Resubmissions

27/02/2025, 06:33

250227-hbn4tszmx7 10

26/02/2025, 23:57

250226-3zn4ysxwc1 10

26/02/2025, 23:14

250226-271x2sxmz9 10

14/02/2025, 01:10

250214-bjsnnayne1 10

14/02/2025, 01:00

250214-bc5pmsymhw 10

13/02/2025, 05:01

250213-fnkwtstpgw 10

13/02/2025, 04:24

250213-e1kk6atmaz 10

13/02/2025, 04:08

250213-eqe8patkgx 8

12/02/2025, 23:56

250212-3yzt3azrdx 10

Analysis

  • max time kernel
    399s
  • max time network
    601s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    26/11/2024, 19:26

General

  • Target

    4363463463464363463463463.exe

  • Size

    10KB

  • MD5

    2a94f3960c58c6e70826495f76d00b85

  • SHA1

    e2a1a5641295f5ebf01a37ac1c170ac0814bb71a

  • SHA256

    2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce

  • SHA512

    fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f

  • SSDEEP

    192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftpcluster.loopia.se
  • Port:
    21
  • Username:
    srbreferee.com
  • Password:
    luka2005

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftpcluster.loopia.se
  • Port:
    21
  • Username:
    PRGUpdate
  • Password:
    hokejnaledu

Extracted

Family

redline

Botnet

Logs

C2

185.215.113.9:9137

Extracted

Family

quasar

Version

1.4.0.0

Botnet

Office

C2

82.117.243.110:5173

Mutex

edH11NGQWIdCwvLx00

Attributes
  • encryption_key

    aGPuRaDerdUDJPrAfXtB

  • install_name

    csrss.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Framework

  • subdirectory

    SubDir

Extracted

Family

lumma

C2

https://covvercilverow.shop/api

https://surroundeocw.shop/api

https://abortinoiwiam.shop/api

https://pumpkinkwquo.shop/api

https://priooozekw.shop/api

https://deallyharvenw.shop/api

https://defenddsouneuw.shop/api

https://racedsuitreow.shop/api

https://roaddrermncomplai.shop/api

https://p3ar11fter.sbs

https://3xp3cts1aim.sbs

https://owner-vacat10n.sbs

https://peepburry828.sbs

https://p10tgrace.sbs

https://befall-sm0ker.sbs

https://librari-night.sbs

https://processhol.sbs

Extracted

Family

amadey

Version

5.03

Botnet

7c4393

C2

http://185.215.113.217

Attributes
  • install_dir

    f9c76c1660

  • install_file

    corept.exe

  • strings_key

    9808a67f01d2f0720518035acbde7521

  • url_paths

    /CoreOPT/index.php

rc4.plain

Extracted

Family

phorphiex

C2

http://185.215.113.84

http://185.215.113.66

185.215.113.66

Extracted

Family

stealc

Botnet

default_valenciga

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

xworm

Version

3.1

Attributes
  • Install_directory

    %Port%

  • install_file

    USB.exe

Extracted

Family

asyncrat

Version

AsyncRAT

Botnet

Default

C2

yyyson22.gleeze.com:4608

Mutex

dw

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

xworm

C2

rates-north.gl.at.ply.gg:51537

second-spyware.gl.at.ply.gg:51537

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Extracted

Family

redline

Botnet

091024

C2

185.215.113.67:33160

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Detect Xworm Payload 4 IoCs
  • Detects ZharkBot payload 5 IoCs

    ZharkBot is a botnet written C++.

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Phorphiex family
  • Phorphiex payload 1 IoCs
  • Phorphiex, Phorpiex

    Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 3 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
  • Xmrig family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • ZharkBot

    ZharkBot is a botnet written C++.

  • Zharkbot family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Async RAT payload 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • XMRig Miner payload 10 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 34 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 8 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 30 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 36 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3592
      • C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe
        "C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3172
        • C:\Users\Admin\AppData\Local\Temp\Files\random.exe
          "C:\Users\Admin\AppData\Local\Temp\Files\random.exe"
          3⤵
          • Drops startup file
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2736
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3192
        • C:\Users\Admin\AppData\Local\Temp\Files\buildred.exe
          "C:\Users\Admin\AppData\Local\Temp\Files\buildred.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          PID:2152
        • C:\Users\Admin\AppData\Local\Temp\Files\t.exe
          "C:\Users\Admin\AppData\Local\Temp\Files\t.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:116
          • C:\Windows\sysnldcvmr.exe
            C:\Windows\sysnldcvmr.exe
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2508
            • C:\Users\Admin\AppData\Local\Temp\1656418357.exe
              C:\Users\Admin\AppData\Local\Temp\1656418357.exe
              5⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4692
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:2052
                • C:\Windows\system32\reg.exe
                  reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
                  7⤵
                    PID:3028
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2100
                  • C:\Windows\system32\schtasks.exe
                    schtasks /delete /f /tn "Windows Upgrade Manager"
                    7⤵
                      PID:4400
                • C:\Users\Admin\AppData\Local\Temp\252876509.exe
                  C:\Users\Admin\AppData\Local\Temp\252876509.exe
                  5⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1376
                  • C:\Users\Admin\AppData\Local\Temp\1731029541.exe
                    C:\Users\Admin\AppData\Local\Temp\1731029541.exe
                    6⤵
                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1812
                • C:\Users\Admin\AppData\Local\Temp\185791704.exe
                  C:\Users\Admin\AppData\Local\Temp\185791704.exe
                  5⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:4088
                • C:\Users\Admin\AppData\Local\Temp\2190823338.exe
                  C:\Users\Admin\AppData\Local\Temp\2190823338.exe
                  5⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:3900
                  • C:\Users\Admin\AppData\Local\Temp\1181816917.exe
                    C:\Users\Admin\AppData\Local\Temp\1181816917.exe
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:2136
            • C:\Users\Admin\AppData\Local\Temp\Files\hbfgjhhesfd.exe
              "C:\Users\Admin\AppData\Local\Temp\Files\hbfgjhhesfd.exe"
              3⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:3940
              • C:\Windows\SysWOW64\schtasks.exe
                "schtasks" /create /tn "Framework" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Files\hbfgjhhesfd.exe" /rl HIGHEST /f
                4⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:4268
            • C:\Users\Admin\AppData\Local\Temp\Files\ExtremeInjector.exe
              "C:\Users\Admin\AppData\Local\Temp\Files\ExtremeInjector.exe"
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1484
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                4⤵
                • System Location Discovery: System Language Discovery
                PID:2580
            • C:\Users\Admin\AppData\Local\Temp\Files\2.exe
              "C:\Users\Admin\AppData\Local\Temp\Files\2.exe"
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:3112
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                4⤵
                  PID:2820
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 452
                    5⤵
                    • Program crash
                    PID:3200
              • C:\Users\Admin\AppData\Local\Temp\Files\pei.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\pei.exe"
                3⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:3136
                • C:\Users\Admin\AppData\Local\Temp\1089610613.exe
                  C:\Users\Admin\AppData\Local\Temp\1089610613.exe
                  4⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:4784
              • C:\Users\Admin\AppData\Local\Temp\Files\RedSystem.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\RedSystem.exe"
                3⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:2860
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2860 -s 900
                  4⤵
                  • Program crash
                  PID:3036
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2860 -s 1052
                  4⤵
                  • Program crash
                  PID:4232
              • C:\Users\Admin\AppData\Local\Temp\Files\logon.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\logon.exe"
                3⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:1368
              • C:\Users\Admin\AppData\Local\Temp\Files\SVC.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\SVC.exe"
                3⤵
                • Executes dropped EXE
                PID:1576
              • C:\Users\Admin\AppData\Local\Temp\Files\rodda.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\rodda.exe"
                3⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:4080
              • C:\Users\Admin\AppData\Local\Temp\Files\BitcoinCore.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\BitcoinCore.exe"
                3⤵
                • Executes dropped EXE
                PID:2228
              • C:\Users\Admin\AppData\Local\Temp\Files\t1.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\t1.exe"
                3⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:1216
              • C:\Users\Admin\AppData\Local\Temp\Files\KuwaitSetupHockey.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\KuwaitSetupHockey.exe"
                3⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:2752
                • C:\Users\Admin\AppData\Local\Temp\is-SSC5S.tmp\KuwaitSetupHockey.tmp
                  "C:\Users\Admin\AppData\Local\Temp\is-SSC5S.tmp\KuwaitSetupHockey.tmp" /SL5="$80172,3849412,851968,C:\Users\Admin\AppData\Local\Temp\Files\KuwaitSetupHockey.exe"
                  4⤵
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  PID:3804
                  • C:\Program Files (x86)\Kuwait Ice Hockey DB\DataBase Kuwait.exe
                    "C:\Program Files (x86)\Kuwait Ice Hockey DB\DataBase Kuwait.exe"
                    5⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Drops file in Program Files directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:1528
                    • C:\Program Files (x86)\Kuwait Ice Hockey DB\DataBase Kuwait.exe
                      "C:\Program Files (x86)\Kuwait Ice Hockey DB\DataBase Kuwait.exe"
                      6⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of SetWindowsHookEx
                      PID:3280
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 1448
                      6⤵
                      • Program crash
                      PID:4984
              • C:\Users\Admin\AppData\Local\Temp\Files\stealc_default2.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\stealc_default2.exe"
                3⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                PID:4696
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 1320
                  4⤵
                  • Program crash
                  PID:3856
              • C:\Users\Admin\AppData\Local\Temp\Files\tstory.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\tstory.exe"
                3⤵
                • Executes dropped EXE
                • Enumerates connected drives
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                PID:2820
              • C:\Users\Admin\AppData\Local\Temp\Files\NorthSperm.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\NorthSperm.exe"
                3⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:4568
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /k move Surrey Surrey.cmd && Surrey.cmd && exit
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:460
              • C:\Users\Admin\AppData\Local\Temp\Files\taskhost.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\taskhost.exe"
                3⤵
                • Checks computer location settings
                • Executes dropped EXE
                PID:3524
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\taskhost.exe'
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  PID:1224
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'taskhost.exe'
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  PID:3676
              • C:\Users\Admin\AppData\Local\Temp\Files\zts.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\zts.exe"
                3⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:2012
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 476
                  4⤵
                  • Program crash
                  PID:1532
              • C:\Users\Admin\AppData\Local\Temp\Files\connector1.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\connector1.exe"
                3⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:172
              • C:\Users\Admin\AppData\Local\Temp\Files\nuke.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\nuke.exe"
                3⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of SetThreadContext
                PID:1088
                • C:\Windows\system32\svchost.exe
                  "C:\Windows\system32\svchost.exe"
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2008
                • C:\Windows\system32\msiexec.exe
                  "C:\Windows\system32\msiexec.exe"
                  4⤵
                  • Adds Run key to start application
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3460
                • C:\Windows\system32\audiodg.exe
                  "C:\Windows\system32\audiodg.exe"
                  4⤵
                  • Adds Run key to start application
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3028
              • C:\Users\Admin\AppData\Local\Temp\Files\AsyncClient.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\AsyncClient.exe"
                3⤵
                  PID:5088
                • C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe
                  "C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"
                  3⤵
                    PID:4172
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe'
                      4⤵
                      • Command and Scripting Interpreter: PowerShell
                      PID:2632
                  • C:\Users\Admin\AppData\Local\Temp\Files\peinf.exe
                    "C:\Users\Admin\AppData\Local\Temp\Files\peinf.exe"
                    3⤵
                      PID:3968
                    • C:\Users\Admin\AppData\Local\Temp\Files\kdmapper_Release.exe
                      "C:\Users\Admin\AppData\Local\Temp\Files\kdmapper_Release.exe"
                      3⤵
                        PID:1972
                      • C:\Users\Admin\AppData\Local\Temp\Files\stealc_valenciga.exe
                        "C:\Users\Admin\AppData\Local\Temp\Files\stealc_valenciga.exe"
                        3⤵
                          PID:4908
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                          3⤵
                            PID:4188
                          • C:\Users\Admin\AppData\Local\Temp\Files\Vhpcde.exe
                            "C:\Users\Admin\AppData\Local\Temp\Files\Vhpcde.exe"
                            3⤵
                              PID:2616
                            • C:\Users\Admin\AppData\Local\Temp\Files\ZharkBOT.exe
                              "C:\Users\Admin\AppData\Local\Temp\Files\ZharkBOT.exe"
                              3⤵
                                PID:3896
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 480
                                  4⤵
                                  • Program crash
                                  PID:3864
                              • C:\Users\Admin\AppData\Local\Temp\Files\penis.exe
                                "C:\Users\Admin\AppData\Local\Temp\Files\penis.exe"
                                3⤵
                                  PID:4304
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 860
                                    4⤵
                                    • Program crash
                                    PID:2312
                                • C:\Users\Admin\AppData\Local\Temp\Files\Opdxdyeul.exe
                                  "C:\Users\Admin\AppData\Local\Temp\Files\Opdxdyeul.exe"
                                  3⤵
                                    PID:548
                                  • C:\Users\Admin\AppData\Local\Temp\Files\robotic.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Files\robotic.exe"
                                    3⤵
                                      PID:3964
                                    • C:\Users\Admin\AppData\Local\Temp\Files\Destover.exe
                                      "C:\Users\Admin\AppData\Local\Temp\Files\Destover.exe"
                                      3⤵
                                        PID:3692
                                      • C:\Users\Admin\AppData\Local\Temp\Files\GoogleUpdate.exe
                                        "C:\Users\Admin\AppData\Local\Temp\Files\GoogleUpdate.exe"
                                        3⤵
                                          PID:4564
                                        • C:\Users\Admin\AppData\Local\Temp\Files\5KNCHALAH.exe
                                          "C:\Users\Admin\AppData\Local\Temp\Files\5KNCHALAH.exe"
                                          3⤵
                                            PID:4676
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
                                          2⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1840
                                        • C:\Windows\System32\schtasks.exe
                                          C:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"
                                          2⤵
                                            PID:2948
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
                                            2⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:4884
                                          • C:\Windows\System32\conhost.exe
                                            C:\Windows\System32\conhost.exe
                                            2⤵
                                              PID:2980
                                            • C:\Windows\System32\dwm.exe
                                              C:\Windows\System32\dwm.exe
                                              2⤵
                                                PID:4236
                                              • C:\Users\Admin\AppData\Local\Temp\7E99.tmp.x.exe
                                                "C:\Users\Admin\AppData\Local\Temp\7E99.tmp.x.exe"
                                                2⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:3696
                                            • C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe
                                              "C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"
                                              1⤵
                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                              • Executes dropped EXE
                                              • Suspicious use of SetThreadContext
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of WriteProcessMemory
                                              PID:1304
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2820 -ip 2820
                                              1⤵
                                                PID:3668
                                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                1⤵
                                                • Modifies Internet Explorer settings
                                                • Modifies registry class
                                                • Suspicious use of SetWindowsHookEx
                                                PID:4276
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 236 -p 2860 -ip 2860
                                                1⤵
                                                  PID:1732
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2860 -ip 2860
                                                  1⤵
                                                    PID:216
                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                    1⤵
                                                    • Modifies Internet Explorer settings
                                                    • Modifies data under HKEY_USERS
                                                    • Modifies registry class
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:3120
                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                    1⤵
                                                    • Modifies Internet Explorer settings
                                                    • Modifies registry class
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:4400
                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                    1⤵
                                                    • Modifies Internet Explorer settings
                                                    • Modifies registry class
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:5064
                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                    1⤵
                                                    • Modifies Internet Explorer settings
                                                    • Modifies registry class
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:4368
                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                    1⤵
                                                      PID:1168
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4696 -ip 4696
                                                      1⤵
                                                        PID:224
                                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                        1⤵
                                                          PID:1040
                                                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                          1⤵
                                                            PID:4628
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1528 -ip 1528
                                                            1⤵
                                                              PID:3120
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2012 -ip 2012
                                                              1⤵
                                                                PID:1044
                                                              • C:\Windows\explorer.exe
                                                                explorer.exe
                                                                1⤵
                                                                • Boot or Logon Autostart Execution: Active Setup
                                                                • Enumerates connected drives
                                                                • Checks SCSI registry key(s)
                                                                • Modifies registry class
                                                                • Suspicious use of FindShellTrayWindow
                                                                • Suspicious use of SendNotifyMessage
                                                                PID:1000
                                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                1⤵
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:3680
                                                              • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
                                                                "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca
                                                                1⤵
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:3216
                                                              • C:\Windows\explorer.exe
                                                                explorer.exe
                                                                1⤵
                                                                • Boot or Logon Autostart Execution: Active Setup
                                                                • Modifies registry class
                                                                • Suspicious use of FindShellTrayWindow
                                                                • Suspicious use of SendNotifyMessage
                                                                PID:4124
                                                              • C:\Windows\system32\dwm.exe
                                                                "dwm.exe"
                                                                1⤵
                                                                  PID:1168
                                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                  1⤵
                                                                    PID:3244
                                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                    1⤵
                                                                      PID:1068
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3896 -ip 3896
                                                                      1⤵
                                                                        PID:1120

                                                                      Network

                                                                      MITRE ATT&CK Enterprise v15

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\Program Files (x86)\Kuwait Ice Hockey DB\DataBase Kuwait.exe

                                                                        Filesize

                                                                        15.6MB

                                                                        MD5

                                                                        f66a7777f0927540ce93cfec095f2ea9

                                                                        SHA1

                                                                        418ded82aeb277db20b51d27636fbe3a4ef7fc0c

                                                                        SHA256

                                                                        8ea631160c2e386b2f1e09dfcfb383d198cc72a97224fd39c7ae6f658a5d4ab4

                                                                        SHA512

                                                                        b34166311b75c26ec364b8ca6172de715f383d1bd6c56e1e9d9d3e9b7b3a48a51394c70fa2a070dd150c27ad36e0df0bca855c9bdb953551659b7a55dacd087e

                                                                      • C:\Program Files (x86)\Kuwait Ice Hockey DB\DataBase Kuwait.exe

                                                                        Filesize

                                                                        11.2MB

                                                                        MD5

                                                                        b6027fc15cb0e74dc1968cc286648516

                                                                        SHA1

                                                                        94b90b4e411cb6e6f008ce28130a2964f49417ac

                                                                        SHA256

                                                                        773c11dcfd97fd7502c36efa1fc2dd8e7d3a68f22206e3b4a9da5ca30dafb873

                                                                        SHA512

                                                                        a5c6b49b9ea4520272b374e26c7b8d489d56fd1baa26cf8e428508bb3cf9f95726d5680441dc65ec5cbf76a2cca96fc26a08f0314a96710bc808a68da349920e

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                        Filesize

                                                                        3KB

                                                                        MD5

                                                                        beddacb1b8cdf9b2701ec9ba52fc7a57

                                                                        SHA1

                                                                        42fc5858911200e8615ce0c223d19a3521468773

                                                                        SHA256

                                                                        839ab90ed4c452c99e6610f0bdc0be6290475e34407e5d3fa9c5fb38b6eeaf0e

                                                                        SHA512

                                                                        b738727610cccc12e4271974d7cf95cfaf143bc4010e3e3a90fe31ae922630821d46dad255a3ba7044c45cefaca3cb40696a46d55be0e5b3cc0b58cb5abfc04a

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\IconCacheToDelete\icnEDEC.tmp

                                                                        Filesize

                                                                        7KB

                                                                        MD5

                                                                        a5cc8090f2079534d3f02326fa8851c9

                                                                        SHA1

                                                                        15a92cb6758f766db6945e400e2862ba05202ebb

                                                                        SHA256

                                                                        60f2ee0f2c38858f5cc573c2e7b5c8791b6df9d2234df83e984247bc5ab6c5ee

                                                                        SHA512

                                                                        404cea538016c7121a7b555f3a90064d55a8765d3a17da0adb4670403b1ea251b5a49981a2bc5f4abcc9282d5c7103a0a7fad411d8db331a54343c90fd7b875d

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\IconCacheToDelete\icnEDFD.tmp

                                                                        Filesize

                                                                        24B

                                                                        MD5

                                                                        f732bf1006b6529cffba2b9f50c4b07f

                                                                        SHA1

                                                                        d3e8d4af812bbc4f4013c53c4ffab992d1d714e3

                                                                        SHA256

                                                                        77739084a27cb320f208ac1927d3d9c3cac42748dbdf6229684ef18352d95067

                                                                        SHA512

                                                                        064d56217aeb2980a3bfaa1e252404613624d600c3a08b5cf0adcb259596a1c60ee903fdc2650972785e5ae9b7b51890ded01ec4da7b4de94ebda08aeaf662df

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\IconCacheToDelete\icnEDFF.tmp

                                                                        Filesize

                                                                        24B

                                                                        MD5

                                                                        fc94fe7bd3975e75cefad79f5908f7b3

                                                                        SHA1

                                                                        78e7da8d08e8898e956521d3b1babbf6524e1dca

                                                                        SHA256

                                                                        ee1ed3b49720b22d5fda63d3c46d62a96ca8838c76ab2d2f580b1e7745521aa5

                                                                        SHA512

                                                                        4ceaf9021b30734f4ce8b4d4a057539472e68c0add199cf9c3d1c1c95320da3884caf46943fc9f7281607ab7fa6476027860ebed8bbaa9c44b3f4056b5e074d3

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\IconCacheToDelete\icnEE00.tmp

                                                                        Filesize

                                                                        24B

                                                                        MD5

                                                                        5f243bf7cc0a348b6d31460a91173e71

                                                                        SHA1

                                                                        5696b34625f027ec01765fc2be49efcfd882bf8e

                                                                        SHA256

                                                                        1b1aed169f2acfae4cf230701bda91229cb582ff2ce29a413c5b8fe3b890d289

                                                                        SHA512

                                                                        9e08dfbbf20668b86df696a0d5969e04e6ee4a67e997ff392099bc7ff184b1b8965502215744be7fe423668b69099242bba54df3f0bfe4e70acdc7cad8195b02

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\IconCacheToDelete\icnEE01.tmp

                                                                        Filesize

                                                                        24B

                                                                        MD5

                                                                        379523b9f5d5b954e719b664846dbf8f

                                                                        SHA1

                                                                        930823ec80b85edd22baf555cad21cdf48f066aa

                                                                        SHA256

                                                                        3c9002caedf0c007134a7e632c72588945a4892b6d7ad3977224a6a5a7457bf4

                                                                        SHA512

                                                                        eca44de86bbc3309fa6eab400154d123dcd97dc1db79554ce58ce2426854197e2365f5eee42bac6e6e9455561b206f592e159ef82faf229212864894e6021e98

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\IconCacheToDelete\icnEE02.tmp

                                                                        Filesize

                                                                        24B

                                                                        MD5

                                                                        2d84ad5cfdf57bd4e3656bcfd9a864ea

                                                                        SHA1

                                                                        b7b82e72891e16d837a54f94960f9b3c83dc5552

                                                                        SHA256

                                                                        d241584a3fd4a91976fafd5ec427e88f6e60998954dec39e388af88316af3552

                                                                        SHA512

                                                                        0d9bc1ee51a4fb91b24e37f85afbf88376c88345483d686c6cff84066544287c98534aa701d7d4d52e53f10a3bea73ee8bc38d18425fde6d66352f8b76c0cbb5

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\IconCacheToDelete\icnEE03.tmp

                                                                        Filesize

                                                                        24B

                                                                        MD5

                                                                        635e15cb045ff4cf0e6a31c827225767

                                                                        SHA1

                                                                        f1eaaa628678441481309261fabc9d155c0dd6cb

                                                                        SHA256

                                                                        67219e5ad98a31e8fa8593323cd2024c1ca54d65985d895e8830ae356c7bdf1d

                                                                        SHA512

                                                                        81172ae72153b24391c19556982a316e16e638f5322b11569d76b28e154250d0d2f31e83e9e832180e34add0d63b24d36dd8a0cee80e8b46d96639bff811fa58

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\IconCacheToDelete\icnEE04.tmp

                                                                        Filesize

                                                                        24B

                                                                        MD5

                                                                        2dd3f3c33e7100ec0d4dbbca9774b044

                                                                        SHA1

                                                                        b254d47f2b9769f13b033cae2b0571d68d42e5eb

                                                                        SHA256

                                                                        5a00cc998e0d0285b729964afd20618cbaecfa7791fecdb843b535491a83ae21

                                                                        SHA512

                                                                        c719d8c54a3a749a41b8fc430405db7fcde829c150f27c89015793ca06018ad9d6833f20ab7e0cfda99e16322b52a19c080e8c618f996fc8923488819e6e14bb

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\IconCacheToDelete\icnEE05.tmp

                                                                        Filesize

                                                                        24B

                                                                        MD5

                                                                        d192f7c343602d02e3e020807707006e

                                                                        SHA1

                                                                        82259c6cb5b1f31cc2079a083bc93c726bfc4fbf

                                                                        SHA256

                                                                        bb4d233c90bdbee6ef83e40bff1149ea884efa790b3bef496164df6f90297c48

                                                                        SHA512

                                                                        aec90cf52646b5b0ef00ceb2a8d739befe456d08551c031e8dec6e1f549a6535c1870adb62eec0a292787ae6a7876388dd1b2c884cba8cc6e2d7993790102f43

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\IconCacheToDelete\icnEE06.tmp

                                                                        Filesize

                                                                        24B

                                                                        MD5

                                                                        f6b463be7b50f3cc5d911b76002a6b36

                                                                        SHA1

                                                                        c94920d1e0207b0f53d623a96f48d635314924d2

                                                                        SHA256

                                                                        16e4d1b41517b48ce562349e3895013c6d6a0df4fcffc2da752498e33c4d9078

                                                                        SHA512

                                                                        4d155dfedd3d44edfbbe7ac84d3e81141d4bb665399c2a5cf01605c24bd12e6faf87bb5b666ea392e1b246005dfabde2208ed515cd612d34bac7f965fd6cc57e

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\IconCacheToDelete\icnEE07.tmp

                                                                        Filesize

                                                                        24B

                                                                        MD5

                                                                        2a8875d2af46255db8324aad9687d0b7

                                                                        SHA1

                                                                        7a066fa7b69fb5450c26a1718b79ad27a9021ca9

                                                                        SHA256

                                                                        54097cccae0cfce5608466ba5a5ca2a3dfeac536964eec532540f3b837f5a7c7

                                                                        SHA512

                                                                        2c39f05a4dffd30800bb7fbb3ff2018cf4cc96398460b7492f05ce6afd59079fd6e3eb7c4f8384a35a954a22b4934c162a38534ad76cfb2fd772bcf10e211f7c

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\IconCacheToDelete\icnEE08.tmp

                                                                        Filesize

                                                                        24B

                                                                        MD5

                                                                        ae6fbded57f9f7d048b95468ddee47ca

                                                                        SHA1

                                                                        c4473ea845be2fb5d28a61efd72f19d74d5fc82e

                                                                        SHA256

                                                                        d3c9d1ff7b54b653c6a1125cac49f52070338a2dd271817bba8853e99c0f33a9

                                                                        SHA512

                                                                        f119d5ad9162f0f5d376e03a9ea15e30658780e18dd86e81812dda8ddf59addd1daa0706b2f5486df8f17429c2c60aa05d4f041a2082fd2ec6ea8cc9469fade3

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\IconCacheToDelete\icnEE0A.tmp

                                                                        Filesize

                                                                        24B

                                                                        MD5

                                                                        419a089e66b9e18ada06c459b000cb4d

                                                                        SHA1

                                                                        ed2108a58ba73ac18c3d2bf0d8c1890c2632b05a

                                                                        SHA256

                                                                        c48e42e9ab4e25b92c43a7b0416d463b9ff7c69541e4623a39513bc98085f424

                                                                        SHA512

                                                                        bbd57bea7159748e1b13b3e459e2c8691a46bdc9323afdb9dbf9d8f09511750d46a1d98c717c7adca07d79edc859e925476dd03231507f37f45775c0a79a593c

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_32.db

                                                                        Filesize

                                                                        24B

                                                                        MD5

                                                                        60476a101249aedff09a43e047040191

                                                                        SHA1

                                                                        de5b6a0adc7de7180e19286cf0f13567278cdb64

                                                                        SHA256

                                                                        35bc77a06bfdde8c8f3a474c88520262b88c7b8992ee6b2d5cf41dddc77a83fb

                                                                        SHA512

                                                                        f1d2dcc562a36434c6c6405ec4eac7ecfa76fc5a940114da6f94495b77584a132d5d82ad3556df749490be096cfd238fa8b484b7c734cbc4d074e963e5d451f4

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_wide_alternate.db

                                                                        Filesize

                                                                        24B

                                                                        MD5

                                                                        db7c049e5e4e336d76d5a744c28c54c8

                                                                        SHA1

                                                                        a4db9c8586b9e4fa24416eb0d00f06a9ebd16b02

                                                                        SHA256

                                                                        e8830e7ac4088cf3dd464caec33a0035d966a7de5ae4efc3580d59a41916ff7b

                                                                        SHA512

                                                                        b614037fb1c7d19d704bf15f355672114d25080223e7ee4424ad2cb7b89782219e7877b373bbc7fa44f3ad8df8a27eef4e8ccc765d44ec02a61e3b7fae88ae69

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        178170c54a9081cc3aaac9ee2318211e

                                                                        SHA1

                                                                        94b0fd6cb5834be48fa39a95997a8852a6b64cc4

                                                                        SHA256

                                                                        906632fc1b247d32a6a2130ccf9062231984e8f2e7beddd511bbd19901fdb054

                                                                        SHA512

                                                                        71231d4c7d670dd444fc9a392b33ed1008fb815a03760357f43c43c77adf1d83b05a94dee240a50d1ba3f1cad5055c181aa3351f8719fb6d3939b785a224db15

                                                                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_AutoGenerated_{2F519BF2-C697-59F8-8F6A-1E19509CE66B}

                                                                        Filesize

                                                                        36KB

                                                                        MD5

                                                                        8aaad0f4eb7d3c65f81c6e6b496ba889

                                                                        SHA1

                                                                        231237a501b9433c292991e4ec200b25c1589050

                                                                        SHA256

                                                                        813c66ce7dec4cff9c55fb6f809eab909421e37f69ff30e4acaa502365a32bd1

                                                                        SHA512

                                                                        1a83ce732dc47853bf6e8f4249054f41b0dea8505cda73433b37dfa16114f27bfed3b4b3ba580aa9d53c3dcc8d48bf571a45f7c0468e6a0f2a227a7e59e17d62

                                                                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_charmap_exe

                                                                        Filesize

                                                                        36KB

                                                                        MD5

                                                                        406347732c383e23c3b1af590a47bccd

                                                                        SHA1

                                                                        fae764f62a396f2503dd81eefd3c7f06a5fb8e5f

                                                                        SHA256

                                                                        e0a9f5c75706dc79a44d0c890c841b2b0b25af4ee60d0a16a7356b067210038e

                                                                        SHA512

                                                                        18905eaad8184bb3a7b0fe21ff37ed2ee72a3bd24bb90cbfcad222cf09e2fa74e886d5c687b21d81cd3aec1e6c05891c24f67a8f82bafd2aceb0e0dcb7672ce7

                                                                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133771240468097589.txt

                                                                        Filesize

                                                                        83KB

                                                                        MD5

                                                                        6adf5a35a3c7400d5c803078a081f0e4

                                                                        SHA1

                                                                        f7d3a83e02e8561d2b1acc0bae3278830a97f9c5

                                                                        SHA256

                                                                        94fd87775309d39f78c8903ef9336276064c89c72ab681cc9fad52b17870e3de

                                                                        SHA512

                                                                        ac99c26bfdee634f9b49e49e572bb92954dbd8a07aed2b37bc511201e581b2d267aeb0380f803df2d8ca91eb3f04c70872c76dcfc0f37770d72f983a5ba0da8e

                                                                      • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\1PGXLGE9\microsoft.windows[1].xml

                                                                        Filesize

                                                                        97B

                                                                        MD5

                                                                        92a7f2b2f09c2761e3850b4e46e17c72

                                                                        SHA1

                                                                        4c6cf2bf34e422c6b06e008dcefd35628bc54fef

                                                                        SHA256

                                                                        6291dba322ecce07529593594a78f492d8e78d2046157efb51090a482d39f772

                                                                        SHA512

                                                                        e9fb6ac986347a29e287f62fc93c0447e294372045f13a77730d943f9036ec50bbd62d8b243ad07e49f392bb6489265423d3b7826fc5f1f029936171b05cc310

                                                                      • C:\Users\Admin\AppData\Local\Temp\1181816917.exe

                                                                        Filesize

                                                                        20KB

                                                                        MD5

                                                                        2473392c0a773aad20da1519aa6f464b

                                                                        SHA1

                                                                        2068ffd843bb8c7c7749193f6d1c5f0a9b97b280

                                                                        SHA256

                                                                        3d33e8778ea8194d486d42784411e8528c602594abdf3e32cdcee521a10f3ce7

                                                                        SHA512

                                                                        5455866f5fc53ae48ff24222b40a264bf673102435abeac2a61ba6fcaa1de429d8f078d4d065cb5d77b96de87f343579651b718e0a60934fb9fa35818d948074

                                                                      • C:\Users\Admin\AppData\Local\Temp\1656418357.exe

                                                                        Filesize

                                                                        8KB

                                                                        MD5

                                                                        cb8420e681f68db1bad5ed24e7b22114

                                                                        SHA1

                                                                        416fc65d538d3622f5ca71c667a11df88a927c31

                                                                        SHA256

                                                                        5850892f67f85991b31fc90f62c8b7791afeb3c08ae1877d857aa2b59471a2ea

                                                                        SHA512

                                                                        baaabcc4ad5d409267a34ed7b20e4afb4d247974bfc581d39aae945e5bf8a673a1f8eacae2e6783480c8baaeb0a80d028274a202d456f13d0af956afa0110fdf

                                                                      • C:\Users\Admin\AppData\Local\Temp\1731029541.exe

                                                                        Filesize

                                                                        5.6MB

                                                                        MD5

                                                                        13b26b2c7048a92d6a843c1302618fad

                                                                        SHA1

                                                                        89c2dfc01ac12ef2704c7669844ec69f1700c1ca

                                                                        SHA256

                                                                        1753ad35ece25ab9a19048c70062e9170f495e313d7355ebbba59c38f5d90256

                                                                        SHA512

                                                                        d6aff89b61c9945002a6798617ad304612460a607ef1cfbdcb32f8932ca648bcee1d5f2e0321bb4c58c1f4642b1e0ececc1eb82450fdec7dff69b5389f195455

                                                                      • C:\Users\Admin\AppData\Local\Temp\185791704.exe

                                                                        Filesize

                                                                        49KB

                                                                        MD5

                                                                        c38ea1b0838858f21ea572f60c69de0c

                                                                        SHA1

                                                                        f5e34c47b0630056ba00df97641926f9579b384a

                                                                        SHA256

                                                                        cae7ef69cce550af020bfc474c6e035882383b022d63e926c52bd8c3ad1d78e4

                                                                        SHA512

                                                                        f9c55f31b9466c412711462322c167aadb72492d70fe5fe89ab5500b86eae8f42de29bc3e469b3f73eab9dd47061b51410d5bee444da0bad719c94c897c59d72

                                                                      • C:\Users\Admin\AppData\Local\Temp\2190823338.exe

                                                                        Filesize

                                                                        11KB

                                                                        MD5

                                                                        83a784716728ca579619d0e13a9f17b0

                                                                        SHA1

                                                                        5e33ca9dab3c0df2edcd597b8b0da06c88f18f6b

                                                                        SHA256

                                                                        9dc0b007f33f768fff2249388428981d89cfcee3e5babd206bbaeb7d5cc34b4f

                                                                        SHA512

                                                                        f8218a8e977f0ec340e7139041cfff8bac4cc23bcea0c0c0d7717ead76093d45d10acd72a5846486e9348ce642f529824f1575d0d28b8d2f566c543c7c9d3bc4

                                                                      • C:\Users\Admin\AppData\Local\Temp\252876509.exe

                                                                        Filesize

                                                                        10KB

                                                                        MD5

                                                                        96509ab828867d81c1693b614b22f41d

                                                                        SHA1

                                                                        c5f82005dbda43cedd86708cc5fc3635a781a67e

                                                                        SHA256

                                                                        a9de2927b0ec45cf900508fec18531c04ee9fa8a5dfe2fc82c67d9458cf4b744

                                                                        SHA512

                                                                        ff603117a06da8fb2386c1d2049a5896774e41f34d05951ecd4e7b5fc9da51a373e3fcf61af3577ff78490cf898471ce8e71eae848a12812fe98cd7e76e1a9ca

                                                                      • C:\Users\Admin\AppData\Local\Temp\361837696227

                                                                        Filesize

                                                                        67KB

                                                                        MD5

                                                                        a0604038d34d259f37995f4c95fa3f28

                                                                        SHA1

                                                                        600983212b7ba743ce6ad4dbb64e93e46a476ec6

                                                                        SHA256

                                                                        b92bc7150a85f90adb3a2b47884cb1ab7b0ebbc1a5042e56896e9e4a0591e227

                                                                        SHA512

                                                                        f8b16bb455a2d9b824cb0b9bf54d1c7021fea550dbf18009008474df6e8ba7d26bc5e0aa2390c08d1e646cd30713d109b232de296b7930e4681bf5478c4230ec

                                                                      • C:\Users\Admin\AppData\Local\Temp\361837696227

                                                                        Filesize

                                                                        10KB

                                                                        MD5

                                                                        26e172d28fc5a42cbbc442aea0dca305

                                                                        SHA1

                                                                        4b49ca8bf3bac7edb80be2deb3839ef7c3d07ae8

                                                                        SHA256

                                                                        cd4587cee3b8b86125aa99ed0074c7aa1a7ab4b0f274e82dc3580dd78a11a2bb

                                                                        SHA512

                                                                        790e0ed7569b1d9f358476fa6a215dcce722b980d7d45df72bad90ed80ab49e4ff6f70ac0237797ab48eebc78f663ee1668cc86fd722b9ccbf077f02468ab925

                                                                      • C:\Users\Admin\AppData\Local\Temp\7E99.tmp.x.exe

                                                                        Filesize

                                                                        300KB

                                                                        MD5

                                                                        97eb7baa28471ec31e5373fcd7b8c880

                                                                        SHA1

                                                                        397efcd2fae0589e9e29fc2153ffb18a86a9b709

                                                                        SHA256

                                                                        9053b6bbaf941a840a7af09753889873e51f9b15507990979537b6c982d618cb

                                                                        SHA512

                                                                        323389357a9ffc5e96f5d6ef78ceb2ec5c62e4dcc1e868524b4188aff2497810ad16de84e498a3e49640ad0d58eadf2ba9c6ec24e512aa64d319331f003d7ced

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\02.08.2022.exe

                                                                        Filesize

                                                                        29KB

                                                                        MD5

                                                                        29c3c376003ac5f0bb2aa61895816c43

                                                                        SHA1

                                                                        6b5798157bfefdc44a38c0636e7550e3aa1bab11

                                                                        SHA256

                                                                        e5e4a6a48a84b680543252e26082f85d30ff131573ca42038c0351281f6d4882

                                                                        SHA512

                                                                        bc07acb8477742adce7b3fb5b8c683b72fc06de0a1fec3d0b8a68c5ef7a9c5890e75b0c9ac6b534c17fd30e54f0e75eeff4cd5451b5f616c6ac99e8df7952f93

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\12.exe

                                                                        Filesize

                                                                        383KB

                                                                        MD5

                                                                        b38d20c6267b77ca35a55e11fb4124b7

                                                                        SHA1

                                                                        bf17ad961951698789fa867d2e07099df34cdc7d

                                                                        SHA256

                                                                        92281aaffbb198760aacd304df932fd58ba230d0927839d85db71dc7ae6f7d71

                                                                        SHA512

                                                                        17fc8504582edc41db8b62ca1e5238427ddea19b24d2efceb7c765903b8395b3276e4f4dc9df55c60a77b47e0d09491e16dbda18e82a4d6bfa6ed7cad5b8947e

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\2.exe

                                                                        Filesize

                                                                        673KB

                                                                        MD5

                                                                        b859d1252109669c1a82b235aaf40932

                                                                        SHA1

                                                                        b16ea90025a7d0fad9196aa09d1091244af37474

                                                                        SHA256

                                                                        083d9bc8566b22e67b553f9e0b2f3bf6fe292220665dcc2fc10942cdc192125c

                                                                        SHA512

                                                                        9c0006055afd089ef2acbb253628494dd8c29bab9d5333816be8404f875c85ac342df82ae339173f853d3ebdb2261e59841352f78f6b4bd3bff3d0d606f30655

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\5KNCHALAH.exe

                                                                        Filesize

                                                                        1.6MB

                                                                        MD5

                                                                        3f99c2698fc247d19dd7f42223025252

                                                                        SHA1

                                                                        043644883191079350b2f2ffbefef5431d768f99

                                                                        SHA256

                                                                        ba8561bf19251875a15471812042adac49f825c69c3087054889f6107297c6f3

                                                                        SHA512

                                                                        6a88d1049059bba8f0c9498762502e055107d9f82dbc0aacfdd1e1c138bdb875cf68c2b7998408f8235e53b2bb864ba6f43c249395640b62af305a62b9bfcd67

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\AsyncClient.exe

                                                                        Filesize

                                                                        61KB

                                                                        MD5

                                                                        a4314ad7e9a2945cf99dd03e9e46f7c1

                                                                        SHA1

                                                                        326c096e183a17cbc41034c6b6a6917de5347a86

                                                                        SHA256

                                                                        22639054481629b24309f3ab18f016231ed4f3de6fa6b852598848c1dbe7cf1f

                                                                        SHA512

                                                                        5787f414ebf281f581e26d21541915897e741995528bb7cc20e5d7c02d8a35e05047cd47e231d3ea389986323ee58039844c075134869a3e63d004c11f08a8c8

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\BitcoinCore.exe

                                                                        Filesize

                                                                        10.0MB

                                                                        MD5

                                                                        304a5a222857d412cdd4effbb1ec170e

                                                                        SHA1

                                                                        34924c42524ca8e7fcc1fc604626d9c5f277dba2

                                                                        SHA256

                                                                        d67fb52973c445a3488a9d6a9a9ff3ebebb05b1c0e853cebfa8bba1a5953f0d6

                                                                        SHA512

                                                                        208b39436b520e909eb8262f68314dcb93852ea5f00a1d4ce8bd682dd5e20ad313e65ff293c8062bfed95ffe101f6ead3d7da4886e779031101329a3764b855f

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\Destover.exe

                                                                        Filesize

                                                                        89KB

                                                                        MD5

                                                                        e904bf93403c0fb08b9683a9e858c73e

                                                                        SHA1

                                                                        8397c1e1f0b9d53a114850f6b3ae8c1f2b2d1590

                                                                        SHA256

                                                                        4c2efe2f1253b94f16a1cab032f36c7883e4f6c8d9fc17d0ee553b5afb16330c

                                                                        SHA512

                                                                        d83f63737f7fcac9179ca262aa5c32bba7e140897736b63474afcf4f972ffb4c317c5e1d6f7ebe6a0f2d77db8f41204031314d7749c7185ec3e3b5286d77c1a3

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\ExtremeInjector.exe

                                                                        Filesize

                                                                        550KB

                                                                        MD5

                                                                        ee6be1648866b63fd7f860fa0114f368

                                                                        SHA1

                                                                        42cab62fff29eb98851b33986b637514fc904f4b

                                                                        SHA256

                                                                        e17bf83e09457d8cecd1f3e903fa4c9770e17e823731650a453bc479591ac511

                                                                        SHA512

                                                                        d6492d3b3c1d94d6c87b77a9a248e8c46b889d2e23938ddb8a8e242caccb23e8cd1a1fbeffee6b140cf6fd3ea7e8da89190286a912032ce4a671257bd8e3e28a

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\Final.exe

                                                                        Filesize

                                                                        308KB

                                                                        MD5

                                                                        d5b8ac0d80c99e7dda0d9df17c159f3d

                                                                        SHA1

                                                                        ae1e0aeb3fbba55999b74047ee2b8bb4e45f108a

                                                                        SHA256

                                                                        c330322b774eb263b008178ff707e13b843fd7df62445cca3c52356509c26f78

                                                                        SHA512

                                                                        2637cc05aa402832dadbf48431f1add417b69a8351de2a5edae80283da7a6924166ea56bc85865dfa993d88f467d8f540528627e5cbe64cc67ec8d5a3d6655bc

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\GoogleUpdate.exe

                                                                        Filesize

                                                                        320KB

                                                                        MD5

                                                                        8560f9c870d3d0e59d1263fb154fbe6c

                                                                        SHA1

                                                                        4749a3b48eb0acddea8e3350c1e41b02f92c38dd

                                                                        SHA256

                                                                        99d846627f494e80a686d75c497db1ac1aadf4437e2d7cc7ace2785ffa5fa5e0

                                                                        SHA512

                                                                        82b771b2b725c04c41b6d97288cdf49b0c1d522f8094f16f6066f4cd884f8a419325b20aaca17e01ddbffb8ca36a0d29d283e7f08e34af7b8e29474892432824

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\KuwaitSetupHockey.exe

                                                                        Filesize

                                                                        4.4MB

                                                                        MD5

                                                                        7f69b1fa6c0a0fe8252b40794adc49c6

                                                                        SHA1

                                                                        5d1b7a341b1af20eae2cae8732f902a87a04b12b

                                                                        SHA256

                                                                        68662d24f56c624dee35c36010f923a8bf8d14b8c779ad3dafe8dd6b81bb3431

                                                                        SHA512

                                                                        6a9e13e0b1c1b0c8fbf41c94147c7cf16a41af7bd656dc606c1ca1dc8bc0986785252155661d19cc2f9ec35b26fb47456d842bc5fdf469bdd09f72d48b3a5256

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\NorthSperm.exe

                                                                        Filesize

                                                                        1.5MB

                                                                        MD5

                                                                        ff83471ce09ebbe0da07d3001644b23c

                                                                        SHA1

                                                                        672aa37f23b421e4afba46218735425f7acc29c2

                                                                        SHA256

                                                                        9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba

                                                                        SHA512

                                                                        179c724558065de4b7ea11dd75588df51a3fce737db3ebc77c8fdc0b3a432f6f1fdcc5acd2e2706ab0f088c35a3310c9e638de92ce0a644322eae46729aea259

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\Opdxdyeul.exe

                                                                        Filesize

                                                                        894KB

                                                                        MD5

                                                                        cee58644e824d57927fe73be837b1418

                                                                        SHA1

                                                                        698d1a11ab58852be004fd4668a6f25371621976

                                                                        SHA256

                                                                        4235c78ffaf12c4e584666da54cfc5dc56412235f5a2d313dcac07d1314dd52e

                                                                        SHA512

                                                                        ab9e9083ed107b5600f802ec66dab71f1064377749b6c874f8ce6e9ce5b2718a1dc45372b883943a8eae99378d1151ce15983d4c9be67d559cd72b28b9f55fb5

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\RedSystem.exe

                                                                        Filesize

                                                                        607KB

                                                                        MD5

                                                                        933f2db7b8ded6946f35720a366e7b14

                                                                        SHA1

                                                                        5411148b9de498d98e2ee67c8685717d8b44f4cd

                                                                        SHA256

                                                                        ba8d4df86924743be143d569ac06b8a1b1d7e2c554720e7f31126a0db04c3daa

                                                                        SHA512

                                                                        45a4b2474b63bfca9551dc21116fc33797fb62d9f57a439693152df0114a07530afc7de95dba417d9750d108bcc406388cb9d37bfe5e147b221c7accd33e07b6

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\SVC.exe

                                                                        Filesize

                                                                        1.6MB

                                                                        MD5

                                                                        e97f5c3efb2cc80e001129383d5a0132

                                                                        SHA1

                                                                        1354d7c9d8bbdb0fa00bd62112adc22474d22ac3

                                                                        SHA256

                                                                        cc7a419834271b80acc994fb2a93988be5ca1c112e6302dbf57220f635fd385e

                                                                        SHA512

                                                                        2e66b4d90dbaa720534fb9b6577e6fae0a68ba2f7617db1a3a048257c4dfdb7f3cd9a447e033c66cb7d48461ed0eb90bf7826b91782d18412864102a796a1185

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\Team.exe

                                                                        Filesize

                                                                        14.4MB

                                                                        MD5

                                                                        2f208b17f8bda673f6b4f0dacf43d1bf

                                                                        SHA1

                                                                        5131b890e8f91770039a889e72464b5ce411c412

                                                                        SHA256

                                                                        1fc3e92f7f30f4f68861d3ceb8284853ae30c11cbd0ed3e46ea9eb698b3ec348

                                                                        SHA512

                                                                        2830984abc5476e23609c947304f1124fd33f38e654b98bccbcde44e7fbadb75584983243e83a006b69403ac3d42ab379e1665989bec368320efdd5e98ad62df

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\Vhpcde.exe

                                                                        Filesize

                                                                        662KB

                                                                        MD5

                                                                        4ae02ce23e76c0d777a9000222e4336c

                                                                        SHA1

                                                                        4ad1cdcd30abc364dc93e671cec58461c1f7f2c2

                                                                        SHA256

                                                                        87202ddd20d67f566b2e49c98ceea801f58f72e66b47e61f8daf0d70521546f5

                                                                        SHA512

                                                                        c68eeac1bfe39ff7ce6d10c1e276ae98d5c7c56513bf0a172fb87da187671a3dbb02ff01fdeb588d819ae8ba2433e222a5e7dc1825675a0af78b7b4be1ef0c47

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\ZharkBOT.exe

                                                                        Filesize

                                                                        325KB

                                                                        MD5

                                                                        13ee6ccf9ef0c86f9c287b8ed23ec8a0

                                                                        SHA1

                                                                        bc6203464f846debacf38b5bd35d254f2b63cd61

                                                                        SHA256

                                                                        118f1c6f61bcbd7daa4753a6d033518e027d864fc206a7e1866524a0391d4417

                                                                        SHA512

                                                                        1aa9d22ccc5e4788711777852262215024bce9dd72991feb9417421a8281f8b2769c6bb7d52f55afed54dfcc5206e71dff45385a7fc67c57226216b7b7760931

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\buildred.exe

                                                                        Filesize

                                                                        304KB

                                                                        MD5

                                                                        4e0235942a9cde99ee2ee0ee1a736e4f

                                                                        SHA1

                                                                        d084d94df2502e68ee0443b335dd621cd45e2790

                                                                        SHA256

                                                                        a0d7bc2ccf07af7960c580fd43928b5fb02b901f9962eafb10f607e395759306

                                                                        SHA512

                                                                        cfc4b7d58f662ee0789349b38c1dec0c4e6dc1d2e660f5d92f8566d49c4850b2bf1d70e43edf84db7b21cb8e316e8bcc3e20b797e32d9668c69a029b15804e3f

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\cclent.exe

                                                                        Filesize

                                                                        3.1MB

                                                                        MD5

                                                                        94222631ef1071a4f7ceb180cf8a4a5a

                                                                        SHA1

                                                                        786d8b2d8b931a9282ee54367d2dda501f1ca946

                                                                        SHA256

                                                                        a45b373b780f5b9fcf5c51473c69bbf0ed650f300523097602b35f5222bd122b

                                                                        SHA512

                                                                        00503983a35e8d0f65eea6a811d7177a389cb1b4d8716d32e50fd5346deb428cd472cbaca7375c56ac3f113ea76db55322993b4d68d816b50a4b27887a2fa14d

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\connector1.exe

                                                                        Filesize

                                                                        72KB

                                                                        MD5

                                                                        32282cfa34ebd3aa220bb196c683a46e

                                                                        SHA1

                                                                        4299a9a8e97a6ad330c1e0e2cc3368834a40f0cb

                                                                        SHA256

                                                                        3c3ce0355bfa42b379830b93a76cffd32fceed54e6b549ae4a1132ca30b392ff

                                                                        SHA512

                                                                        b567f434a313d270a53945a75d3303db179964faabde22786b37e8399b03d2ab664f11d03f93f5e22ea1aa8b38b1481fcdd302e688c5c1e9c3f1e3516ceebfb4

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\donut.exe

                                                                        Filesize

                                                                        242KB

                                                                        MD5

                                                                        2a516c444620354c81fd32ef1b498d1b

                                                                        SHA1

                                                                        961d3a6a0588e654dd72d00a3331c684cf8e627c

                                                                        SHA256

                                                                        ee68d7deb7cefdfca66c078d6036d7aa3aa7afcc62b282999034b4a1faed890d

                                                                        SHA512

                                                                        e8e4bc395997eb6e83e147816faf00ae959e091acba6d896b007781bdc9146157d049d958f9ff7b71a746ed681bd4dcca2fd84aac3eb76c4afe41d49e9f7bd2a

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\gawdth.exe

                                                                        Filesize

                                                                        898KB

                                                                        MD5

                                                                        c02798b26bdaf8e27c1c48ef5de4b2c3

                                                                        SHA1

                                                                        bc59ab8827e13d1a9a1892eb4da9cf2d7d62a615

                                                                        SHA256

                                                                        af41b9ac95c32686ba1ef373929b54f49088e5c4f295fe828b43b32b5160aa78

                                                                        SHA512

                                                                        b541aeedcc4db6f8e0db0788f2791339476a863c15efc72aef3db916fc7c8ab41d84c0546c05b675be4d7700c4f986dbae5e2858d60ecd44b4ffbcae2065cfc4

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\hbfgjhhesfd.exe

                                                                        Filesize

                                                                        288KB

                                                                        MD5

                                                                        2b3a191ee1f6d3b21d03ee54aa40b604

                                                                        SHA1

                                                                        8ecae557c2735105cc573d86820e81fcff0139c4

                                                                        SHA256

                                                                        f0d45f8340cd203ee98c7765267175576d8017df5166f425f8a7483cb35a91c8

                                                                        SHA512

                                                                        31f621fd96bf2964529607ae64a173c4a99f3976a91283a3609edc3799d98f59de80da6266ca10c26e5c8733644f1764aab00c7ba3e4dc5456573b9b20b6a393

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\kdmapper_Release.exe

                                                                        Filesize

                                                                        143KB

                                                                        MD5

                                                                        6d7f8dfdd94db8908daed972026a6bbf

                                                                        SHA1

                                                                        2104231cf6350606b11452c297250d339b9e2b0f

                                                                        SHA256

                                                                        46a726f0763d7c4d32db62c6d5459b87dd7c1262cbcd7f3659de70a51af97c1a

                                                                        SHA512

                                                                        056c65c7a44dbbdfa9bb4d70ec184c1e07604cd44f0bbae71da33d891ea5af22311e038c89fe44f5bb8fcbd794fbd8a206975ca55eb3d82834e086336f8564a4

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\logon.exe

                                                                        Filesize

                                                                        157KB

                                                                        MD5

                                                                        ceccc726e628b9592af475cc27d0a7ae

                                                                        SHA1

                                                                        478017f997d17d3ae1a22a4ea141bab80dd436ad

                                                                        SHA256

                                                                        ccb40eb0137e156af89b0e0dbdac4192152dd19540efecdb56eeaa0384e5d55f

                                                                        SHA512

                                                                        6d446f2ba5cef727d6f847428c8ea355ee21419a79cecda040002186621a69c0eb0cbde51a38d510a2fe76e5082afa0571475028428a00edebb12bdb6f2710ce

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\nuke.exe

                                                                        Filesize

                                                                        24KB

                                                                        MD5

                                                                        dd1450dae46de951abe358c1a332e5a5

                                                                        SHA1

                                                                        40071d09e2251894ac9519378408d59de6c6b0a8

                                                                        SHA256

                                                                        2f86a07bc245ed72822777974b0d6d621f9d078f45a0c0ad6d0cd542171f219d

                                                                        SHA512

                                                                        b896953a1928889e11cf807162186fd6416cd082c06f761b6080eb3ed5ac0ec70ce0cd46ae6ec939c3110e83381d1e618d48c482f1a1d9df8a5469ff5f7c70f0

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\pei.exe

                                                                        Filesize

                                                                        10KB

                                                                        MD5

                                                                        08dafe3bb2654c06ead4bb33fb793df8

                                                                        SHA1

                                                                        d1d93023f1085eed136c6d225d998abf2d5a5bf0

                                                                        SHA256

                                                                        fc16c0bf09002c93723b8ab13595db5845a50a1b6a133237ac2d148b0bb41700

                                                                        SHA512

                                                                        9cf2bd749a9ee6e093979bc0d3aacfba03ad6469c98ff3ef35ce5d1635a052e4068ac50431626f6ba8649361802f7fb2ffffb2b325e2795c54b7014180559c99

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\penis.exe

                                                                        Filesize

                                                                        304KB

                                                                        MD5

                                                                        ea51ca3fa2cc8f5b3b438dc533b4f61c

                                                                        SHA1

                                                                        9b47381bdc1821ec4fbd915cbfdb5f68c96b9cdb

                                                                        SHA256

                                                                        7659c35138ea1c6a181cc44d2c4cd6b2a30c995690b2d6566bb7e7875400db48

                                                                        SHA512

                                                                        724c3011c9ba6ca487838b0253388686ccb45309386c7dada180141255572f5892e62bf1ef83cf0f92c15b4206d12ca06d8da9994e7c8f77caff8aafda26880c

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\random.exe

                                                                        Filesize

                                                                        734KB

                                                                        MD5

                                                                        98e538d63ec5a23a3acc374236ae20b6

                                                                        SHA1

                                                                        f3fec38f80199e346cac912bf8b65249988a2a7e

                                                                        SHA256

                                                                        4d8fbc7578dca954407746a1d73e3232cd8db79dccd57acbeef80da369069a91

                                                                        SHA512

                                                                        951a750998448cd3653153bdf24705101136305ff4744ee2092952d773121817fa36347cb797586c58d0f3efc9cfa40ae6d9ce6ea5d2e8ec41acf8d9a03b0827

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\robotic.exe

                                                                        Filesize

                                                                        538KB

                                                                        MD5

                                                                        6b1bbe4e391cdfd775780d8502ccbc41

                                                                        SHA1

                                                                        a910f7ac9ed8fd57f7455f04e99bcd732bc8241a

                                                                        SHA256

                                                                        2999b0ecf157b9f37dcfa1cb4a0ffff73092c416499a356fdb1558d66985e9a3

                                                                        SHA512

                                                                        9ad2ca4cc8af0b6185be87d9026da5cdac2c52ff15b0fd2ba333ff3a25016e06a294d7cf5cf32b1869a1f5e3692f071f582ba2151ac16f9be738ea7862ab57d3

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\rodda.exe

                                                                        Filesize

                                                                        1.8MB

                                                                        MD5

                                                                        6e93bbf39cb54a8558f88cb490db3e9f

                                                                        SHA1

                                                                        bffbaf0e10b03f3dcec4207af04cb1eca4d272aa

                                                                        SHA256

                                                                        e8461f0b8c51e699c7357177756f64488745351c247cdc4bde80ec79deb16b81

                                                                        SHA512

                                                                        cdd5d073e846c3df6cca8af7b8952125ce6aa3f12b936bbd7eb2ea6e6965335793d9a73b1febd83a5331d1b36dc0dff70da8ae3d8fc882c8cffe522024c593b2

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\stealc_default2.exe

                                                                        Filesize

                                                                        307KB

                                                                        MD5

                                                                        68a99cf42959dc6406af26e91d39f523

                                                                        SHA1

                                                                        f11db933a83400136dc992820f485e0b73f1b933

                                                                        SHA256

                                                                        c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3

                                                                        SHA512

                                                                        7342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\stealc_valenciga.exe

                                                                        Filesize

                                                                        187KB

                                                                        MD5

                                                                        cb24cc9c184d8416a66b78d9af3c06a2

                                                                        SHA1

                                                                        806e4c0fc582460e8db91587b39003988b8ff9f5

                                                                        SHA256

                                                                        53ebff6421eac84a4337bdf9f33d409ca84b5229ac9e001cd95b6878d8bdbeb6

                                                                        SHA512

                                                                        3f4feb4bbe98e17c74253c0fec6b8398075aecc4807a642d999effafc10043b3bcf79b1f7d43a33917f709e78349206f0b6f1530a46b7f833e815db13aeeb33a

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe

                                                                        Filesize

                                                                        82KB

                                                                        MD5

                                                                        e281c07b2469b7943abd04f9c39d2d81

                                                                        SHA1

                                                                        88097e0e41c7f91c1f80473dcf69b7b3a611116a

                                                                        SHA256

                                                                        0de3cc456fd163b597841cf6932b879d87fe0ffdbacbf52336c6cbfbb943bbad

                                                                        SHA512

                                                                        1ae0ea725b9bb7c43b0b8a5b201508195dc404430df93a67444d3d32b4070c0ef6add29e5307f7e2121afe271a2926d327f90d2e34e34ca52717fb663732b0b2

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\svhostc.exe

                                                                        Filesize

                                                                        421KB

                                                                        MD5

                                                                        ae3dd2f4488753b690ca17d555147aba

                                                                        SHA1

                                                                        0405a77b556133c1fd1986acad16944fd75c7e2b

                                                                        SHA256

                                                                        77bdb3c46654446f1edffd1a388e3f64d8ca4dc24acd9575b95e94c26b8b43fe

                                                                        SHA512

                                                                        d9309d10e85a6850ae47cf69525f6b1f31caa7de112429a73cd8d5845bfc39464861de676febbe4eabeba438e37958fd051358f55967e78a84a50e8db40729b6

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\t.exe

                                                                        Filesize

                                                                        79KB

                                                                        MD5

                                                                        0c883b1d66afce606d9830f48d69d74b

                                                                        SHA1

                                                                        fe431fe73a4749722496f19b3b3ca0b629b50131

                                                                        SHA256

                                                                        d921fc993574c8be76553bcf4296d2851e48ee39b958205e69bdfd7cf661d2b1

                                                                        SHA512

                                                                        c047452a23efad4262479fbfeb5e23f9497d7cefd4cbb58e869801206669c2a0759698c70d18050316798d5d939b989537fdce3842aa742449f5e08ed7fa60a5

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\taskhost.exe

                                                                        Filesize

                                                                        62KB

                                                                        MD5

                                                                        3296704171fe01c0fc4fcdd02f2695ca

                                                                        SHA1

                                                                        e0bd82f06d94c0e32d7f6bb9f80f57f8e73a84be

                                                                        SHA256

                                                                        b8c65f4588d2d9b76823e7ad22b71a3717792a505a4048314cb2ccba9a976e26

                                                                        SHA512

                                                                        8d1583be1930e1f819149a1a5b57ec5187b08eefe8dc306f6dc74506dd25c85a60b2b282c420060d1854c36fc8642f0754708fd87dd97ed19f2229c76334837b

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\tstory.exe

                                                                        Filesize

                                                                        1.4MB

                                                                        MD5

                                                                        2e440604cac15e233d3832e00251592e

                                                                        SHA1

                                                                        50df05d9f86c9383ca5e6adef0df4b89089bca04

                                                                        SHA256

                                                                        7e57e8caddb50f98bd8b3f17fb9fd21372cc32b0147d5e3853f043745e204a41

                                                                        SHA512

                                                                        33a737f4aca31cdfb241948c0af5080105f72506490eba2d6ab75728cffc11eeab4450581dbd52734183b22303392ed4f6272b46b51ff264e49914ad492ba806

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\zts.exe

                                                                        Filesize

                                                                        325KB

                                                                        MD5

                                                                        4dbb6133449b3ce0570b126c8b8dbe31

                                                                        SHA1

                                                                        9ad0d461440eab9d99f23c3564b12d178ead5f32

                                                                        SHA256

                                                                        24a3061eaa4ced106c15b1aea8bd14a5cd17750c6241b2ed4ab6548843e44e90

                                                                        SHA512

                                                                        e451aeba42d46a7f250c78ff829ced9169b955ed64a9d066be7e3ac5d6c0750a1dc8ded7a565731d39d224251ae20fff09fa44052083b4fb551b1b6167e8cc58

                                                                      • C:\Users\Admin\AppData\Local\Temp\Surrey

                                                                        Filesize

                                                                        14KB

                                                                        MD5

                                                                        721cde52d197da4629a6792103404e23

                                                                        SHA1

                                                                        1f5bac364c6b9546ba0501f41766bb25df98b32b

                                                                        SHA256

                                                                        66627eef98fb038f1d22f620bc8d85430a442d08313602eb02f0b158b5471812

                                                                        SHA512

                                                                        63a6786227915bc450ea9ca4df4962126b4194a1fd5c68fe3c686da8175726d4efdda5e88aedea7b8e4e758816b9b31981fa79e37dbe51028650def5042ccac6

                                                                      • C:\Users\Admin\AppData\Local\Temp\Tmp4AFE.tmp

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        1420d30f964eac2c85b2ccfe968eebce

                                                                        SHA1

                                                                        bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                        SHA256

                                                                        f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                        SHA512

                                                                        6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_siwas4fe.cs5.ps1

                                                                        Filesize

                                                                        60B

                                                                        MD5

                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                        SHA1

                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                        SHA256

                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                        SHA512

                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                      • C:\Users\Admin\AppData\Local\Temp\is-SSC5S.tmp\KuwaitSetupHockey.tmp

                                                                        Filesize

                                                                        2.5MB

                                                                        MD5

                                                                        656ac8a5f7d94898aca0506acaff40f5

                                                                        SHA1

                                                                        4bb836b01cb0bdca3ee39c2541109f76499918ac

                                                                        SHA256

                                                                        7da8b863d9db6bf1a94be017c302ca5e2116d0380c86ff4f05fc3f790c18f630

                                                                        SHA512

                                                                        0e5dcd1b60d28b4f8f8c38e18d71e2dade166db84c519e3831886b03fd02b5cf50a31dd4e60babb108108f2be23391e61a22de463e43404d96771cf9bb761c02

                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\CachedFiles\CachedImage_1024_600_POS4.jpg

                                                                        Filesize

                                                                        39KB

                                                                        MD5

                                                                        655d9f0cf81ffe21abba5cf876043e25

                                                                        SHA1

                                                                        6b2d8c5f9a422a97330a46de3189a2aff082525a

                                                                        SHA256

                                                                        1e101a054ba3cf6edabc59936ef9a395ee11453d0403af5c46db5e726cdaaf43

                                                                        SHA512

                                                                        f402acada9bfecc60f957212cb83e289e59cb2b854196cc5427093703bf9a869d84895c9f98f8e3700764e92c74b661ba6d0a43e6f6111e00d5ff25873791384

                                                                      • C:\Users\Admin\AppData\Roaming\d3d9.dll

                                                                        Filesize

                                                                        534KB

                                                                        MD5

                                                                        a6da8d868dbd5c9fe6b505db0ee7eb71

                                                                        SHA1

                                                                        3dad32b3b3230ad6f44b82d1eb1749c67800c6f8

                                                                        SHA256

                                                                        4ad69afb341c6d8021db1d9b0b7e56d14b020a0d70739e31f0b65861f3c4eb2c

                                                                        SHA512

                                                                        132f54ac3116fd644c57840c893dae2128f571a784ceaa6dd78bafa3e05fc8f2a9d2458f1e1cf321b6cecc2423d3c57ff6d3c4b6b60f92a41b665105a3262dd0

                                                                      • C:\Users\Admin\AppData\Roaming\msvcp110.dll

                                                                        Filesize

                                                                        642KB

                                                                        MD5

                                                                        9bc424be13dca227268ab018dca9ef0c

                                                                        SHA1

                                                                        f6f42e926f511d57ef298613634f3a186ec25ddc

                                                                        SHA256

                                                                        59d3999d0989c9c91dae93c26499f5a14b837a0fe56e6fc29f57456f54a1f8a2

                                                                        SHA512

                                                                        70a1abb35bd95efc40af6653d5db2e155fab9a8575b7ae5b69ab3fbcd60925c66a675dac6cba57564a430e9b92f1a2ea9e912c4d7f356b82696ed77e92b52715

                                                                      • C:\Users\Admin\tbtnds.dat

                                                                        Filesize

                                                                        3KB

                                                                        MD5

                                                                        784db33abf3b0e97b29f5de5df60b62d

                                                                        SHA1

                                                                        53e76881943e7243da5f645324aae80eec9d4698

                                                                        SHA256

                                                                        962873e3abadd0892a0ccf9039c5132741469bb6c1ac60910e723ebb60427741

                                                                        SHA512

                                                                        319ed1cd62c08d9aa403f86349c9b9df1c17997d5a3a9392f1f2a8a967b4abc4ae5b953f37fc1eb2576e93223ed868b9ca7af622aa976e67532eb863cc441c9c

                                                                      • memory/1304-208-0x00007FF7E2110000-0x00007FF7E26A7000-memory.dmp

                                                                        Filesize

                                                                        5.6MB

                                                                      • memory/1368-276-0x0000000000400000-0x0000000000435000-memory.dmp

                                                                        Filesize

                                                                        212KB

                                                                      • memory/1368-278-0x0000000000400000-0x0000000000435000-memory.dmp

                                                                        Filesize

                                                                        212KB

                                                                      • memory/1484-108-0x0000000000580000-0x0000000000610000-memory.dmp

                                                                        Filesize

                                                                        576KB

                                                                      • memory/1576-294-0x00000000008B0000-0x0000000000A50000-memory.dmp

                                                                        Filesize

                                                                        1.6MB

                                                                      • memory/1812-177-0x00007FF677790000-0x00007FF677D27000-memory.dmp

                                                                        Filesize

                                                                        5.6MB

                                                                      • memory/1840-172-0x00000255D6390000-0x00000255D63B2000-memory.dmp

                                                                        Filesize

                                                                        136KB

                                                                      • memory/2152-41-0x0000000005630000-0x00000000056C2000-memory.dmp

                                                                        Filesize

                                                                        584KB

                                                                      • memory/2152-62-0x0000000007B90000-0x00000000081A8000-memory.dmp

                                                                        Filesize

                                                                        6.1MB

                                                                      • memory/2152-39-0x0000000000CC0000-0x0000000000D12000-memory.dmp

                                                                        Filesize

                                                                        328KB

                                                                      • memory/2152-40-0x0000000005B40000-0x00000000060E6000-memory.dmp

                                                                        Filesize

                                                                        5.6MB

                                                                      • memory/2152-65-0x0000000007690000-0x00000000076CC000-memory.dmp

                                                                        Filesize

                                                                        240KB

                                                                      • memory/2152-66-0x0000000007800000-0x000000000784C000-memory.dmp

                                                                        Filesize

                                                                        304KB

                                                                      • memory/2152-42-0x00000000055E0000-0x00000000055EA000-memory.dmp

                                                                        Filesize

                                                                        40KB

                                                                      • memory/2152-64-0x0000000007630000-0x0000000007642000-memory.dmp

                                                                        Filesize

                                                                        72KB

                                                                      • memory/2152-59-0x0000000006BF0000-0x0000000006C66000-memory.dmp

                                                                        Filesize

                                                                        472KB

                                                                      • memory/2152-60-0x0000000007180000-0x000000000719E000-memory.dmp

                                                                        Filesize

                                                                        120KB

                                                                      • memory/2152-63-0x00000000076F0000-0x00000000077FA000-memory.dmp

                                                                        Filesize

                                                                        1.0MB

                                                                      • memory/2580-120-0x0000000000520000-0x0000000000585000-memory.dmp

                                                                        Filesize

                                                                        404KB

                                                                      • memory/2580-116-0x0000000000520000-0x0000000000585000-memory.dmp

                                                                        Filesize

                                                                        404KB

                                                                      • memory/2580-115-0x0000000000520000-0x0000000000585000-memory.dmp

                                                                        Filesize

                                                                        404KB

                                                                      • memory/2736-19-0x0000000000760000-0x000000000081E000-memory.dmp

                                                                        Filesize

                                                                        760KB

                                                                      • memory/2736-645-0x00007FFD6FE70000-0x00007FFD70932000-memory.dmp

                                                                        Filesize

                                                                        10.8MB

                                                                      • memory/2736-24-0x00007FFD6FE70000-0x00007FFD70932000-memory.dmp

                                                                        Filesize

                                                                        10.8MB

                                                                      • memory/2736-21-0x000000001B3E0000-0x000000001B462000-memory.dmp

                                                                        Filesize

                                                                        520KB

                                                                      • memory/2736-20-0x00007FFD6FE70000-0x00007FFD70932000-memory.dmp

                                                                        Filesize

                                                                        10.8MB

                                                                      • memory/2736-18-0x00007FFD6FE73000-0x00007FFD6FE75000-memory.dmp

                                                                        Filesize

                                                                        8KB

                                                                      • memory/2820-245-0x0000000000810000-0x0000000000864000-memory.dmp

                                                                        Filesize

                                                                        336KB

                                                                      • memory/2820-239-0x0000000000810000-0x0000000000864000-memory.dmp

                                                                        Filesize

                                                                        336KB

                                                                      • memory/2820-241-0x0000000000810000-0x0000000000864000-memory.dmp

                                                                        Filesize

                                                                        336KB

                                                                      • memory/2980-295-0x00007FF755310000-0x00007FF755339000-memory.dmp

                                                                        Filesize

                                                                        164KB

                                                                      • memory/2980-263-0x00007FF755310000-0x00007FF755339000-memory.dmp

                                                                        Filesize

                                                                        164KB

                                                                      • memory/3112-223-0x00000000001C0000-0x000000000026E000-memory.dmp

                                                                        Filesize

                                                                        696KB

                                                                      • memory/3120-404-0x0000020B50F80000-0x0000020B50FA0000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/3120-478-0x0000020B624C0000-0x0000020B624E0000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/3120-453-0x0000020B624A0000-0x0000020B624C0000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/3120-395-0x0000020B50F40000-0x0000020B50F60000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/3120-452-0x0000020B61610000-0x0000020B61710000-memory.dmp

                                                                        Filesize

                                                                        1024KB

                                                                      • memory/3120-405-0x0000020B50F60000-0x0000020B50F80000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/3172-3-0x0000000074A10000-0x00000000751C1000-memory.dmp

                                                                        Filesize

                                                                        7.7MB

                                                                      • memory/3172-23-0x0000000074A10000-0x00000000751C1000-memory.dmp

                                                                        Filesize

                                                                        7.7MB

                                                                      • memory/3172-22-0x0000000074A1E000-0x0000000074A1F000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/3172-0-0x0000000074A1E000-0x0000000074A1F000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/3172-2-0x00000000051A0000-0x000000000523C000-memory.dmp

                                                                        Filesize

                                                                        624KB

                                                                      • memory/3172-1-0x0000000000820000-0x0000000000828000-memory.dmp

                                                                        Filesize

                                                                        32KB

                                                                      • memory/3192-124-0x0000000000400000-0x0000000000473000-memory.dmp

                                                                        Filesize

                                                                        460KB

                                                                      • memory/3192-123-0x0000000000400000-0x0000000000473000-memory.dmp

                                                                        Filesize

                                                                        460KB

                                                                      • memory/3192-125-0x0000000000400000-0x0000000000473000-memory.dmp

                                                                        Filesize

                                                                        460KB

                                                                      • memory/3524-1002-0x0000000000D70000-0x0000000000D86000-memory.dmp

                                                                        Filesize

                                                                        88KB

                                                                      • memory/3940-93-0x0000000004E90000-0x0000000004EF6000-memory.dmp

                                                                        Filesize

                                                                        408KB

                                                                      • memory/3940-92-0x0000000000570000-0x00000000005BE000-memory.dmp

                                                                        Filesize

                                                                        312KB

                                                                      • memory/4080-659-0x0000000000970000-0x0000000000E16000-memory.dmp

                                                                        Filesize

                                                                        4.6MB

                                                                      • memory/4080-657-0x0000000000970000-0x0000000000E16000-memory.dmp

                                                                        Filesize

                                                                        4.6MB

                                                                      • memory/4172-1128-0x0000000000E10000-0x0000000000E2A000-memory.dmp

                                                                        Filesize

                                                                        104KB

                                                                      • memory/4236-545-0x00007FF651AB0000-0x00007FF65229F000-memory.dmp

                                                                        Filesize

                                                                        7.9MB

                                                                      • memory/4236-642-0x00007FF651AB0000-0x00007FF65229F000-memory.dmp

                                                                        Filesize

                                                                        7.9MB

                                                                      • memory/4236-264-0x00007FF651AB0000-0x00007FF65229F000-memory.dmp

                                                                        Filesize

                                                                        7.9MB

                                                                      • memory/4236-663-0x00007FF651AB0000-0x00007FF65229F000-memory.dmp

                                                                        Filesize

                                                                        7.9MB

                                                                      • memory/4236-661-0x00007FF651AB0000-0x00007FF65229F000-memory.dmp

                                                                        Filesize

                                                                        7.9MB

                                                                      • memory/4236-446-0x00007FF651AB0000-0x00007FF65229F000-memory.dmp

                                                                        Filesize

                                                                        7.9MB

                                                                      • memory/4236-419-0x00007FF651AB0000-0x00007FF65229F000-memory.dmp

                                                                        Filesize

                                                                        7.9MB

                                                                      • memory/4236-207-0x000001FFDEDB0000-0x000001FFDEDD0000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4236-310-0x00007FF651AB0000-0x00007FF65229F000-memory.dmp

                                                                        Filesize

                                                                        7.9MB

                                                                      • memory/4236-296-0x00007FF651AB0000-0x00007FF65229F000-memory.dmp

                                                                        Filesize

                                                                        7.9MB

                                                                      • memory/4276-345-0x0000013C8D570000-0x0000013C8D590000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4276-328-0x0000013C8D550000-0x0000013C8D570000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4276-343-0x0000013C8D820000-0x0000013C8D840000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4304-1452-0x0000000000860000-0x00000000008B2000-memory.dmp

                                                                        Filesize

                                                                        328KB

                                                                      • memory/4368-602-0x000002209E3C0000-0x000002209E3E0000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4368-603-0x000002209EEA0000-0x000002209EEC0000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4368-604-0x000002209E3E0000-0x000002209E400000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4368-596-0x000002209D300000-0x000002209D400000-memory.dmp

                                                                        Filesize

                                                                        1024KB

                                                                      • memory/4400-529-0x000002EB9F360000-0x000002EB9F380000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4400-493-0x000002E39C700000-0x000002E39C800000-memory.dmp

                                                                        Filesize

                                                                        1024KB

                                                                      • memory/4400-515-0x000002EB9F090000-0x000002EB9F0B0000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4400-530-0x000002EB9F0B0000-0x000002EB9F0D0000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4692-143-0x00000000001E0000-0x00000000001E6000-memory.dmp

                                                                        Filesize

                                                                        24KB

                                                                      • memory/4696-866-0x0000000000290000-0x00000000004F1000-memory.dmp

                                                                        Filesize

                                                                        2.4MB

                                                                      • memory/4696-883-0x0000000000290000-0x00000000004F1000-memory.dmp

                                                                        Filesize

                                                                        2.4MB

                                                                      • memory/5064-549-0x000001925A600000-0x000001925A700000-memory.dmp

                                                                        Filesize

                                                                        1024KB

                                                                      • memory/5064-547-0x000001925A600000-0x000001925A700000-memory.dmp

                                                                        Filesize

                                                                        1024KB

                                                                      • memory/5064-580-0x000001925C270000-0x000001925C290000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/5064-581-0x000001925BF00000-0x000001925BF20000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/5064-572-0x000001925B5D0000-0x000001925B5F0000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/5088-1120-0x0000000000330000-0x0000000000346000-memory.dmp

                                                                        Filesize

                                                                        88KB