Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/11/2024, 19:44

General

  • Target

    4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe

  • Size

    10KB

  • MD5

    ed6b7fa2b46bebbeabc7dc7e0b01718d

  • SHA1

    0a019805abb8542c37cb30796ef9c38ae1485086

  • SHA256

    4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43

  • SHA512

    4d6d16438c72e23bb13cf0a26120cef042bd631382f80e3fb4ab38ff5bde7d9a0ec1e3b10ed4317906d2da38bf0a2b111d4de1df54fc645ff9fa506455ba3649

  • SSDEEP

    192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KYN:xlwwHe/20PKn/cLTlHuptYcFwVc03Km

Malware Config

Extracted

Family

xworm

C2

exonic-hacks.com:1920

87.120.112.33:8398

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    Windows.exe

Extracted

Family

quasar

Version

1.4.0

Botnet

Office04

C2

69.160.242.105:4782

69.160.242.105:11066

Mutex

66661e0f-33c3-4f2f-88be-1634de535cd1

Attributes
  • encryption_key

    CBED6820557E8011D93BA51D49F569DE8C1F98B4

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    java updater

  • subdirectory

    SubDir

Extracted

Family

xworm

Version

5.0

C2

21.ip.gl.ply.gg:53668

Mutex

7O2T2vhzLN6GgFLY

Attributes
  • install_file

    USB.exe

aes.plain

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

192.168.43.241:4782

Mutex

0517af80-95f0-4a6d-a904-5b7ee8faa157

Attributes
  • encryption_key

    6095BF6D5D58D02597F98370DFD1CCEB782F1EDD

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    svhost

  • subdirectory

    SubDir

Signatures

  • Detect Xworm Payload 6 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 4 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 27 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 37 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 29 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe
    "C:\Users\Admin\AppData\Local\Temp\4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Users\Admin\AppData\Local\Temp\Files\Opdxdyeul.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\Opdxdyeul.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2332
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3972
      • C:\Users\Admin\AppData\Local\Temp\Files\Opdxdyeul.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\Opdxdyeul.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2800
    • C:\Users\Admin\AppData\Local\Temp\Files\freedom.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\freedom.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3360
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\freedom.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1124
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'freedom.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3584
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\Windows.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3664
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3544
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows" /tr "C:\Users\Admin\Windows.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2908
    • C:\Users\Admin\AppData\Local\Temp\Files\document.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\document.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4784
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\document.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3908
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'document.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2564
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2648
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5296
    • C:\Users\Admin\AppData\Local\Temp\Files\FreeYoutubeDownloader.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\FreeYoutubeDownloader.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5716
      • C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe
        "C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:5552
    • C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5300
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2720
      • C:\Windows\system32\SubDir\Client.exe
        "C:\Windows\system32\SubDir\Client.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:6072
        • C:\Windows\SYSTEM32\schtasks.exe
          "schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:5880
    • C:\Users\Admin\AppData\Local\Temp\Files\Autoupdate.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\Autoupdate.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:336
    • C:\Users\Admin\AppData\Local\Temp\Files\dos.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\dos.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:4928
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /c "C:\Windows\System32\svhost.exe"
        3⤵
          PID:1568
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c <!DOCTYPE html> <!--[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]--> <!--[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]--> <!--[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]--> <!--[if gt IE 8]><!--> <html class="no-js" lang="en-US"> <!--<![endif]--> <head> <title>Suspected phishing site | Cloudflare</title> <meta charset="UTF-8" /> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <meta http-equiv="X-UA-Compatible" content="IE=Edge" /> <meta name="robots" content="noindex, nofollow" /> <meta name="viewport" content="width=device-width,initial-scale=1" /> <link rel="stylesheet" id="cf_styles-css" href="/cdn-cgi/styles/cf.errors.css" /> <!--[if lt IE 9]><link rel="stylesheet" id='cf_styles-ie-css' href="/cdn-c
          3⤵
            PID:2540
          • C:\Windows\SYSTEM32\cmd.exe
            cmd.exe /c "C:\Windows\System32\svhost.exe"
            3⤵
              PID:2724
            • C:\Windows\SYSTEM32\cmd.exe
              cmd.exe /c gi/styles/cf.errors.ie.css" /><![endif]--> <style>body{margin:0;padding:0}</style> <!--[if gte IE 10]><!--> <script> if (!navigator.cookieEnabled) { window.addEventListener('DOMContentLoaded', function () { var cookieEl = document.getElementById('cookie-alert'); cookieEl.style.display = 'block'; }) } </script> <!--<![endif]--> </head> <body> <div id="cf-wrapper"> <div class="cf-alert cf-alert-error cf-cookie-error" id="cookie-alert" data-translate="enable_cookies">Please enable cookies.</div> <div id="cf-error-details" class="cf-error-details-wrapper"> <div class="cf-section cf-wrapper" style="margin-top: 100px;margin-bottom:200px;"> <div class="cf-columns one"> <div class="cf-column"> <h4 class="cf-text-error"><i class="cf-icon-exclamation-sign" style="background-size: 18px; height: 18px; width: 18px; margin-bottom: 2px;"></i> Warning</h4> <h2 style="margin: 16px 0;">Suspected Phishing</h2> <strong>This website has been reported for potential phishing.</strong> <p>Phishing is when a site attempts to steal sensitive information by falsely presenting as a safe source.</p> <p> <a href="https://www.cloudflare.com/learning/acce
              3⤵
                PID:3648
              • C:\Windows\SYSTEM32\cmd.exe
                cmd.exe /c ss-management/phishing-attack/" class="cf-btn" style="background-color: #404040; color: #fff; border: 0;">Learn More</a> <form action="/cdn-cgi/phish-bypass" method="GET" enctype="text/plain"> <input type="hidden" name="atok" value="XR5LB6NlrBnF3cfMXhhsna4KY88E.eg0r.WDPtkmltA-1731872796-0.0.1.1-/json.php?token=ewogICJjcHVDb3JlcyI6ICI4IiwKICAidG90YWxNZW1vcnkiOiAiODE5MiBNQiIsCiAgInBsYXRmb3JtIjogIldpbmRvd3MiLAogICJhcmNoIjogIng2NCIsCiAgIm1vZGVsIjogIkdZSEFTT0xTIiwKICAib3NWZXJzaW9uIjogIk1pY3Jvc29mdCBXaW5kb3dzIDEwIiwKICAicHJvY2Vzc29yTmFtZSI6ICJJbnRlbCBDb3JlIFByb2Nlc3NvciAoQnJvYWR3ZWxsKSIsCiAgInN5c3RlbU1vZGVsIjogIlVua25vd24gTW9kZWwiLAogICJjb25maWd1cmF0aW9uIjogIjMiLAogICJ0b2tlbiI6ICJZb3VyX1NlY3JldF9Ub2tlbiIKfQ=="> <button type="submit" class="cf-btn cf-btn-danger" style="color: #bd2426; background: transparent;" data-translate="dismiss_and_enter">Ignore & Proceed</button> </form> </p> </div> </div> </div><!-- /.section --> <div id="ts-blocks" style="display:none;"></div> <div class="cf-error-footer cf-wrapper w-240 lg:w-full py-10 sm:py-4 sm:px-8 mx-auto text-center sm:text-left border-solid border-0 border-t border-gray-300"> <p class="text-13"> <span class="cf-footer-item sm:block sm:mb
                3⤵
                  PID:5472
                • C:\Windows\SYSTEM32\cmd.exe
                  cmd.exe /c -1">Cloudflare Ray ID: <strong class="font-semibold">8e423a52cbf2ed0c</strong></span> <span class="cf-footer-separator sm:hidden">&bull;</span> <span id="cf-footer-item-ip" class="cf-footer-item hidden sm:block sm:mb-1"> Your IP: <button type="button" id="cf-footer-ip-reveal" class="cf-footer-ip-reveal-btn">Click to reveal</button> <span class="hidden" id="cf-footer-ip">181.215.176.83</span> <span class="cf-footer-separator sm:hidden">&bull;</span> </span> <span class="cf-footer-item sm:block sm:mb-1"><span>Performance &amp; security by</span> <a rel="noopener noreferrer" href="https://www.cloudflare.com/5xx-error-landing" id="brand_link" target="_blank">Cloudflare</a></span> </p> <script>(function(){function d(){var b=a.getElementById("cf-footer-item-ip"),c=a.getElementById("cf-footer-ip-reveal");b&&"classList"in b&&(b.classList.remove("hidden"),c.addEventListener("click",function(){c.classList.add("hidden");a.getElementById("cf-footer-ip").classList.remove("hidden")}))}var a=document;document.addEventListener&&a.addEventListener("DOMContentLoaded",d)})();</script> </div><!-- /.error-footer --> </div><!-- /#cf-error-details --> </div><!-- /#cf-wrapper --> <script> window._cf_translation = {}; </script> </body> </html>
                  3⤵
                    PID:1980
                  • C:\Windows\SYSTEM32\cmd.exe
                    cmd.exe /c "C:\Windows\System32\svhost.exe"
                    3⤵
                      PID:4264
                    • C:\Windows\SYSTEM32\cmd.exe
                      cmd.exe /c "C:\Windows\System32\svhost.exe"
                      3⤵
                        PID:1716
                      • C:\Windows\SYSTEM32\cmd.exe
                        cmd.exe /c "C:\Windows\System32\svhost.exe"
                        3⤵
                          PID:5240
                        • C:\Windows\SYSTEM32\cmd.exe
                          cmd.exe /c "C:\Windows\System32\svhost.exe"
                          3⤵
                            PID:5156
                          • C:\Windows\SYSTEM32\cmd.exe
                            cmd.exe /c "C:\Windows\System32\svhost.exe"
                            3⤵
                              PID:5184
                            • C:\Windows\SYSTEM32\cmd.exe
                              cmd.exe /c "C:\Windows\System32\svhost.exe"
                              3⤵
                                PID:5564
                              • C:\Windows\SYSTEM32\cmd.exe
                                cmd.exe /c "C:\Windows\System32\svhost.exe"
                                3⤵
                                  PID:5608
                                • C:\Windows\SYSTEM32\cmd.exe
                                  cmd.exe /c "C:\Windows\System32\svhost.exe"
                                  3⤵
                                    PID:6032
                                  • C:\Windows\SYSTEM32\cmd.exe
                                    cmd.exe /c "C:\Windows\System32\svhost.exe"
                                    3⤵
                                      PID:5436
                                    • C:\Windows\SYSTEM32\cmd.exe
                                      cmd.exe /c "C:\Windows\System32\svhost.exe"
                                      3⤵
                                        PID:1852
                                      • C:\Windows\SYSTEM32\cmd.exe
                                        cmd.exe /c "C:\Windows\System32\svhost.exe"
                                        3⤵
                                          PID:5844
                                        • C:\Windows\SYSTEM32\cmd.exe
                                          cmd.exe /c "C:\Windows\System32\svhost.exe"
                                          3⤵
                                            PID:5904
                                          • C:\Windows\SYSTEM32\cmd.exe
                                            cmd.exe /c "C:\Windows\System32\svhost.exe"
                                            3⤵
                                              PID:5868
                                            • C:\Windows\SYSTEM32\cmd.exe
                                              cmd.exe /c "C:\Windows\System32\svhost.exe"
                                              3⤵
                                                PID:6112
                                              • C:\Windows\SYSTEM32\cmd.exe
                                                cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                3⤵
                                                  PID:460
                                                • C:\Windows\SYSTEM32\cmd.exe
                                                  cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                  3⤵
                                                    PID:1632
                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                    cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                    3⤵
                                                      PID:1056
                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                      cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                      3⤵
                                                        PID:1624
                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                        cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                        3⤵
                                                          PID:392
                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                          cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                          3⤵
                                                            PID:1804
                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                            cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                            3⤵
                                                              PID:4868
                                                            • C:\Windows\SYSTEM32\cmd.exe
                                                              cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                              3⤵
                                                                PID:4972
                                                              • C:\Windows\SYSTEM32\cmd.exe
                                                                cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                3⤵
                                                                  PID:1008
                                                                • C:\Windows\SYSTEM32\cmd.exe
                                                                  cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                  3⤵
                                                                    PID:4560
                                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                                    cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                    3⤵
                                                                      PID:1900
                                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                                      cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                      3⤵
                                                                        PID:4336
                                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                                        cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                        3⤵
                                                                          PID:3680
                                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                                          cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                          3⤵
                                                                            PID:632
                                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                                            cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                            3⤵
                                                                              PID:4256
                                                                            • C:\Windows\SYSTEM32\cmd.exe
                                                                              cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                              3⤵
                                                                                PID:3048
                                                                              • C:\Windows\SYSTEM32\cmd.exe
                                                                                cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                3⤵
                                                                                  PID:3300
                                                                                • C:\Windows\SYSTEM32\cmd.exe
                                                                                  cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                  3⤵
                                                                                    PID:5180
                                                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                                                    cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                    3⤵
                                                                                      PID:5272
                                                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                                                      cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                      3⤵
                                                                                        PID:4440
                                                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                                                        cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                        3⤵
                                                                                          PID:1160
                                                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                                                          cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                          3⤵
                                                                                            PID:4332
                                                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                                                            cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                            3⤵
                                                                                              PID:1312
                                                                                            • C:\Windows\SYSTEM32\cmd.exe
                                                                                              cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                              3⤵
                                                                                                PID:3632
                                                                                              • C:\Windows\SYSTEM32\cmd.exe
                                                                                                cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                3⤵
                                                                                                  PID:5520
                                                                                                • C:\Windows\SYSTEM32\cmd.exe
                                                                                                  cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                  3⤵
                                                                                                    PID:5240
                                                                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                                                                    cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                    3⤵
                                                                                                      PID:5752
                                                                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                                                                      cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                      3⤵
                                                                                                        PID:5184
                                                                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                                                                        cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                        3⤵
                                                                                                          PID:5276
                                                                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                                                                          cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                          3⤵
                                                                                                            PID:5668
                                                                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                                                                            cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                            3⤵
                                                                                                              PID:5324
                                                                                                            • C:\Windows\SYSTEM32\cmd.exe
                                                                                                              cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                              3⤵
                                                                                                                PID:5884
                                                                                                              • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                3⤵
                                                                                                                  PID:5784
                                                                                                                • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                  cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                  3⤵
                                                                                                                    PID:5924
                                                                                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                    cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                    3⤵
                                                                                                                      PID:1688
                                                                                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                      cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                      3⤵
                                                                                                                        PID:2280
                                                                                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                        cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                        3⤵
                                                                                                                          PID:5928
                                                                                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                          cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                          3⤵
                                                                                                                            PID:5304
                                                                                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                            cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                            3⤵
                                                                                                                              PID:1632
                                                                                                                            • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                              cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                              3⤵
                                                                                                                                PID:3976
                                                                                                                              • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                3⤵
                                                                                                                                  PID:1424
                                                                                                                                • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                  cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                  3⤵
                                                                                                                                    PID:1476
                                                                                                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                    cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                    3⤵
                                                                                                                                      PID:4348
                                                                                                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                      cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                      3⤵
                                                                                                                                        PID:3820
                                                                                                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                        cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                        3⤵
                                                                                                                                          PID:428
                                                                                                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                          cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                          3⤵
                                                                                                                                            PID:4688
                                                                                                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                            cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                            3⤵
                                                                                                                                              PID:1008
                                                                                                                                            • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                              cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                              3⤵
                                                                                                                                                PID:4520
                                                                                                                                              • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                3⤵
                                                                                                                                                  PID:1892
                                                                                                                                                • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                  cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                  3⤵
                                                                                                                                                    PID:2360
                                                                                                                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                    cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                    3⤵
                                                                                                                                                      PID:2792
                                                                                                                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                      cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                      3⤵
                                                                                                                                                        PID:5472
                                                                                                                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                        cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                        3⤵
                                                                                                                                                          PID:3972
                                                                                                                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                          cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                          3⤵
                                                                                                                                                            PID:3120
                                                                                                                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                            cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                            3⤵
                                                                                                                                                              PID:5076
                                                                                                                                                            • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                              cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                              3⤵
                                                                                                                                                                PID:3392
                                                                                                                                                              • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:5428
                                                                                                                                                                • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                  cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:5908
                                                                                                                                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                    cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:5752
                                                                                                                                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                      cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:4264
                                                                                                                                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                        cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:2140
                                                                                                                                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                          cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:6124
                                                                                                                                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                            cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:5860
                                                                                                                                                                            • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                              cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:4496
                                                                                                                                                                              • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:3588
                                                                                                                                                                                • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                  cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:1476
                                                                                                                                                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                    cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:6128
                                                                                                                                                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                      cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:1868
                                                                                                                                                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                        cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:4564
                                                                                                                                                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                          cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:4972
                                                                                                                                                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                            cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:5024
                                                                                                                                                                                            • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                              cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                              3⤵
                                                                                                                                                                                                PID:3892
                                                                                                                                                                                              • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                  PID:180
                                                                                                                                                                                                • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                  cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                    PID:5612
                                                                                                                                                                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                    cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                      PID:5564
                                                                                                                                                                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                      cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                        PID:1692
                                                                                                                                                                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                        cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:2864
                                                                                                                                                                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                          cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:5608
                                                                                                                                                                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                            cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                              PID:1860
                                                                                                                                                                                                            • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                              cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                PID:2400
                                                                                                                                                                                                              • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                                cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                  PID:5812
                                                                                                                                                                                                                • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                                  cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                    PID:4700
                                                                                                                                                                                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                                    cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                      PID:6136
                                                                                                                                                                                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                                      cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:4908
                                                                                                                                                                                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                                        cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:3936
                                                                                                                                                                                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                                          cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                            PID:4204
                                                                                                                                                                                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                                            cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                              PID:5768
                                                                                                                                                                                                                            • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                                              cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                PID:6040
                                                                                                                                                                                                                              • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                                                cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                  PID:2784
                                                                                                                                                                                                                                • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                                                  cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:1904
                                                                                                                                                                                                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                                                    cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                      PID:1636
                                                                                                                                                                                                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                                                      cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                        PID:1760
                                                                                                                                                                                                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                                                        cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                          PID:1892
                                                                                                                                                                                                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                                                          cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:5128
                                                                                                                                                                                                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                                                            cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                              PID:5760
                                                                                                                                                                                                                                            • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                                                              cmd.exe /c "C:\Windows\System32\svhost.exe"
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:3104
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\j86piuq9.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Files\j86piuq9.exe"
                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                              PID:5276
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\12.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Files\12.exe"
                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                              • Checks processor information in registry
                                                                                                                                                                                                                                              PID:5180
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                "C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Files\12.exe" & del "C:\ProgramData\*.dll"" & exit
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                PID:5780
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                                                                                                                                  timeout /t 5
                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                  • Delays execution with timeout.exe
                                                                                                                                                                                                                                                  PID:1360
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 5180 -s 1472
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                • Program crash
                                                                                                                                                                                                                                                PID:4148
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\MePaxil.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Files\MePaxil.exe"
                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                              PID:4600
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /k move Offensive Offensive.cmd & Offensive.cmd & exit
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                PID:5484
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                                                                                  tasklist
                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                  • Enumerates processes with tasklist
                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                  PID:2260
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                                                  findstr /I "wrsa.exe opssvc.exe"
                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                  PID:1028
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                                                                                  tasklist
                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                  • Enumerates processes with tasklist
                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                  PID:3152
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                                                  findstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"
                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                  PID:5448
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                  cmd /c md 543648
                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                  PID:5272
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                                                  findstr /V "BiddingVeRoutinesFilms" Bowling
                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                  PID:1160
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                  cmd /c copy /b ..\Suzuki + ..\Major + ..\Tit + ..\Adjust + ..\Invest + ..\Severe + ..\Sony + ..\Prefers E
                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                  PID:1596
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\543648\Legend.pif
                                                                                                                                                                                                                                                  Legend.pif E
                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                  • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                  PID:5772
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                    cmd /c schtasks.exe /create /tn "Keyboard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST
                                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                    PID:224
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                      schtasks.exe /create /tn "Keyboard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST
                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                      PID:5664
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                    schtasks.exe /create /tn "ScanGuard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.js'" /sc onlogon /F /RL HIGHEST
                                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                    PID:816
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\choice.exe
                                                                                                                                                                                                                                                  choice /d y /t 15
                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                  PID:5492
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\cayV0Deo9jSt417.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Files\cayV0Deo9jSt417.exe"
                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                              PID:5984
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\clip.exe
                                                                                                                                                                                                                                                "C:\Windows\SysWOW64\clip.exe"
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                • Adds Run key to start application
                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                PID:6132
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\System32\taskhost.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\System32\taskhost.exe"
                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                  PID:2784
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\golden.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Files\golden.exe"
                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                              PID:4940
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\golden.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Files\golden.exe"
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                PID:5296
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\random.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Files\random.exe"
                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                              • Modifies Windows Defender Real-time Protection settings
                                                                                                                                                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                                                              • Checks BIOS information in registry
                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                              • Identifies Wine through registry keys
                                                                                                                                                                                                                                              • Windows security modification
                                                                                                                                                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                              PID:5800
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\88aext0k.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Files\88aext0k.exe"
                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                              PID:3284
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\bildnewl.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Files\bildnewl.exe"
                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                              • Adds Run key to start application
                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                              PID:5464
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\ConsoleApp3.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Files\ConsoleApp3.exe"
                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                              PID:4952
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"
                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                PID:5500
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\discord.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Files\discord.exe"
                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                  PID:4584
                                                                                                                                                                                                                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                                                                                                                                    "schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                    PID:5560
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                      PID:220
                                                                                                                                                                                                                                                • C:\ProgramData\rtdmxlb\frdp.exe
                                                                                                                                                                                                                                                  C:\ProgramData\rtdmxlb\frdp.exe
                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                                                                  PID:3284
                                                                                                                                                                                                                                                  • C:\ProgramData\rtdmxlb\frdp.exe
                                                                                                                                                                                                                                                    "C:\ProgramData\rtdmxlb\frdp.exe"
                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                    PID:3312
                                                                                                                                                                                                                                                • C:\ProgramData\rtdmxlb\frdp.exe
                                                                                                                                                                                                                                                  C:\ProgramData\rtdmxlb\frdp.exe
                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                  PID:6000
                                                                                                                                                                                                                                                  • C:\ProgramData\rtdmxlb\frdp.exe
                                                                                                                                                                                                                                                    "C:\ProgramData\rtdmxlb\frdp.exe"
                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                    PID:1532
                                                                                                                                                                                                                                                • C:\Users\Admin\Windows.exe
                                                                                                                                                                                                                                                  C:\Users\Admin\Windows.exe
                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                  PID:3888
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5180 -ip 5180
                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                    PID:1460

                                                                                                                                                                                                                                                  Network

                                                                                                                                                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                  Replay Monitor

                                                                                                                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                                                                                                                  Downloads

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    2KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    2KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    968cb9309758126772781b83adb8a28f

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    8da30e71accf186b2ba11da1797cf67f8f78b47c

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    18KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    200581450bac64a79cb1f832556f478d

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    eea290ec114604e4004168a8e4c4610b3b88073b

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    11d5ed23304ac1f164c63592209113f57e187c6a6043d677e0de95630f4025ed

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    a78a826dae9d5e48e7a153ef27edba1af13765e08c23873e21d9cb3427275afc7e7e2233653f5b003cb229d53c956ba97c14f877444c56d0ad59b1d3dbd13a17

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    18KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    6c44d3bf9a7f6123dcec1e266d638a3b

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    98b6075c639e0a6e6ec724440bbe14947f1f817c

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    ba2c826363808e37cde8a0c2c26d86f2003d6ca78baaf7e3398efcaa462e1a93

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    c62200a07aae516abaf805cc4df22cc0b7f58a6921fbc93ee38835582a21617bcf11612eeaa87b59961d2ddff5974d3dc354774e9312bffd072318ce1e47ece4

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    18KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    94492fb9f7a57a18011f8999294505bd

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    a67251c293ae4af190460ec67446b8fa1d050c10

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    b36d62933ee0663b0d6457f889c71d48fb37ae7d6d2ad28ccfa6e7850457207e

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    1b92001988b288e1dfa3e30e63bb85776c91e271a37cc5d2cbd58ab7e06cbd2fbab7adcfa565e12638ce4102245015c04809082f26c709dc50dfb64cd6ac2032

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    18KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    c8f45f04e5476d60270ebe845aed366b

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    a99d2c6785447e5a13658535dc2037b7262bf09f

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    3811d328d18811742cde5b3c26958f699b206b69ff18ea221bcb74cb616cb927

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    b729459819a626cd77fefdbe275d5bdb95063631851d93399d44fb21916aedacbfd21214867f25b5e9a572c16ca52435597e861c222a54e9f7a8413e60809e9c

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    18KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    bdba0240f6acea2968360ac61b23c051

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    21528945a7edfcee0af4bf755e8a3f9e7e3d2d69

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    e4de8a064cd1bab871c7e50705510494e35d0aaf914c0202c9b76a90c65fae4b

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    f05c94087777ac1909bb6aee49f18a82d5c557ac07d6681045e60729d9f8e6599bc7d8310ab125342376868850b6d9ca5bd16988ddb1fb2cd2db044099b08aec

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    944B

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    9b80cd7a712469a4c45fec564313d9eb

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    6125c01bc10d204ca36ad1110afe714678655f2d

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    5a9e4969c6cdb5d522c81ce55799effb7255c1b0a9966a936d1dc3ff8fe2112d

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    ac280d2623c470c9dec94726a7af0612938723f3c7d60d727eb3c21f17be2f2049f97bc8303558be8b01f94406781ece0ada9a3bc51e930aff20bebb6ca17584

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    944B

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    d8cb3e9459807e35f02130fad3f9860d

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    5af7f32cb8a30e850892b15e9164030a041f4bd6

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    2b139c74072ccbdaa17b950f32a6dbc934dfb7af9973d97c9b0d9c498012ba68

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    045239ba31367fbdd59e883f74eafc05724e23bd6e8f0c1e7171ea2496a497eb9e0cfcb57285bb81c4d569daadba43d6ef64c626ca48f1e2a59e8d97f0cc9184

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\543648\E

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    538KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    f8e0529fb48efca8c0eede34c01e0033

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    85a42f025ae9a2227f2649df6652c929400a4aac

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    68b1bbcf0f6f6270afb451b41f81f6f5691759493640f6e2735276877c024dcb

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    b6192ad0efe9c04f803a5a14c09480d573ff94d6d50135ff85b2fa4e9ef52c4c04fcb99207be0e7fa4f3a2dba27b6d0b336e111cc3ae678a05761132dadf8f54

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\543648\Legend.pif

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    872KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    c56b5f0201a3b3de53e561fe76912bfd

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    2a4062e10a5de813f5688221dbeb3f3ff33eb417

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Adjust

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    50KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    35e5ab29f9dc36806b7db16d46ed7ede

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    527d6aa79dca3a83dca41245240507996a1b0ae3

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    c6ab18d27ef2d0e9b01a3502b9ef292ac9d5a4bd045db792d8d3b4188c30f8c1

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    754c57e8fcd56f149dbfd6606c029071cae23bd9d658961b853c03830cb8150d444f1e365ed8651ab5accf4b6e5fc1184c42f5e1d1cead261eee04268152309b

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Bowling

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    608B

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    1100e2dc0abbc946984508a57c2dcc6a

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    a46249d3d6aebb480f6c948aff6f065ad3ce6721

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    87cf4bc82402b0ee787dd23867496ee383cc24c397fe54372a0e2fcc1c6bf206

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    c2c4cb619a76ee8f6ccefeb712b11a25c1c475db088aeab5dad6978536a2eca710f31a73d183062c83ce272cf0534b53c2d4f40db203a4b7a3b8bfa5e9390fd7

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Cafe

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    872KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    be7ece0a176b5396ed2e80dfd1c7d424

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    ea19b37edc7d7cef563094860af09900898fe467

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    4d448ab30a84c345178b92911192046923db0badece1146f0adda3f0af1417d8

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    ef006bad40449dca5569f113d8eebcef718f3754a5455b1bd31ef61ab59c5b096b24663da60173edb1741bd045f588823144e63b2e62b681abd7e5b95f2c906b

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\12.exe

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    383KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    b38d20c6267b77ca35a55e11fb4124b7

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    bf17ad961951698789fa867d2e07099df34cdc7d

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    92281aaffbb198760aacd304df932fd58ba230d0927839d85db71dc7ae6f7d71

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    17fc8504582edc41db8b62ca1e5238427ddea19b24d2efceb7c765903b8395b3276e4f4dc9df55c60a77b47e0d09491e16dbda18e82a4d6bfa6ed7cad5b8947e

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\88aext0k.exe

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    4.9MB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    3d375d10b594f69c51b80948ec0e4c03

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    439779b78363df27d5874efb256aa5e415e0b8b3

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    8f861c2089520549eb6c1eb3cba713a8316ffe9f3573199e27cb48bd5e1ca704

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    635d39a32aa3c01cf2d7c5910639da9dbc7f661daba92d0b6c6d543123aa84bfac86dc7c72d6f88ace93d4d2b520e5020094d11f8d78c6859ea68265e8dad560

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\Autoupdate.exe

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    1.6MB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    3042ed65ba02e9446143476575115f99

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    283742fd4ada6d03dec9454fbe740569111eaaaa

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    48f456ecc6360511504e7c3021d968ad647226115e9a5b2eb3aa5f21e539dca9

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    c847a171dad32dfb4acee102300a770500a18af5e086b61c348305d1d81af7525d7d62ca5b88c7c298884ad408137c5d9c2efb1e8294b29084fd8b5dd6b4ee3c

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    502KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    05aa0a6d16f1dabf72b4c880a5d357d0

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    4a3ebaa010ba5306cd09c07eb26bbe99ff46496f

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    fdba9e9d51c62d59de744a179a50ce9f5838af549f30f5b87c8175dace024fee

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    931a147bf27a8a14db99b8f6480dddfa2bd1e0b4aaa59092552ef93e9f93adddbcb71d7d9c7a1f45f7854e32d16555dc7f3be701a2df9578a9e99349e972758a

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\ConsoleApp3.exe

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    15KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    eb2e78bbb601facb768bd61a8e38b372

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    d51b9b3a138ae1bf345e768ee94efdced4853ff7

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    09d97363cb679a12a09d9795569b38193991362c3b6981d7154b17d34f36f8cf

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    5c2ce80953a39393a6a63c772390709e2140bf9b7e7a7765767bc5ae6fb27e52fa7f9237a918dd8060a83667f29ed47e12adef26127f183bea58859e93c3b9f4

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\FreeYoutubeDownloader.exe

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    396KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    13f4b868603cf0dd6c32702d1bd858c9

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    a595ab75e134f5616679be5f11deefdfaae1de15

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    cae57a60c4d269cd1ca43ef143aedb8bfc4c09a7e4a689544883d05ce89406e7

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    e0d7a81c9cdd15a4ef7c8a9492fffb2c520b28cebc54a139e1bffa5c523cf17dfb9ffe57188cf8843d74479df402306f4f0ce9fc09d87c7cca92aea287e5ff24

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\MePaxil.exe

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    bbe6311c3e2fab459f729dc8cd6e3519

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    b71993aafd6627e55657819826c67f64f764c77f

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    95fb9ca82017f2a6bc59df0d72fc6f90043e135799d25e9922d4943da4c36874

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    33fb4936db966d0f285a48b09700716eadcdc19212c3e234f34dc0e497e55f01f493956aa86de438a3c65ba8e112d6ee1f3cd0ff9aee3cda1f686cc68dc77a47

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\Opdxdyeul.exe

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    894KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    cee58644e824d57927fe73be837b1418

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    698d1a11ab58852be004fd4668a6f25371621976

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    4235c78ffaf12c4e584666da54cfc5dc56412235f5a2d313dcac07d1314dd52e

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    ab9e9083ed107b5600f802ec66dab71f1064377749b6c874f8ce6e9ce5b2718a1dc45372b883943a8eae99378d1151ce15983d4c9be67d559cd72b28b9f55fb5

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    36KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    909278699c09e6801b038d7089e68151

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    036bf462815304c97f06814f6327150095996be9

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    ca1af3b2a9b340be96e06d6ab18b3e21be455780b242cf395978eabc124e8d0c

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    b1af108e01d27c0481db58f2b4b847458bdc26484a91a30b31ce9afb82660cbd8b41874a7e1d951a3f9be4211522e39b1024c846b33e8656820361da451ece7c

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\bildnewl.exe

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    270KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    a1264b7a67771b5d0224d179edcd5a50

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    56a87bc817e8ccff749c27bdf997eab1f5930174

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    ab18f8db9ae857fe8a663d968223a605bfdc3a268b501a5d46eefa4495cbed6a

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    39662f4edfd298220c97a8c621cf7bf2beeca91ce2694052138715cd5ed6c3702182dd9cee1c0ec746ca80efc9001e9e20d289649f2b65c1c2c10459f52ba2a0

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\cayV0Deo9jSt417.exe

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    958KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    aa3cdd5145d9fb980c061d2d8653fa8d

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    de696701275b01ddad5461e269d7ab15b7466d6a

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    4be32b5e9eaffa8d3f4cce515717faa6259373e8dbd258b9ebc2534fd0b62aaa7043093204e43627983fe332f63d8f998a90dc1cbb74f54a18c55f67e42a8a32

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\discord.exe

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    3.1MB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    6a0bb84dcd837e83638f4292180bf5ab

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    20e31ccffe1ac806e75ea839ea90b4c91e4322c5

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    e119fe767f3d10a387df1951d4b356384c5a9d0441b4034ddf7293c389a410b4

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    d0d61815c1ca73e4d1b8d5c3ea61e0572bfa9f6e984247b8e66c22e5591d61f766c6476c2686ce611917a56f2d4d8b8ddb4efcdbed707855e4190a2404eedcc5

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\document.exe

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    1.8MB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    1a76cd545f61ab6f965ae5993b17ce2f

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    900c219ab0607cec8bbf66db64c66e73272060e4

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    44f611726336cec3fa65ba287bf135af2cd43c6441ead65ce4a54c154ea80f90

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    78515c77b7d93f23203269771a2f75a47910070c3173516e541c6c566f8e016eb96d53cbf4850b5ba5d33c81d59f99f47400e2fffe0c479ef5e77532731993c9

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\dos.exe

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    420KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    a2163bf270762a1deec37145f2ef5267

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    b6082a92aeea2d0687f21c42f2c7032db900ce8e

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    e0d09374471bb956744258603669a06473cc5920b6096928ac345c640d089403

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    03a06efc6289688fcca8a1f832c84823d26b329b753a8d67656effb18d24422a34aca876232f36e44f50599df295ea2064f42df26d390f4d41456b9d5535bef9

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\freedom.exe

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    94KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    db5717fd494495eea3c8f7d4ab29d6b0

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    39ba82340121d9b08e9cf3d4ba6dfcb12eb6c559

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    6b59309ab12f1859a94fb2ce1c98639b2a538e6e098ffac127e45c29733bd993

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    b16c7bffc8418a0349e5189d61439df325d2ab33a42c720380a305decde00348f83d96b6c263a95dc253128eb0e47b1a3dc96f8f115da868ff9227b9a40882de

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\golden.exe

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    541KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    f98be4f384d18834c9f4c22c7046a5ff

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    b977887e63969e90102cfa716246cc9957349241

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    03b8845707f2c1c31d9a756e7f46323b032037bc92bf3dc3243d07c013062eda

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    f47e4708f63d5c451fb4c01e90ab3436a05b136c2605d6957d43f030a008415a918c750b2530eb3256c8552c799b7f8034e2b7ce90881386f44bb65bcdba8755

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\j86piuq9.exe

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    5.3MB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    06283d3cde5addad32a1ad13cfc125a8

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    6a271f81f09c66dfb3618d304b34a7335a9d0584

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    1ed77857300416e4e4ea9177637598e7000bf53ba8c4194aec4ccc61ea29106f

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    260ac791f05b69a3f0d08abdceb31346652a8250e11e750452869955f60125decedcdd765eecd72a696d60809db4d1281a7facdd05eac761ca8aa11e0c6a0268

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\random.exe

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    2.6MB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    fe75f0e739e3889f3169358abc660e60

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    7956287cd78f9823a1bbf9aa9b3d5121cd55785b

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    f9726e10c350b4199dde3b4bdaa6716a35fd1817a2659192762d1463e511d308

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    cccaaef343f6659f719062b0819a7304f05cf526251826548200d06dc9809cb48ead0b939abc0f6139a4877b9234e9dacf8a756c40cd607ddef692d256676f19

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Invest

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    90KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    2650bd0e98cced157856b15c55a48398

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    b8b509ad22f350d600cd4ac612a5eb3d61db3f02

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    f6b5de9758a1baa8f31e584bb5e5427365a7d08679931328d6ae9ddf1b6c99ec

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    db3693cc106df3b097b8b3b97236819792bb04afead5e13679fdcc21765fd348502dae64eade646815fb7cd3745f190ed8d8a071f6d5f29cb36ffd08c9193e14

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Major

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    97KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    5365ad26fbf55fbb238379160f3819ae

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    6e33efe060d8fc424f5c850107ad4794c66daec1

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    5749f6b429f9fbd508b810c6e99504e19036a93374d83eabd7171cb625627ae6

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    861b76e0f60d055c7cf2b51d5a4aa21848664b57fa387d83e9c36c23dd0044bacb0bb8e5a8630062604871197b7050e82101c91dd2b809e8c5208eb86fa22e52

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Offensive

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    10KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    ba741ea1fd350411ba286e3807deb915

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    885f5b96f704a4e5fbefbb6c8b82274ead6ffeb0

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    adcf5ed9c2a1ab99e0e91306fa3e2d828902c989046d7cff497a4b864ffac5f3

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    e4f9ea218752cfe4f8a4241c7bfa8d87f2fb0fcc1c5ca679105f42a4c1bb9c692b70cea3e60cfb50cc24af2eefc2bfe80bfecd54cbcec51ef523199251efaf9b

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Prefers

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    32KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    3800b719c54c939f9c41642d3f0c0dc9

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    2f4e8b5ad282ff727f23ff8b98f82427bc88d263

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    d2fafbf46e5741896ca37681386c1af4f847d2bae11592be569ed41d7e50702b

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    b0f73c110f28091ae5c786ce9c5970ea2d4c728abfc4aacb926892712d04a0d5bb0d912ef5cf27a19b529cfcae2bf5f63ddaa77f4e39e49f7d67ce240d9f35e5

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Severe

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    50KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    af2b7ee3e48e5404c5b8e4af9767ab3d

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    18b0119b67a01719b7e968e2296676565a273264

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    5748c19741e9877d8abeb2f593a158bd39195c9c1433129ebdb6858381283aee

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    2472c62e1c65d3a03a293daae3eb162b42bdfc536907f4b1bb63d86315e3540cc8fd641d2b26183cc230884b6cc74cafb805c913c09b991ba3d4699ed8ed4129

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Sony

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    62KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    bbdea5ac69d32176c7cf0af7749cdf12

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    39c66e4bcad18e9bb4400a579d44f177daf63ecc

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    8d1c9abd9b4a2f0a19f9a003280e1ffaddfd4c55b3fbef43b4aa97c7d3d280e3

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    e6021102ecba902d998601f4f857f973ff24edd7012fb1c3f9fef557f966a023ab241ac3f54aeaaf887e19560a805eaf77d593cfa7efd659a137faf4dbf53704

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Suzuki

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    87KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    c4cf8fa43e79df7fa6259198175880f4

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    e9097784729e777188629e9c7c59cb0a0c6c6cd8

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    f40e0aa9ee1be08178cde5ff9c25253e70c4c08cd7311722a749be0ebfcb49eb

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    786cf3a41fa4d55999fd15ce6b1f89c1189f3212b181e2e0f2b3262e24669453cc99d587b3c70ddbf098117d5b5d3e4b7bf034e288bec61672bcdc29a131642e

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Tit

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    70KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    9ff7f4f0f216def9dd325d9b667be06e

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    f2cc8a82c99dc8bc38624e7aaa31fd29047f19dd

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    7639decc3f03f22ed96230e5bfb619419d2523a56cb0b6cccf6ad6c66d5219e8

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    83984918784fb08d6392d5a565578d9caa60218aba2ecfe255e3d809e0f7a48f36da68aea87fbca19a12d6bd83cbcc9aa24f021b14bafda68a2b90fb58ac4b30

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_raxl2tp3.c1j.ps1

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    60B

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\System32\taskhost.exe

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    24KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    e40cb198ebcd20cd16739f670d4d7b74

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    e898a3b321bd6734c5a676382b5c0dfd42be377d

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    6cdc8d3c147dcf7253c0fb7bb552b4ae918aba4058cc072a2320a7297d4fbed7

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    1e5a68b2ae30c7d16a0a74807fa069be2d1b8adcfcbcde777217b9420a987196af13fb05177e476157029a1f7916e6948a1286cdb8957cdd142756da3c42beef

                                                                                                                                                                                                                                                  • C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    153KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    f33a4e991a11baf336a2324f700d874d

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    9da1891a164f2fc0a88d0de1ba397585b455b0f4

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    a87524035509ff7aa277788e1a9485618665b7da35044d70c41ec0f118f3dfd7

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    edf066968f31451e21c7c21d3f54b03fd5827a8526940c1e449aad7f99624577cbc6432deba49bb86e96ac275f5900dcef8d7623855eb3c808e084601ee1df20

                                                                                                                                                                                                                                                  • memory/336-2486-0x000000001BDB0000-0x000000001C27E000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    4.8MB

                                                                                                                                                                                                                                                  • memory/336-2487-0x000000001B780000-0x000000001B81C000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    624KB

                                                                                                                                                                                                                                                  • memory/336-2489-0x0000000001000000-0x0000000001008000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    32KB

                                                                                                                                                                                                                                                  • memory/336-2506-0x0000000001180000-0x0000000001190000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    64KB

                                                                                                                                                                                                                                                  • memory/1124-2428-0x000001D179870000-0x000001D179892000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    136KB

                                                                                                                                                                                                                                                  • memory/2332-25-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-33-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-1102-0x00000000744D0000-0x0000000074C80000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    7.7MB

                                                                                                                                                                                                                                                  • memory/2332-1103-0x00000000744D0000-0x0000000074C80000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    7.7MB

                                                                                                                                                                                                                                                  • memory/2332-1104-0x00000000744D0000-0x0000000074C80000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    7.7MB

                                                                                                                                                                                                                                                  • memory/2332-81-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-77-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-75-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-73-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-71-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-85-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-79-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-53-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-1100-0x00000000744D0000-0x0000000074C80000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    7.7MB

                                                                                                                                                                                                                                                  • memory/2332-52-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-69-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-67-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-65-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-63-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-59-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-57-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-55-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-49-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-47-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-45-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-43-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-41-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-39-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-37-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-1101-0x00000000744D0000-0x0000000074C80000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    7.7MB

                                                                                                                                                                                                                                                  • memory/2332-31-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-1150-0x00000000067B0000-0x0000000006D54000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    5.6MB

                                                                                                                                                                                                                                                  • memory/2332-1151-0x0000000005470000-0x00000000054C4000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    336KB

                                                                                                                                                                                                                                                  • memory/2332-1157-0x00000000744D0000-0x0000000074C80000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    7.7MB

                                                                                                                                                                                                                                                  • memory/2332-1096-0x0000000004F40000-0x0000000004F8C000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                                                  • memory/2332-17-0x00000000744D0000-0x0000000074C80000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    7.7MB

                                                                                                                                                                                                                                                  • memory/2332-1095-0x00000000051D0000-0x0000000005228000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    352KB

                                                                                                                                                                                                                                                  • memory/2332-21-0x0000000005080000-0x000000000515C000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    880KB

                                                                                                                                                                                                                                                  • memory/2332-23-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-16-0x00000000005A0000-0x0000000000686000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    920KB

                                                                                                                                                                                                                                                  • memory/2332-1094-0x00000000744D0000-0x0000000074C80000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    7.7MB

                                                                                                                                                                                                                                                  • memory/2332-20-0x0000000004FA0000-0x000000000507A000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    872KB

                                                                                                                                                                                                                                                  • memory/2332-22-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-61-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-19-0x00000000744D0000-0x0000000074C80000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    7.7MB

                                                                                                                                                                                                                                                  • memory/2332-83-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-29-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-27-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2332-36-0x0000000005080000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    856KB

                                                                                                                                                                                                                                                  • memory/2564-2300-0x000000006F0F0000-0x000000006F13C000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                                                  • memory/2648-2323-0x000000006F0F0000-0x000000006F13C000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                                                  • memory/3008-3-0x00000000744D0000-0x0000000074C80000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    7.7MB

                                                                                                                                                                                                                                                  • memory/3008-18-0x00000000744D0000-0x0000000074C80000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    7.7MB

                                                                                                                                                                                                                                                  • memory/3008-2-0x0000000004F60000-0x0000000004FFC000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    624KB

                                                                                                                                                                                                                                                  • memory/3008-1-0x00000000006A0000-0x00000000006A8000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    32KB

                                                                                                                                                                                                                                                  • memory/3008-0-0x00000000744DE000-0x00000000744DF000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    4KB

                                                                                                                                                                                                                                                  • memory/3008-15-0x00000000744DE000-0x00000000744DF000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    4KB

                                                                                                                                                                                                                                                  • memory/3360-1171-0x00000000003E0000-0x00000000003FE000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    120KB

                                                                                                                                                                                                                                                  • memory/3908-1903-0x0000000007740000-0x00000000077E3000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    652KB

                                                                                                                                                                                                                                                  • memory/3908-2288-0x0000000007A40000-0x0000000007A54000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    80KB

                                                                                                                                                                                                                                                  • memory/3908-2287-0x0000000007A10000-0x0000000007A21000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    68KB

                                                                                                                                                                                                                                                  • memory/3908-1773-0x000000006F0F0000-0x000000006F13C000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                                                  • memory/3908-1198-0x0000000006A30000-0x0000000006A7C000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                                                  • memory/3908-1196-0x0000000005F20000-0x0000000006274000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    3.3MB

                                                                                                                                                                                                                                                  • memory/3972-1139-0x00000000079D0000-0x00000000079EA000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    104KB

                                                                                                                                                                                                                                                  • memory/3972-1126-0x000000006F550000-0x000000006F59C000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                                                  • memory/3972-1146-0x0000000007CF0000-0x0000000007CF8000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    32KB

                                                                                                                                                                                                                                                  • memory/3972-1145-0x0000000007D10000-0x0000000007D2A000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    104KB

                                                                                                                                                                                                                                                  • memory/3972-1144-0x0000000007C10000-0x0000000007C24000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    80KB

                                                                                                                                                                                                                                                  • memory/3972-1143-0x0000000007C00000-0x0000000007C0E000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    56KB

                                                                                                                                                                                                                                                  • memory/3972-1142-0x0000000007BD0000-0x0000000007BE1000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    68KB

                                                                                                                                                                                                                                                  • memory/3972-1141-0x0000000007C50000-0x0000000007CE6000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    600KB

                                                                                                                                                                                                                                                  • memory/3972-1140-0x0000000007A40000-0x0000000007A4A000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    40KB

                                                                                                                                                                                                                                                  • memory/3972-1105-0x0000000002D80000-0x0000000002DB6000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    216KB

                                                                                                                                                                                                                                                  • memory/3972-1138-0x0000000008010000-0x000000000868A000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    6.5MB

                                                                                                                                                                                                                                                  • memory/3972-1137-0x00000000078E0000-0x0000000007983000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    652KB

                                                                                                                                                                                                                                                  • memory/3972-1136-0x0000000006C50000-0x0000000006C6E000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    120KB

                                                                                                                                                                                                                                                  • memory/3972-1149-0x00000000744D0000-0x0000000074C80000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    7.7MB

                                                                                                                                                                                                                                                  • memory/3972-1125-0x0000000006CA0000-0x0000000006CD2000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    200KB

                                                                                                                                                                                                                                                  • memory/3972-1124-0x00000000066D0000-0x000000000671C000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                                                  • memory/3972-1123-0x00000000066A0000-0x00000000066BE000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    120KB

                                                                                                                                                                                                                                                  • memory/3972-1122-0x0000000006100000-0x0000000006454000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    3.3MB

                                                                                                                                                                                                                                                  • memory/3972-1112-0x0000000006090000-0x00000000060F6000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    408KB

                                                                                                                                                                                                                                                  • memory/3972-1111-0x0000000005FB0000-0x0000000006016000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    408KB

                                                                                                                                                                                                                                                  • memory/3972-1110-0x00000000056E0000-0x0000000005702000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    136KB

                                                                                                                                                                                                                                                  • memory/3972-1109-0x00000000744D0000-0x0000000074C80000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    7.7MB

                                                                                                                                                                                                                                                  • memory/3972-1107-0x0000000005980000-0x0000000005FA8000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    6.2MB

                                                                                                                                                                                                                                                  • memory/3972-1108-0x00000000744D0000-0x0000000074C80000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    7.7MB

                                                                                                                                                                                                                                                  • memory/3972-1106-0x00000000744D0000-0x0000000074C80000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    7.7MB

                                                                                                                                                                                                                                                  • memory/4584-3775-0x00000000006E0000-0x0000000000A04000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    3.1MB

                                                                                                                                                                                                                                                  • memory/4784-2357-0x0000000008E50000-0x0000000008EE2000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    584KB

                                                                                                                                                                                                                                                  • memory/4784-1183-0x0000000000660000-0x0000000000AE6000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    4.5MB

                                                                                                                                                                                                                                                  • memory/4784-1184-0x0000000000660000-0x0000000000AE6000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    4.5MB

                                                                                                                                                                                                                                                  • memory/4784-1185-0x0000000000660000-0x0000000000AE6000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    4.5MB

                                                                                                                                                                                                                                                  • memory/4784-2358-0x00000000087F0000-0x00000000087FA000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    40KB

                                                                                                                                                                                                                                                  • memory/4784-2311-0x0000000000660000-0x0000000000AE6000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    4.5MB

                                                                                                                                                                                                                                                  • memory/4952-3753-0x0000000000BB0000-0x0000000000BB8000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    32KB

                                                                                                                                                                                                                                                  • memory/5296-2345-0x000000006F0F0000-0x000000006F13C000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                                                  • memory/5296-2343-0x0000000005810000-0x0000000005B64000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    3.3MB

                                                                                                                                                                                                                                                  • memory/5300-2406-0x0000000000200000-0x0000000000284000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    528KB

                                                                                                                                                                                                                                                  • memory/5464-3743-0x0000000000FC0000-0x000000000100A000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    296KB

                                                                                                                                                                                                                                                  • memory/5500-3764-0x00000000002E0000-0x00000000002EE000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    56KB

                                                                                                                                                                                                                                                  • memory/5552-2419-0x000001ED94150000-0x000001ED9417E000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    184KB

                                                                                                                                                                                                                                                  • memory/5800-3724-0x00000000007A0000-0x0000000000A4C000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    2.7MB

                                                                                                                                                                                                                                                  • memory/5800-3723-0x00000000007A0000-0x0000000000A4C000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    2.7MB

                                                                                                                                                                                                                                                  • memory/5800-3722-0x00000000007A0000-0x0000000000A4C000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    2.7MB

                                                                                                                                                                                                                                                  • memory/5984-3658-0x00000000057F0000-0x0000000005896000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    664KB

                                                                                                                                                                                                                                                  • memory/5984-3657-0x0000000004F10000-0x0000000004F2A000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    104KB

                                                                                                                                                                                                                                                  • memory/5984-3656-0x0000000000F60000-0x0000000000F68000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    32KB

                                                                                                                                                                                                                                                  • memory/5984-3655-0x0000000000610000-0x0000000000706000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    984KB

                                                                                                                                                                                                                                                  • memory/6072-2425-0x000000001C000000-0x000000001C050000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    320KB

                                                                                                                                                                                                                                                  • memory/6072-2426-0x000000001C110000-0x000000001C1C2000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    712KB