagw
                                                                                                                      C:\Users\Admin\AppData\Roaming\faisagw
                                                                                                                      1⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      PID:3792
                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 304
                                                                                                                        2⤵
                                                                                                                        • Program crash
                                                                                                                        PID:3968
                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2036 -ip 2036
                                                                                                                      1⤵
                                                                                                                        PID:2692
                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3792 -ip 3792
                                                                                                                        1⤵
                                                                                                                          PID:3820
                                                                                                                        • C:\Users\Admin\AppData\Local\49fae39c-fadd-4617-9b37-d031083b863d\E895.exe
                                                                                                                          C:\Users\Admin\AppData\Local\49fae39c-fadd-4617-9b37-d031083b863d\E895.exe --Task
                                                                                                                          1⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                          PID:1416
                                                                                                                          • C:\Users\Admin\AppData\Local\49fae39c-fadd-4617-9b37-d031083b863d\E895.exe
                                                                                                                            C:\Users\Admin\AppData\Local\49fae39c-fadd-4617-9b37-d031083b863d\E895.exe --Task
                                                                                                                            2⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:3480

                                                                                                                        Network

                                                                                                                        MITRE ATT&CK Enterprise v6

                                                                                                                        Replay Monitor

                                                                                                                        Loading Replay Monitor...

                                                                                                                        Downloads

                                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                                                                                                                          Filesize

                                                                                                                          2KB

                                                                                                                          MD5

                                                                                                                          61ffe15234088bd43d27e9eb101ad1f6

                                                                                                                          SHA1

                                                                                                                          80e8cf2dbbf66018e148cbab446cfc5e52eed1b2

                                                                                                                          SHA256

                                                                                                                          1dc492a98f81cf0473e5ebc17c9284892b88c592b5194c31761a1ef1985c59b5

                                                                                                                          SHA512

                                                                                                                          f925dbd2d421bc596f344241ce915b69e8f9a5112f4b9d6e62c82a717493ce2422366395dea33dfce896704b940afd6366923a7a2eb476d10563bc76de15b61d

                                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                                                                                                          Filesize

                                                                                                                          1KB

                                                                                                                          MD5

                                                                                                                          912da6b52d140c350937afa14a357061

                                                                                                                          SHA1

                                                                                                                          5eb54c7f9f32a1e3442113fd93c348027e218004

                                                                                                                          SHA256

                                                                                                                          033b9d2ea11a924f8cd8af9d923c311efc401040802424ad0f7c8c811cb5f88d

                                                                                                                          SHA512

                                                                                                                          ace1abd89c31d0979a817b994fff933fec49b5f1204bc8d6ba43a41fd776500e719d3df95f1f90358d000b6de1705abe3cd8d120d13a9096ecea24afff4bdc2e

                                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                                                                                                                          Filesize

                                                                                                                          488B

                                                                                                                          MD5

                                                                                                                          4562b0c7ef16884859ef482b64f56ec6

                                                                                                                          SHA1

                                                                                                                          d2a3cfe437231078f2cc72d74ace7e05dfbc5518

                                                                                                                          SHA256

                                                                                                                          65a30513a1824de445121aaeff271f49881d32822396c6b7a081df1bef89e52c

                                                                                                                          SHA512

                                                                                                                          ae08fc60ce2b0f22ad4120dc709c2d29e0d016933cf452947b11c6edb9a1202b7a28d6450daa7e6c799d7f54815214f33704ded72b03179ef1feb24de8aef980

                                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                                                                                                          Filesize

                                                                                                                          482B

                                                                                                                          MD5

                                                                                                                          7fe387887e2de44e6942530eeb5fe044

                                                                                                                          SHA1

                                                                                                                          b63557c72c90a19ff3355fefc94e618cd99ff447

                                                                                                                          SHA256

                                                                                                                          e9eae168d21a5748025d69de9e1983ed3b8afed86a7a8ab7848fe3133f1041a2

                                                                                                                          SHA512

                                                                                                                          160596c5cc83333fbb2a271a6bd17c30eb0b6c9634104e7c6ac668d3caa2feefb6c349eb335dbf8c674a33b63568b831a76f94a8e2d6bc90500544ef54800b42

                                                                                                                        • C:\Users\Admin\AppData\Local\49fae39c-fadd-4617-9b37-d031083b863d\E895.exe

                                                                                                                          Filesize

                                                                                                                          842KB

                                                                                                                          MD5

                                                                                                                          3f0029a35b6553f3f5fbbe5479c3333f

                                                                                                                          SHA1

                                                                                                                          cb23d8c4337e20ac0c3d0bac9847386e09e31b36

                                                                                                                          SHA256

                                                                                                                          b88ca963777585c7de87a92e872b4d2e5582fff9ea686f6608e1b59f70ecc54f

                                                                                                                          SHA512

                                                                                                                          9d53835cd59b31d4abfad37ff7810e7faaa4db5898ab431fd12a06ed2db44beb3c0e1d59051132a82464dce2614302ecd09bafac34a99a9ab40f3e152aa68cd1

                                                                                                                        • C:\Users\Admin\AppData\Local\985194c7-f264-4e00-bd8b-44ce3a1a610d\build2.exe

                                                                                                                          Filesize

                                                                                                                          258KB

                                                                                                                          MD5

                                                                                                                          b9212ded69fae1fa1fb5d6db46a9fb76

                                                                                                                          SHA1

                                                                                                                          58face4245646b1cd379ee49f03a701eab1642be

                                                                                                                          SHA256

                                                                                                                          7a087c1bcd038c61ddb0f634f9b21e6db9bed59842f19adeda48b49acb20e16f

                                                                                                                          SHA512

                                                                                                                          09cab8ccedb9e53d6d2725e8b9dbbe8fa9552607a58d89876b6539a6612b2e7ac0440ef281971bec9191510915fa6264048510add493e6a862b0d3b4f006e342

                                                                                                                        • C:\Users\Admin\AppData\Local\985194c7-f264-4e00-bd8b-44ce3a1a610d\build2.exe

                                                                                                                          Filesize

                                                                                                                          258KB

                                                                                                                          MD5

                                                                                                                          b9212ded69fae1fa1fb5d6db46a9fb76

                                                                                                                          SHA1

                                                                                                                          58face4245646b1cd379ee49f03a701eab1642be

                                                                                                                          SHA256

                                                                                                                          7a087c1bcd038c61ddb0f634f9b21e6db9bed59842f19adeda48b49acb20e16f

                                                                                                                          SHA512

                                                                                                                          09cab8ccedb9e53d6d2725e8b9dbbe8fa9552607a58d89876b6539a6612b2e7ac0440ef281971bec9191510915fa6264048510add493e6a862b0d3b4f006e342

                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\128.png

                                                                                                                          Filesize

                                                                                                                          8KB

                                                                                                                          MD5

                                                                                                                          1f2092ca6379fb8aaf583d4bc260955e

                                                                                                                          SHA1

                                                                                                                          1f5c95c87fc0e794fffa81f9db5e6663eefa2cd1

                                                                                                                          SHA256

                                                                                                                          bf8b8d46317c1fda356507735093f90dff5a578f564ed482b1166088ffcb8015

                                                                                                                          SHA512

                                                                                                                          5ee4e914801fd60a3f3840cb7836f4773c6a49cfc878b431a60d0eb7e7dc391d1efdb079fab134ed08148a94e83d1eeb483a698f6cb8d3136dadd645058b9cd7

                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\16.png

                                                                                                                          Filesize

                                                                                                                          843B

                                                                                                                          MD5

                                                                                                                          c2e121bfc2b42d77c4632f0e43968ac2

                                                                                                                          SHA1

                                                                                                                          0f1d5bc95df1b6b333055871f25172ee66ceb21d

                                                                                                                          SHA256

                                                                                                                          7d0d655cccfc117307faf463404da2931c2f5deae5ce80e638e042beccfa7b1e

                                                                                                                          SHA512

                                                                                                                          baa00af5fe6de9a3de61f85f4e27dec9c5c9a12052fb1d110f2dc5c1a4e39d275547a6d0368a93f6c0c88945dca3777b550408942f7c498ba556170b1e7a243c

                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\24.png

                                                                                                                          Filesize

                                                                                                                          1KB

                                                                                                                          MD5

                                                                                                                          52b03cd5ab1715c9478925d24e470989

                                                                                                                          SHA1

                                                                                                                          675804f5552867b9015b6cdb2328a88b3596a00c

                                                                                                                          SHA256

                                                                                                                          afb7462a5952697a10eda8f653fb57287def531ba851678323dfa838a0291ccb

                                                                                                                          SHA512

                                                                                                                          00dc3c4ae1939f16e506bf414d369c755e5043edbaf9181e9c05f48d1cc55c5f05f67c9cab2ab82a2845fdeba977d47c263bdd23762ba3cfcea43d8bb1b3fdd3

                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\32.png

                                                                                                                          Filesize

                                                                                                                          1KB

                                                                                                                          MD5

                                                                                                                          a11da999ffc6d60d18430e21be60a921

                                                                                                                          SHA1

                                                                                                                          f98adfc8f6c526f2d3d9bd7b8726a7ea851ec1e5

                                                                                                                          SHA256

                                                                                                                          1e8162fa7f3109b450c66d3c7a4a8ba205f1516d23a5b610ab396ec0931b6dc6

                                                                                                                          SHA512

                                                                                                                          8aa2078ff8e68edd30ba46a4cae1a87df2a92e9623c848f0bcd816791f6243faa98164ec849c544130f22b8cb1fa1bd9e5bece8367fde1fd22fe8b1da09ce401

                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\36.png

                                                                                                                          Filesize

                                                                                                                          2KB

                                                                                                                          MD5

                                                                                                                          4e93455eb724d13f8cddbe4c5fd236c3

                                                                                                                          SHA1

                                                                                                                          3e8c930686c4024e0a3e6cd813d709ce67a7208d

                                                                                                                          SHA256

                                                                                                                          a3e4f86e7e85040a8e234652d834c089bdb2849937194b612ca1963c81fcc69f

                                                                                                                          SHA512

                                                                                                                          78a3c51f4db8aa273f6d0363c93c0b88d401752b18007b1a09303236b1d91e9758d8ea32a88b8ce76c6e820fe0ebca5ae1fc28c86dc98479f1ff8200c2dfeb83

                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\48.png

                                                                                                                          Filesize

                                                                                                                          3KB

                                                                                                                          MD5

                                                                                                                          059ee71acc8439f352e350aecd374ab9

                                                                                                                          SHA1

                                                                                                                          d5143bf7aad6847d46f0230f0edf6393db4c9a8c

                                                                                                                          SHA256

                                                                                                                          0047690e602eb4a017c27402ad27cfe3b2e897b6e7b298e4f022e69fa2024b50

                                                                                                                          SHA512

                                                                                                                          91928af347a547678d15b95836b7daeb6b2fbbd4855f067be9f6b8feadafff7803aa31159c8a1bf8f7cb95733bde883315a189dae54d898d517f521ea37d5ded

                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\64.png

                                                                                                                          Filesize

                                                                                                                          4KB

                                                                                                                          MD5

                                                                                                                          d93ff667b54492bba9b9490cf588bf49

                                                                                                                          SHA1

                                                                                                                          9a9f6fc23ecbaacebbc3260c76bb57bab5949a63

                                                                                                                          SHA256

                                                                                                                          55a82197ac30ec87ecbaa140ed6f007c4d4a379834370a518b77971e0107c9a0

                                                                                                                          SHA512

                                                                                                                          923051a25d4c4567cee0af02feb4cf02bdecca3c6f344bc48994941632637c0ec47303734f5e3dc76160b2c9f2f4eae704ac48e2806ac998a4dc8707c7db59b6

                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\js\ads.js

                                                                                                                          Filesize

                                                                                                                          5KB

                                                                                                                          MD5

                                                                                                                          7e5b623a30e4d985b50d9bfe10b84b0d

                                                                                                                          SHA1

                                                                                                                          95286be1fbd5b71c0cf49a96684dce073a587e9e

                                                                                                                          SHA256

                                                                                                                          f6f4757e4e4e707728bc1e43e68d41cc1632072907861b10611ba6219d359607

                                                                                                                          SHA512

                                                                                                                          9dc6dad48f3b25db1abfa444945458b802edfc6d31041e2f3c0a121beed2129aee4909a8d60141471284d91c74d3f6cbc319e8af3c52c5431fec69316101f759

                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\manifest.json

                                                                                                                          Filesize

                                                                                                                          1KB

                                                                                                                          MD5

                                                                                                                          23bb601e1a3c4a5a19830739f33b6f7b

                                                                                                                          SHA1

                                                                                                                          3558f1194cf2562f66245d7d5f562e7331da8afd

                                                                                                                          SHA256

                                                                                                                          04bbd2c615f81fd4f57663259f6373224033b23c623bc1265afcd8ceb548f1bb

                                                                                                                          SHA512

                                                                                                                          71cb66058b9cd2feb98b01d78554422fbbad148fc2e9450a6fcdf25af6a8bed4a3c0d71df6293e1da22af4f24e31bc95fa1f54836e2f7798c56bd03d144b1dba

                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                          Filesize

                                                                                                                          7KB

                                                                                                                          MD5

                                                                                                                          27364088f293a9cc5df82d9ffe8caaec

                                                                                                                          SHA1

                                                                                                                          f035c265156f95f73edbfdcc784351e2af991314

                                                                                                                          SHA256

                                                                                                                          9a56b4445ae553bcd59ce5aa5f3c0b2a92d79ff535358119fb73f57f13aa91e2

                                                                                                                          SHA512

                                                                                                                          520240b71e997a2a4b30549b645717dcd0a304d214354f5ec5b91a922454bea2e71b1389af8dbc56fe5c8b78912d973e05823c9857ab0da9c022cd572226ab0b

                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                          Filesize

                                                                                                                          29KB

                                                                                                                          MD5

                                                                                                                          7a8c222629a5970e08f03121630cf35a

                                                                                                                          SHA1

                                                                                                                          e6667bf9635069bd2b3ff078366215512935c4bb

                                                                                                                          SHA256

                                                                                                                          eea1cd2cbe955e9675aa2ec5c41d653619084e7a221d02a765219e0473dfd41f

                                                                                                                          SHA512

                                                                                                                          9b4c3ebbc143d5758d1926f3fac5fc8e38ac7d761c0e21c87441cd0eb9a4c3d3c32bfe67a7dae4a1a9c8f4fb0b6828c578af437220d6b8d4b313de3798981b87

                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Data

                                                                                                                          Filesize

                                                                                                                          88KB

                                                                                                                          MD5

                                                                                                                          8dabc56393ccd73212b6b872969e6037

                                                                                                                          SHA1

                                                                                                                          d570dcdda98c7345caa841fcfc614db8b710eac1

                                                                                                                          SHA256

                                                                                                                          af43596168ecef20e2471fe1bd7ba7e0ec2493ff47c2a76dd2f40dd1b6c4555f

                                                                                                                          SHA512

                                                                                                                          b5de435220445c74289e237c43427efbd295de64825ac20a82426ef27de90e0260119cf2b75b4ea09703aff6e51d727238c82a59c09c91a90622d09d40c99510

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\16.png

                                                                                                                          Filesize

                                                                                                                          843B

                                                                                                                          MD5

                                                                                                                          c2e121bfc2b42d77c4632f0e43968ac2

                                                                                                                          SHA1

                                                                                                                          0f1d5bc95df1b6b333055871f25172ee66ceb21d

                                                                                                                          SHA256

                                                                                                                          7d0d655cccfc117307faf463404da2931c2f5deae5ce80e638e042beccfa7b1e

                                                                                                                          SHA512

                                                                                                                          baa00af5fe6de9a3de61f85f4e27dec9c5c9a12052fb1d110f2dc5c1a4e39d275547a6d0368a93f6c0c88945dca3777b550408942f7c498ba556170b1e7a243c

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\24.png

                                                                                                                          Filesize

                                                                                                                          1KB

                                                                                                                          MD5

                                                                                                                          52b03cd5ab1715c9478925d24e470989

                                                                                                                          SHA1

                                                                                                                          675804f5552867b9015b6cdb2328a88b3596a00c

                                                                                                                          SHA256

                                                                                                                          afb7462a5952697a10eda8f653fb57287def531ba851678323dfa838a0291ccb

                                                                                                                          SHA512

                                                                                                                          00dc3c4ae1939f16e506bf414d369c755e5043edbaf9181e9c05f48d1cc55c5f05f67c9cab2ab82a2845fdeba977d47c263bdd23762ba3cfcea43d8bb1b3fdd3

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\32.png

                                                                                                                          Filesize

                                                                                                                          1KB

                                                                                                                          MD5

                                                                                                                          a11da999ffc6d60d18430e21be60a921

                                                                                                                          SHA1

                                                                                                                          f98adfc8f6c526f2d3d9bd7b8726a7ea851ec1e5

                                                                                                                          SHA256

                                                                                                                          1e8162fa7f3109b450c66d3c7a4a8ba205f1516d23a5b610ab396ec0931b6dc6

                                                                                                                          SHA512

                                                                                                                          8aa2078ff8e68edd30ba46a4cae1a87df2a92e9623c848f0bcd816791f6243faa98164ec849c544130f22b8cb1fa1bd9e5bece8367fde1fd22fe8b1da09ce401

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\36.png

                                                                                                                          Filesize

                                                                                                                          2KB

                                                                                                                          MD5

                                                                                                                          4e93455eb724d13f8cddbe4c5fd236c3

                                                                                                                          SHA1

                                                                                                                          3e8c930686c4024e0a3e6cd813d709ce67a7208d

                                                                                                                          SHA256

                                                                                                                          a3e4f86e7e85040a8e234652d834c089bdb2849937194b612ca1963c81fcc69f

                                                                                                                          SHA512

                                                                                                                          78a3c51f4db8aa273f6d0363c93c0b88d401752b18007b1a09303236b1d91e9758d8ea32a88b8ce76c6e820fe0ebca5ae1fc28c86dc98479f1ff8200c2dfeb83

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\48.png

                                                                                                                          Filesize

                                                                                                                          3KB

                                                                                                                          MD5

                                                                                                                          059ee71acc8439f352e350aecd374ab9

                                                                                                                          SHA1

                                                                                                                          d5143bf7aad6847d46f0230f0edf6393db4c9a8c

                                                                                                                          SHA256

                                                                                                                          0047690e602eb4a017c27402ad27cfe3b2e897b6e7b298e4f022e69fa2024b50

                                                                                                                          SHA512

                                                                                                                          91928af347a547678d15b95836b7daeb6b2fbbd4855f067be9f6b8feadafff7803aa31159c8a1bf8f7cb95733bde883315a189dae54d898d517f521ea37d5ded

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\64.png

                                                                                                                          Filesize

                                                                                                                          4KB

                                                                                                                          MD5

                                                                                                                          d93ff667b54492bba9b9490cf588bf49

                                                                                                                          SHA1

                                                                                                                          9a9f6fc23ecbaacebbc3260c76bb57bab5949a63

                                                                                                                          SHA256

                                                                                                                          55a82197ac30ec87ecbaa140ed6f007c4d4a379834370a518b77971e0107c9a0

                                                                                                                          SHA512

                                                                                                                          923051a25d4c4567cee0af02feb4cf02bdecca3c6f344bc48994941632637c0ec47303734f5e3dc76160b2c9f2f4eae704ac48e2806ac998a4dc8707c7db59b6

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\manifest.json

                                                                                                                          Filesize

                                                                                                                          1KB

                                                                                                                          MD5

                                                                                                                          23bb601e1a3c4a5a19830739f33b6f7b

                                                                                                                          SHA1

                                                                                                                          3558f1194cf2562f66245d7d5f562e7331da8afd

                                                                                                                          SHA256

                                                                                                                          04bbd2c615f81fd4f57663259f6373224033b23c623bc1265afcd8ceb548f1bb

                                                                                                                          SHA512

                                                                                                                          71cb66058b9cd2feb98b01d78554422fbbad148fc2e9450a6fcdf25af6a8bed4a3c0d71df6293e1da22af4f24e31bc95fa1f54836e2f7798c56bd03d144b1dba

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                          Filesize

                                                                                                                          3KB

                                                                                                                          MD5

                                                                                                                          ce927f1b8e327f9b545520dd99d9c06f

                                                                                                                          SHA1

                                                                                                                          2b799092e6609e0327938def722d07205cfd2f3f

                                                                                                                          SHA256

                                                                                                                          774a310dc5692087b4b91b428c93a63df2a9e96bc1ad9becaa719cd67fe9b2c0

                                                                                                                          SHA512

                                                                                                                          12e65e1b1361d6d242406f1ad08ad83f4da977744d8636db36af1ff01edc37ca496f59ff12222621fc557bd8edd99fccf1721ec345c6d3d027a1a1177ca1e92c

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                                                                          Filesize

                                                                                                                          26KB

                                                                                                                          MD5

                                                                                                                          b16837e10c224ba09425b3adaa7d4dee

                                                                                                                          SHA1

                                                                                                                          471b81d28316fd80df40e29b7e0deed3ac0871f7

                                                                                                                          SHA256

                                                                                                                          002f653bce8f830ab98fc03d123866c02b4367d1da82cc9c209805277a3e3de2

                                                                                                                          SHA512

                                                                                                                          2e8491d57c512c2ab668cd8c7435e1e315db9850a9a32c7501d3e07d141fde05173691cc8e08280263dba8fce34385cc291a8577c41277cc867e4decc82039a8

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Web Data

                                                                                                                          Filesize

                                                                                                                          112KB

                                                                                                                          MD5

                                                                                                                          926f5ba9d7fb77359de8b58673004947

                                                                                                                          SHA1

                                                                                                                          30dfbda365d8ddda670f7f347d10f1e9595fd93f

                                                                                                                          SHA256

                                                                                                                          ea15aafc9e819994a6d6fa4346681d1c5e5f8ffa757877c92637617bf40553a4

                                                                                                                          SHA512

                                                                                                                          7fb388b13edef2d7a42318430800eae63ceed062d6b59b0cc774ff55d0218c4de5c5c9036955e8cfa074ecdc3e2f646d66bf9174add404ccda2974805828a763

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                          Filesize

                                                                                                                          2KB

                                                                                                                          MD5

                                                                                                                          ae8e3bac41038eca132e7f443aba095d

                                                                                                                          SHA1

                                                                                                                          606092ed45ac79219e9f09c94b5bb1305781704d

                                                                                                                          SHA256

                                                                                                                          05ab3183e7f574c40ec26c2b03d703f269776c30be2352a972e1fb9b84e14197

                                                                                                                          SHA512

                                                                                                                          46f591dc3fdc4ef2f797a957f833220eb9876fd0f40686e5feec6db217a64f3307047eaa010278e4ef5ec4f7adbb48c3966b1f03bb0b4362233a7ad611ff82f0

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

                                                                                                                          Filesize

                                                                                                                          28KB

                                                                                                                          MD5

                                                                                                                          8f0e53c04a88f49cb7f225b323cd0abd

                                                                                                                          SHA1

                                                                                                                          459d04b832dbc553355aec3ba454d22c7bf030e0

                                                                                                                          SHA256

                                                                                                                          36c1e53037fa633a4198b8fa6a55e3e8c72a29a3f04df3a6e058d16a0af8d01f

                                                                                                                          SHA512

                                                                                                                          1702767e9e644d8cba4889de6047bbe414ea16678cf72be86ecfb4363d9a7853949f7b426442a47dc804b5cc5faf63407e2a98a15becfaf4b0b06e64d94c1432

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\164D.dll

                                                                                                                          Filesize

                                                                                                                          3.0MB

                                                                                                                          MD5

                                                                                                                          53d4d2faa565286772195a54e3737af2

                                                                                                                          SHA1

                                                                                                                          710327bf8abfe0339e7ed828463226638bbbff91

                                                                                                                          SHA256

                                                                                                                          f7a90441ca304ac4ca38cd3ea45ddead356bb33b763f08e034738fead999a8a5

                                                                                                                          SHA512

                                                                                                                          f30dcacc00c3554677cc635d88e38d774619729e9f096b37be2e6d6bae2488cbd97698101f5574473a0c7cbe455297a9ba3eabfae8a12725b49a803eab5da935

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\164D.dll

                                                                                                                          Filesize

                                                                                                                          3.0MB

                                                                                                                          MD5

                                                                                                                          53d4d2faa565286772195a54e3737af2

                                                                                                                          SHA1

                                                                                                                          710327bf8abfe0339e7ed828463226638bbbff91

                                                                                                                          SHA256

                                                                                                                          f7a90441ca304ac4ca38cd3ea45ddead356bb33b763f08e034738fead999a8a5

                                                                                                                          SHA512

                                                                                                                          f30dcacc00c3554677cc635d88e38d774619729e9f096b37be2e6d6bae2488cbd97698101f5574473a0c7cbe455297a9ba3eabfae8a12725b49a803eab5da935

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1A16.exe

                                                                                                                          Filesize

                                                                                                                          342KB

                                                                                                                          MD5

                                                                                                                          f04b73cd40e68d87dc8efda7b5bcafbc

                                                                                                                          SHA1

                                                                                                                          3c020a5d89a1f564cdf0b19c2f4f51742846abfe

                                                                                                                          SHA256

                                                                                                                          0c83818cbfe9e9ec4fe72a8f7f98a089cb4558d1a6d97cf59cc1f5f2db65f40a

                                                                                                                          SHA512

                                                                                                                          8b6ef1b642211a0e982044eabe4d5abc0ffd8f9a5f78140929cbc7a9b736e77f05ddbda5b4138b2f7d2595cef431475a0c01472872cbe691a89a7b4365275dc5

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\4FFC.exe

                                                                                                                          Filesize

                                                                                                                          343KB

                                                                                                                          MD5

                                                                                                                          9e0b47031ff1b0eca396f40c1848e24f

                                                                                                                          SHA1

                                                                                                                          7de0c8ffeefc352a367488a6b27fc0a24bb364ce

                                                                                                                          SHA256

                                                                                                                          2c67d1785e294727ca70e458a614af3864011eefdbedbff5ec64ed7768ab2aa8

                                                                                                                          SHA512

                                                                                                                          74ae346fef0733c0f01dfd2c51a2fcc6c251c130cc7469f1460a15c5a38ac4e74d8c8f4c4e53df4ad06257b6d19502f44c2252d5c267eb2d1d3eb7d29094d43a

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\6A5B.exe

                                                                                                                          Filesize

                                                                                                                          342KB

                                                                                                                          MD5

                                                                                                                          9bfac87f3cbc2d7e1909c495fe399084

                                                                                                                          SHA1

                                                                                                                          93fab485248d1f845a3d4fdc2ad426f125ebd19e

                                                                                                                          SHA256

                                                                                                                          af240c5f3f564d0903610bfa4de1ecfa8ceb3d33e013b0e77eeda63778b8afe9

                                                                                                                          SHA512

                                                                                                                          666e050b61012f8947726d254f4e88ef91c717003f6a31d3ed1df8f4e4bd3c53d74be3bc558142298dec851d49a22adf3352fd59a22df4452bf1b40bb9ea3d1a

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\6A5B.exe

                                                                                                                          Filesize

                                                                                                                          342KB

                                                                                                                          MD5

                                                                                                                          9bfac87f3cbc2d7e1909c495fe399084

                                                                                                                          SHA1

                                                                                                                          93fab485248d1f845a3d4fdc2ad426f125ebd19e

                                                                                                                          SHA256

                                                                                                                          af240c5f3f564d0903610bfa4de1ecfa8ceb3d33e013b0e77eeda63778b8afe9

                                                                                                                          SHA512

                                                                                                                          666e050b61012f8947726d254f4e88ef91c717003f6a31d3ed1df8f4e4bd3c53d74be3bc558142298dec851d49a22adf3352fd59a22df4452bf1b40bb9ea3d1a

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\6EF0.exe

                                                                                                                          Filesize

                                                                                                                          342KB

                                                                                                                          MD5

                                                                                                                          e6e345013e2cd759fda5094f0afb5293

                                                                                                                          SHA1

                                                                                                                          e6402e3afcd3677d5337c1238e9eb3aa0fee54af

                                                                                                                          SHA256

                                                                                                                          5ce31138c97a01a6e276c37eb3b1f9b1ff6f2366bdaefddc5b7a8cbd9d5f88aa

                                                                                                                          SHA512

                                                                                                                          9fcdd60baea8b3ac13de41d21915aec4e5ab7e57c6e4af2f1760af18e1058719b1f42103467cec43199bc0423469c58dc48e6bc2854d0c353686daf061309410

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\6EF0.exe

                                                                                                                          Filesize

                                                                                                                          342KB

                                                                                                                          MD5

                                                                                                                          e6e345013e2cd759fda5094f0afb5293

                                                                                                                          SHA1

                                                                                                                          e6402e3afcd3677d5337c1238e9eb3aa0fee54af

                                                                                                                          SHA256

                                                                                                                          5ce31138c97a01a6e276c37eb3b1f9b1ff6f2366bdaefddc5b7a8cbd9d5f88aa

                                                                                                                          SHA512

                                                                                                                          9fcdd60baea8b3ac13de41d21915aec4e5ab7e57c6e4af2f1760af18e1058719b1f42103467cec43199bc0423469c58dc48e6bc2854d0c353686daf061309410

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\D74B.exe

                                                                                                                          Filesize

                                                                                                                          2.0MB

                                                                                                                          MD5

                                                                                                                          47ad5d71dcd38f85253d882d93c04906

                                                                                                                          SHA1

                                                                                                                          941ef208fb34ff9a3b25f7a325fcd0a44eacaaaf

                                                                                                                          SHA256

                                                                                                                          6ba14148ff3ce0ee93f4d2641677ac454aa0187821cba41c8eb03212a8c04fe2

                                                                                                                          SHA512

                                                                                                                          75291bdf369e90b76d7c15a45c3532f751e82a7acde205af1c019775e1138833cea32652fe940cc98e3a491f2c3677c45d58933c7e2ea55f089e99f2133dd0d0

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\D74B.exe

                                                                                                                          Filesize

                                                                                                                          2.0MB

                                                                                                                          MD5

                                                                                                                          47ad5d71dcd38f85253d882d93c04906

                                                                                                                          SHA1

                                                                                                                          941ef208fb34ff9a3b25f7a325fcd0a44eacaaaf

                                                                                                                          SHA256

                                                                                                                          6ba14148ff3ce0ee93f4d2641677ac454aa0187821cba41c8eb03212a8c04fe2

                                                                                                                          SHA512

                                                                                                                          75291bdf369e90b76d7c15a45c3532f751e82a7acde205af1c019775e1138833cea32652fe940cc98e3a491f2c3677c45d58933c7e2ea55f089e99f2133dd0d0

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\DDC4.exe

                                                                                                                          Filesize

                                                                                                                          277KB

                                                                                                                          MD5

                                                                                                                          75fd0d8f2b5c0779c5a4a7183f458595

                                                                                                                          SHA1

                                                                                                                          d8f6960e435f37378a4d43a95f186da901e6b263

                                                                                                                          SHA256

                                                                                                                          a29c73c868345b8b905fb8589d5e178ba0896e3efbeb132ceab845c233deccda

                                                                                                                          SHA512

                                                                                                                          60f00cc9fd4c08e6daaec4d1d9dbfc8eccbcda088d24a917cd21bd8348575f5b701ba9ea365245eacc7a0a50af2b4e2d73ee313011984113d84ed756f9fedc72

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\E0D2.exe

                                                                                                                          Filesize

                                                                                                                          342KB

                                                                                                                          MD5

                                                                                                                          f04b73cd40e68d87dc8efda7b5bcafbc

                                                                                                                          SHA1

                                                                                                                          3c020a5d89a1f564cdf0b19c2f4f51742846abfe

                                                                                                                          SHA256

                                                                                                                          0c83818cbfe9e9ec4fe72a8f7f98a089cb4558d1a6d97cf59cc1f5f2db65f40a

                                                                                                                          SHA512

                                                                                                                          8b6ef1b642211a0e982044eabe4d5abc0ffd8f9a5f78140929cbc7a9b736e77f05ddbda5b4138b2f7d2595cef431475a0c01472872cbe691a89a7b4365275dc5

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\E0D2.exe

                                                                                                                          Filesize

                                                                                                                          342KB

                                                                                                                          MD5

                                                                                                                          f04b73cd40e68d87dc8efda7b5bcafbc

                                                                                                                          SHA1

                                                                                                                          3c020a5d89a1f564cdf0b19c2f4f51742846abfe

                                                                                                                          SHA256

                                                                                                                          0c83818cbfe9e9ec4fe72a8f7f98a089cb4558d1a6d97cf59cc1f5f2db65f40a

                                                                                                                          SHA512

                                                                                                                          8b6ef1b642211a0e982044eabe4d5abc0ffd8f9a5f78140929cbc7a9b736e77f05ddbda5b4138b2f7d2595cef431475a0c01472872cbe691a89a7b4365275dc5

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\E45D.exe

                                                                                                                          Filesize

                                                                                                                          278KB

                                                                                                                          MD5

                                                                                                                          aac544cb78a63910c1e7cf175be28231

                                                                                                                          SHA1

                                                                                                                          1eb930c88a322c2a49c5b6c27a1c5e8c2296f04f

                                                                                                                          SHA256

                                                                                                                          f1538f2f86441e07d5b5534704482c9242be14d3fd37863f5ecafae809565cd2

                                                                                                                          SHA512

                                                                                                                          6a330a59a551d4da1743290b427685deccee1343697dc09ffe92608daa4ac720a20df03436365d35df6ebde8d3fa0584c35f2cfb5a2018319142d7e2c3d2d20d

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\E45D.exe

                                                                                                                          Filesize

                                                                                                                          278KB

                                                                                                                          MD5

                                                                                                                          aac544cb78a63910c1e7cf175be28231

                                                                                                                          SHA1

                                                                                                                          1eb930c88a322c2a49c5b6c27a1c5e8c2296f04f

                                                                                                                          SHA256

                                                                                                                          f1538f2f86441e07d5b5534704482c9242be14d3fd37863f5ecafae809565cd2

                                                                                                                          SHA512

                                                                                                                          6a330a59a551d4da1743290b427685deccee1343697dc09ffe92608daa4ac720a20df03436365d35df6ebde8d3fa0584c35f2cfb5a2018319142d7e2c3d2d20d

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\E895.exe

                                                                                                                          Filesize

                                                                                                                          842KB

                                                                                                                          MD5

                                                                                                                          3f0029a35b6553f3f5fbbe5479c3333f

                                                                                                                          SHA1

                                                                                                                          cb23d8c4337e20ac0c3d0bac9847386e09e31b36

                                                                                                                          SHA256

                                                                                                                          b88ca963777585c7de87a92e872b4d2e5582fff9ea686f6608e1b59f70ecc54f

                                                                                                                          SHA512

                                                                                                                          9d53835cd59b31d4abfad37ff7810e7faaa4db5898ab431fd12a06ed2db44beb3c0e1d59051132a82464dce2614302ecd09bafac34a99a9ab40f3e152aa68cd1

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\E895.exe

                                                                                                                          Filesize

                                                                                                                          842KB

                                                                                                                          MD5

                                                                                                                          3f0029a35b6553f3f5fbbe5479c3333f

                                                                                                                          SHA1

                                                                                                                          cb23d8c4337e20ac0c3d0bac9847386e09e31b36

                                                                                                                          SHA256

                                                                                                                          b88ca963777585c7de87a92e872b4d2e5582fff9ea686f6608e1b59f70ecc54f

                                                                                                                          SHA512

                                                                                                                          9d53835cd59b31d4abfad37ff7810e7faaa4db5898ab431fd12a06ed2db44beb3c0e1d59051132a82464dce2614302ecd09bafac34a99a9ab40f3e152aa68cd1

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\E895.exe

                                                                                                                          Filesize

                                                                                                                          842KB

                                                                                                                          MD5

                                                                                                                          3f0029a35b6553f3f5fbbe5479c3333f

                                                                                                                          SHA1

                                                                                                                          cb23d8c4337e20ac0c3d0bac9847386e09e31b36

                                                                                                                          SHA256

                                                                                                                          b88ca963777585c7de87a92e872b4d2e5582fff9ea686f6608e1b59f70ecc54f

                                                                                                                          SHA512

                                                                                                                          9d53835cd59b31d4abfad37ff7810e7faaa4db5898ab431fd12a06ed2db44beb3c0e1d59051132a82464dce2614302ecd09bafac34a99a9ab40f3e152aa68cd1

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\E895.exe

                                                                                                                          Filesize

                                                                                                                          842KB

                                                                                                                          MD5

                                                                                                                          3f0029a35b6553f3f5fbbe5479c3333f

                                                                                                                          SHA1

                                                                                                                          cb23d8c4337e20ac0c3d0bac9847386e09e31b36

                                                                                                                          SHA256

                                                                                                                          b88ca963777585c7de87a92e872b4d2e5582fff9ea686f6608e1b59f70ecc54f

                                                                                                                          SHA512

                                                                                                                          9d53835cd59b31d4abfad37ff7810e7faaa4db5898ab431fd12a06ed2db44beb3c0e1d59051132a82464dce2614302ecd09bafac34a99a9ab40f3e152aa68cd1

                                                                                                                        • C:\Users\Admin\AppData\Roaming\bdisagw

                                                                                                                          Filesize

                                                                                                                          146KB

                                                                                                                          MD5

                                                                                                                          2c6e6e290972fcd5e556efccfd51f174

                                                                                                                          SHA1

                                                                                                                          ec3de0785e4ccd0282e92e35c915ddb72832fd83

                                                                                                                          SHA256

                                                                                                                          ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e

                                                                                                                          SHA512

                                                                                                                          a7077bf87ad233413322dd55d4c1ed684d5ebd70e9451307d9f70ba1888688fa5b375a6006803da9e9cc800be7bc928230ad26a889e88c907854a8bc73ad539f

                                                                                                                        • C:\Users\Admin\AppData\Roaming\bdisagw

                                                                                                                          Filesize

                                                                                                                          146KB

                                                                                                                          MD5

                                                                                                                          2c6e6e290972fcd5e556efccfd51f174

                                                                                                                          SHA1

                                                                                                                          ec3de0785e4ccd0282e92e35c915ddb72832fd83

                                                                                                                          SHA256

                                                                                                                          ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e

                                                                                                                          SHA512

                                                                                                                          a7077bf87ad233413322dd55d4c1ed684d5ebd70e9451307d9f70ba1888688fa5b375a6006803da9e9cc800be7bc928230ad26a889e88c907854a8bc73ad539f

                                                                                                                        • C:\Windows\system32\drivers\etc\hosts

                                                                                                                          Filesize

                                                                                                                          1KB

                                                                                                                          MD5

                                                                                                                          6b800a7ce8e526d4ef554af1d3c5df84

                                                                                                                          SHA1

                                                                                                                          a55b3ee214f87bd52fa8bbd9366c4b5b9f25b11f

                                                                                                                          SHA256

                                                                                                                          d3834400ae484a92575e325d9e64802d07a0f2a28ff76fb1aef48dbce32b931f

                                                                                                                          SHA512

                                                                                                                          cce2d77ad7e26b9b2fae11761d8d7836b160db176777f2904471f4f73e5e39036979ba9ff66aea6fd21338a3bba4a6b0ad63f025870d55e1486bb569d813d49a

                                                                                                                        • \??\c:\users\admin\appdata\local\temp\1a16.exe

                                                                                                                          Filesize

                                                                                                                          342KB

                                                                                                                          MD5

                                                                                                                          f04b73cd40e68d87dc8efda7b5bcafbc

                                                                                                                          SHA1

                                                                                                                          3c020a5d89a1f564cdf0b19c2f4f51742846abfe

                                                                                                                          SHA256

                                                                                                                          0c83818cbfe9e9ec4fe72a8f7f98a089cb4558d1a6d97cf59cc1f5f2db65f40a

                                                                                                                          SHA512

                                                                                                                          8b6ef1b642211a0e982044eabe4d5abc0ffd8f9a5f78140929cbc7a9b736e77f05ddbda5b4138b2f7d2595cef431475a0c01472872cbe691a89a7b4365275dc5

                                                                                                                        • \??\c:\users\admin\appdata\local\temp\4ffc.exe

                                                                                                                          Filesize

                                                                                                                          343KB

                                                                                                                          MD5

                                                                                                                          9e0b47031ff1b0eca396f40c1848e24f

                                                                                                                          SHA1

                                                                                                                          7de0c8ffeefc352a367488a6b27fc0a24bb364ce

                                                                                                                          SHA256

                                                                                                                          2c67d1785e294727ca70e458a614af3864011eefdbedbff5ec64ed7768ab2aa8

                                                                                                                          SHA512

                                                                                                                          74ae346fef0733c0f01dfd2c51a2fcc6c251c130cc7469f1460a15c5a38ac4e74d8c8f4c4e53df4ad06257b6d19502f44c2252d5c267eb2d1d3eb7d29094d43a

                                                                                                                        • \??\c:\users\admin\appdata\local\temp\d74b.exe

                                                                                                                          Filesize

                                                                                                                          2.0MB

                                                                                                                          MD5

                                                                                                                          47ad5d71dcd38f85253d882d93c04906

                                                                                                                          SHA1

                                                                                                                          941ef208fb34ff9a3b25f7a325fcd0a44eacaaaf

                                                                                                                          SHA256

                                                                                                                          6ba14148ff3ce0ee93f4d2641677ac454aa0187821cba41c8eb03212a8c04fe2

                                                                                                                          SHA512

                                                                                                                          75291bdf369e90b76d7c15a45c3532f751e82a7acde205af1c019775e1138833cea32652fe940cc98e3a491f2c3677c45d58933c7e2ea55f089e99f2133dd0d0

                                                                                                                        • \??\c:\users\admin\appdata\local\temp\ddc4.exe

                                                                                                                          Filesize

                                                                                                                          277KB

                                                                                                                          MD5

                                                                                                                          75fd0d8f2b5c0779c5a4a7183f458595

                                                                                                                          SHA1

                                                                                                                          d8f6960e435f37378a4d43a95f186da901e6b263

                                                                                                                          SHA256

                                                                                                                          a29c73c868345b8b905fb8589d5e178ba0896e3efbeb132ceab845c233deccda

                                                                                                                          SHA512

                                                                                                                          60f00cc9fd4c08e6daaec4d1d9dbfc8eccbcda088d24a917cd21bd8348575f5b701ba9ea365245eacc7a0a50af2b4e2d73ee313011984113d84ed756f9fedc72

                                                                                                                        • \??\c:\users\admin\appdata\local\temp\e895.exe

                                                                                                                          Filesize

                                                                                                                          842KB

                                                                                                                          MD5

                                                                                                                          3f0029a35b6553f3f5fbbe5479c3333f

                                                                                                                          SHA1

                                                                                                                          cb23d8c4337e20ac0c3d0bac9847386e09e31b36

                                                                                                                          SHA256

                                                                                                                          b88ca963777585c7de87a92e872b4d2e5582fff9ea686f6608e1b59f70ecc54f

                                                                                                                          SHA512

                                                                                                                          9d53835cd59b31d4abfad37ff7810e7faaa4db5898ab431fd12a06ed2db44beb3c0e1d59051132a82464dce2614302ecd09bafac34a99a9ab40f3e152aa68cd1

                                                                                                                        • memory/424-263-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.2MB

                                                                                                                        • memory/424-255-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.2MB

                                                                                                                        • memory/424-256-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.2MB

                                                                                                                        • memory/424-258-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.2MB

                                                                                                                        • memory/448-222-0x0000000000D40000-0x0000000000D4C000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          48KB

                                                                                                                        • memory/660-286-0x000000000061D000-0x0000000000649000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          176KB

                                                                                                                        • memory/660-287-0x0000000001FA0000-0x0000000001FEB000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          300KB

                                                                                                                        • memory/1004-160-0x0000000004C50000-0x000000000501F000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          3.8MB

                                                                                                                        • memory/1004-159-0x0000000004A84000-0x0000000004C3F000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.7MB

                                                                                                                        • memory/1184-200-0x0000000000400000-0x000000000045A000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          360KB

                                                                                                                        • memory/1184-210-0x0000000000400000-0x000000000045A000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          360KB

                                                                                                                        • memory/1184-199-0x00000000007C6000-0x00000000007DC000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          88KB

                                                                                                                        • memory/1284-328-0x0000000001130000-0x000000000113B000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          44KB

                                                                                                                        • memory/1284-327-0x0000000001140000-0x0000000001147000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          28KB

                                                                                                                        • memory/1680-213-0x00000000007B6000-0x00000000007CC000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          88KB

                                                                                                                        • memory/1680-214-0x0000000000400000-0x000000000045A000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          360KB

                                                                                                                        • memory/1848-136-0x00000000006CD000-0x00000000006DD000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/1848-135-0x0000000000400000-0x0000000000459000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          356KB

                                                                                                                        • memory/1848-134-0x0000000000400000-0x0000000000459000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          356KB

                                                                                                                        • memory/1848-133-0x0000000002190000-0x0000000002199000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          36KB

                                                                                                                        • memory/1848-137-0x0000000002190000-0x0000000002199000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          36KB

                                                                                                                        • memory/1848-138-0x0000000000400000-0x0000000000459000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          356KB

                                                                                                                        • memory/1848-132-0x00000000006CD000-0x00000000006DD000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/1928-217-0x0000000001080000-0x00000000010EB000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          428KB

                                                                                                                        • memory/1928-231-0x0000000001080000-0x00000000010EB000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          428KB

                                                                                                                        • memory/1928-216-0x00000000010F0000-0x0000000001165000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          468KB

                                                                                                                        • memory/2000-313-0x0000000000BD0000-0x0000000000BD9000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          36KB

                                                                                                                        • memory/2000-314-0x0000000000BC0000-0x0000000000BCF000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          60KB

                                                                                                                        • memory/2240-401-0x000001BBB5880000-0x000001BBB5888000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          32KB

                                                                                                                        • memory/2240-414-0x000001BBB900B000-0x000001BBB900F000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          16KB

                                                                                                                        • memory/2240-417-0x000001BBB9011000-0x000001BBB9014000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          12KB

                                                                                                                        • memory/2240-410-0x000001BBB900B000-0x000001BBB900F000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          16KB

                                                                                                                        • memory/2240-411-0x000001BBB900B000-0x000001BBB900F000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          16KB

                                                                                                                        • memory/2240-412-0x000001BBB900B000-0x000001BBB900F000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          16KB

                                                                                                                        • memory/2240-418-0x000001BBB9011000-0x000001BBB9014000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          12KB

                                                                                                                        • memory/2240-419-0x000001BBB9011000-0x000001BBB9014000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          12KB

                                                                                                                        • memory/2240-402-0x000001BBB6C40000-0x000001BBB6C60000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          128KB

                                                                                                                        • memory/2240-416-0x000001BBB9011000-0x000001BBB9014000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          12KB

                                                                                                                        • memory/2240-413-0x000001BBB900B000-0x000001BBB900F000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          16KB

                                                                                                                        • memory/2240-403-0x000001BBB69C0000-0x000001BBB69E0000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          128KB

                                                                                                                        • memory/2244-229-0x0000000000400000-0x000000000045A000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          360KB

                                                                                                                        • memory/2244-212-0x0000000000400000-0x000000000045A000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          360KB

                                                                                                                        • memory/2244-211-0x0000000000460000-0x0000000000560000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1024KB

                                                                                                                        • memory/2508-224-0x0000000003380000-0x0000000003442000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          776KB

                                                                                                                        • memory/2508-219-0x00000000032A0000-0x0000000003378000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          864KB

                                                                                                                        • memory/2508-220-0x0000000003380000-0x0000000003442000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          776KB

                                                                                                                        • memory/2508-194-0x0000000002E30000-0x0000000003094000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.4MB

                                                                                                                        • memory/2508-195-0x00000000031A0000-0x000000000329D000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1012KB

                                                                                                                        • memory/2508-230-0x00000000031A0000-0x000000000329D000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1012KB

                                                                                                                        • memory/2568-206-0x0000000000400000-0x000000000045B000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          364KB

                                                                                                                        • memory/2568-205-0x0000000000646000-0x000000000065C000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          88KB

                                                                                                                        • memory/2972-173-0x00000000007D6000-0x00000000007EC000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          88KB

                                                                                                                        • memory/2972-181-0x0000000000400000-0x000000000044B000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          300KB

                                                                                                                        • memory/2972-190-0x00000000007D6000-0x00000000007EC000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          88KB

                                                                                                                        • memory/2972-174-0x0000000000560000-0x0000000000569000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          36KB

                                                                                                                        • memory/3104-323-0x0000000000890000-0x0000000000896000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          24KB

                                                                                                                        • memory/3104-324-0x0000000000880000-0x000000000088C000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          48KB

                                                                                                                        • memory/3124-171-0x0000000000030000-0x0000000000039000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          36KB

                                                                                                                        • memory/3124-172-0x0000000000400000-0x000000000045A000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          360KB

                                                                                                                        • memory/3124-170-0x00000000007E6000-0x00000000007FC000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          88KB

                                                                                                                        • memory/3420-175-0x0000000000638000-0x00000000006CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          584KB

                                                                                                                        • memory/3420-176-0x0000000000A00000-0x0000000000B1B000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.1MB

                                                                                                                        • memory/3484-185-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.2MB

                                                                                                                        • memory/3484-183-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.2MB

                                                                                                                        • memory/3484-180-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.2MB

                                                                                                                        • memory/3484-250-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.2MB

                                                                                                                        • memory/3484-189-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.2MB

                                                                                                                        • memory/3704-283-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          380KB

                                                                                                                        • memory/3704-292-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          972KB

                                                                                                                        • memory/3704-291-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          380KB

                                                                                                                        • memory/3704-288-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          380KB

                                                                                                                        • memory/3704-285-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          380KB

                                                                                                                        • memory/3704-284-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          380KB

                                                                                                                        • memory/3796-177-0x0000000000400000-0x000000000044B000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          300KB

                                                                                                                        • memory/3796-167-0x00000000005C7000-0x00000000005DC000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          84KB

                                                                                                                        • memory/3796-168-0x0000000000030000-0x0000000000039000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          36KB

                                                                                                                        • memory/3796-169-0x0000000000400000-0x000000000044B000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          300KB

                                                                                                                        • memory/3868-351-0x0000000000410000-0x000000000081F000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.1MB

                                                                                                                        • memory/3868-359-0x0000000000410000-0x000000000081F000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.1MB

                                                                                                                        • memory/3992-441-0x000002483029D000-0x00000248302A0000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          12KB

                                                                                                                        • memory/3992-442-0x000002483029D000-0x00000248302A0000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          12KB

                                                                                                                        • memory/3992-436-0x0000024842E10000-0x0000024842F10000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1024KB

                                                                                                                        • memory/3992-433-0x000002482F9A0000-0x000002482F9C0000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          128KB

                                                                                                                        • memory/3992-432-0x000002482F9A0000-0x000002482F9C0000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          128KB

                                                                                                                        • memory/3992-443-0x000002483029D000-0x00000248302A0000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          12KB

                                                                                                                        • memory/4212-329-0x0000019F12F40000-0x0000019F12F4F000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          60KB

                                                                                                                        • memory/4320-315-0x000002558AA80000-0x000002558AA8F000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          60KB

                                                                                                                        • memory/4324-321-0x000001F43B0F0000-0x000001F43B0FF000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          60KB

                                                                                                                        • memory/4368-257-0x0000000000875000-0x0000000000907000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          584KB

                                                                                                                        • memory/4604-143-0x0000000000400000-0x0000000000459000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          356KB

                                                                                                                        • memory/4604-141-0x000000000072D000-0x000000000073E000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          68KB

                                                                                                                        • memory/4604-142-0x0000000000400000-0x0000000000459000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          356KB

                                                                                                                        • memory/4852-325-0x000001E7BAF90000-0x000001E7BAF9F000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          60KB

                                                                                                                        • memory/4984-188-0x0000000000400000-0x00000000007DC000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          3.9MB

                                                                                                                        • memory/4984-164-0x0000000000400000-0x00000000007DC000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          3.9MB

                                                                                                                        • memory/4984-165-0x0000000000400000-0x00000000007DC000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          3.9MB

                                                                                                                        • memory/4984-162-0x0000000000400000-0x00000000007DC000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          3.9MB

                                                                                                                        • memory/4984-166-0x0000000000400000-0x00000000007DC000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          3.9MB

                                                                                                                        • memory/4984-234-0x0000000000400000-0x00000000007DC000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          3.9MB