Analysis

  • max time kernel
    450s
  • max time network
    446s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 20:07

General

  • Target

    brhu.zip

  • Size

    5.2MB

  • MD5

    b4beead5a110d9ce24b1c26fa41e3e99

  • SHA1

    b2e873487c4d90447d923b3b6b89995ffb456b8c

  • SHA256

    a1356c9f60766482ea7590a16225a6a13497387345741da43d7cd5f33ab47576

  • SHA512

    8f701a85322980c28f0742ff6b4ba549eef93c0462cfc27d56517d1d210c4016ebbe5ef064fa5346c65119dadb2916de04e5be4f689f4c2f68a949f2e9bd617b

  • SSDEEP

    98304:taptf7h03fmRwldsRLvP43G9B7JgnZX0XRBx9dLCHi3mKJ2cWTju:tGf7jko4olEZX0L7dL2i37ncu

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

darkgvr.duckdns.org:1604

picaroon.duckdns.org:1604

Mutex

DC_MUTEX-1F8AXR1

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    MuPduYiF2XAq

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

3.17.202.129:17362

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    nothingset

  • port

    4444

  • startup_name

    nothingset

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

Zula Hack

C2

denkmisin.duckdns.org:5552

Mutex

Windows Service

Attributes
  • reg_key

    Windows Service

  • splitter

    |Hassan|

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Detect XenoRat Payload 2 IoCs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Njrat family
  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Xenorat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 27 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 2 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 26 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 12 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\brhu.zip"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4188
  • C:\Users\Admin\Desktop\Robuk.exe
    "C:\Users\Admin\Desktop\Robuk.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Executes dropped EXE
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
      "C:\Windows\system32\MSDCSC\msdcsc.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4456
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
          PID:5104
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          3⤵
            PID:1528
      • C:\Users\Admin\Desktop\Robuk.exe
        "C:\Users\Admin\Desktop\Robuk.exe"
        1⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1600
      • C:\Users\Admin\Desktop\bak.exe
        "C:\Users\Admin\Desktop\bak.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2908
        • C:\Program Files (x86)\Pranas.NET\SqlBackupFree\SqlBackupFree.exe
          "C:\Program Files (x86)\Pranas.NET\SqlBackupFree\SqlBackupFree.exe" -install
          2⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3328
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://sqlbackupandftp.com/thankyou/action.aspx?t=i&g=21ef605e-6365-46a9-93cf-3478a462a812
            3⤵
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:464
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffa047546f8,0x7ffa04754708,0x7ffa04754718
              4⤵
                PID:8
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,10930293377819308425,5673858086719117938,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:2
                4⤵
                  PID:2980
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,10930293377819308425,5673858086719117938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:3
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:548
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,10930293377819308425,5673858086719117938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:8
                  4⤵
                    PID:2212
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10930293377819308425,5673858086719117938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:1
                    4⤵
                      PID:3516
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10930293377819308425,5673858086719117938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:1
                      4⤵
                        PID:4344
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10930293377819308425,5673858086719117938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:1
                        4⤵
                          PID:3948
                    • C:\Program Files (x86)\Pranas.NET\SqlBackupFree\SqlBackupFree.exe
                      "C:\Program Files (x86)\Pranas.NET\SqlBackupFree\SqlBackupFree.exe"
                      2⤵
                      • Executes dropped EXE
                      • Drops desktop.ini file(s)
                      • Drops file in Windows directory
                      PID:2416
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
                        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ylavn2lp.cmdline"
                        3⤵
                          PID:2848
                          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4C23.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC4C22.tmp"
                            4⤵
                              PID:4816
                          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
                            "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qiyjpnr3.cmdline"
                            3⤵
                              PID:2548
                              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                                C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4CB0.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC4CAF.tmp"
                                4⤵
                                  PID:1772
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:5000
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:3956
                              • C:\Users\Admin\Desktop\Robuk.exe
                                "C:\Users\Admin\Desktop\Robuk.exe"
                                1⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:2768
                              • C:\Users\Admin\Desktop\floornite batle pas.exe
                                "C:\Users\Admin\Desktop\floornite batle pas.exe"
                                1⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:5092
                              • C:\Users\Admin\Desktop\xeno_rat_client.exe
                                "C:\Users\Admin\Desktop\xeno_rat_client.exe"
                                1⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:2680
                              • C:\Users\Admin\Desktop\free.panel.exe
                                "C:\Users\Admin\Desktop\free.panel.exe"
                                1⤵
                                • Modifies WinLogon for persistence
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Adds Run key to start application
                                • System Location Discovery: System Language Discovery
                                • Modifies registry class
                                PID:3844
                                • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
                                  "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  PID:3184
                                  • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                    "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1912
                              • C:\Users\Admin\Desktop\free.panel.exe
                                "C:\Users\Admin\Desktop\free.panel.exe"
                                1⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:1836
                              • C:\Users\Admin\Desktop\Zula Hack.exe
                                "C:\Users\Admin\Desktop\Zula Hack.exe"
                                1⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: GetForegroundWindowSpam
                                PID:3472
                                • C:\Users\Admin\AppData\Roaming\Windows Service.exe
                                  "C:\Users\Admin\AppData\Roaming\Windows Service.exe"
                                  2⤵
                                  • Drops startup file
                                  • Executes dropped EXE
                                  • Adds Run key to start application
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: GetForegroundWindowSpam
                                  PID:456
                              • C:\Users\Admin\Desktop\Zula Hack.exe
                                "C:\Users\Admin\Desktop\Zula Hack.exe"
                                1⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:4448
                              • C:\Users\Admin\Desktop\free vbuc.exe
                                "C:\Users\Admin\Desktop\free vbuc.exe"
                                1⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                PID:436
                                • C:\Users\Admin\AppData\Roaming\MS WM Player\msplayer.exe
                                  "C:\Users\Admin\AppData\Roaming\MS WM Player\msplayer.exe"
                                  2⤵
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • Adds Run key to start application
                                  • System Location Discovery: System Language Discovery
                                  • NTFS ADS
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious behavior: GetForegroundWindowSpam
                                  PID:3304
                                  • C:\Users\Admin\AppData\Roaming\MS WM Player\TorClient\Tor.exe
                                    "C:\Users\Admin\AppData\Roaming\MS WM Player\TorClient\Tor.exe" -f TorConfig
                                    3⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2104
                              • C:\Users\Admin\Desktop\free vbuc.exe
                                "C:\Users\Admin\Desktop\free vbuc.exe"
                                1⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:3184
                              • C:\Users\Admin\Desktop\free vbuc.exe
                                "C:\Users\Admin\Desktop\free vbuc.exe"
                                1⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:5016
                              • C:\Users\Admin\Desktop\floornite batle pas.exe
                                "C:\Users\Admin\Desktop\floornite batle pas.exe"
                                1⤵
                                • Executes dropped EXE
                                PID:1176
                              • C:\Users\Admin\Desktop\Robuk.exe
                                "C:\Users\Admin\Desktop\Robuk.exe"
                                1⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:2288
                              • C:\Users\Admin\Desktop\xeno_rat_client.exe
                                "C:\Users\Admin\Desktop\xeno_rat_client.exe"
                                1⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:4612
                              • C:\Users\Admin\Desktop\Zula Hack.exe
                                "C:\Users\Admin\Desktop\Zula Hack.exe"
                                1⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:3916
                              • C:\Users\Admin\Desktop\free.panel.exe
                                "C:\Users\Admin\Desktop\free.panel.exe"
                                1⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:2636
                              • C:\Users\Admin\Desktop\floornite batle pas.exe
                                "C:\Users\Admin\Desktop\floornite batle pas.exe"
                                1⤵
                                • Executes dropped EXE
                                PID:1924
                              • C:\Users\Admin\Desktop\xeno_rat_client.exe
                                "C:\Users\Admin\Desktop\xeno_rat_client.exe"
                                1⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:5028
                              • C:\Windows\system32\launchtm.exe
                                launchtm.exe /2
                                1⤵
                                  PID:1468
                                  • C:\Windows\System32\Taskmgr.exe
                                    "C:\Windows\System32\Taskmgr.exe" /2
                                    2⤵
                                    • Checks SCSI registry key(s)
                                    • Suspicious behavior: GetForegroundWindowSpam
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    PID:3188

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Program Files (x86)\Pranas.NET\SqlBackupFree\SqlBackupFree.exe

                                  Filesize

                                  621KB

                                  MD5

                                  465cf770e36f1f90a9118b3c0ca38244

                                  SHA1

                                  097acd7966d5096c7d25053eae91d856c350ae2a

                                  SHA256

                                  2fd9acd22964cb987f37a954bb35c01c22d18b33fbff2e97d39b53c2445403da

                                  SHA512

                                  f55fb1abf852b48459d715c90c08661e8aadcab975fd6e7168f4c9e434a47611efa6b1c3dbb22ce80a1ec12e2b76f6b98fe48660b773c68f7bc067b211c5d16a

                                • C:\Program Files (x86)\Pranas.NET\SqlBackupFree\WebCommon.dll

                                  Filesize

                                  21KB

                                  MD5

                                  d9773a2554d27b403ad9f7272ffa5059

                                  SHA1

                                  452ddccca31afabce16b433dedd840a502e1e4b4

                                  SHA256

                                  f12e050368c36c1589c6f5caafc9708253abf2988fd60d5ee0554b8e9f4374ee

                                  SHA512

                                  813619d21a59ccbba0430d05031f8237c818f433c84f3a9b6bfc7727d1ef306ecb965d90f9e409cf9a13a1b0864beb46e44477e18119a16187b318a9f2c7a1d3

                                • C:\Program Files (x86)\Pranas.NET\SqlBackupFree\Xceed.Compression.dll

                                  Filesize

                                  196KB

                                  MD5

                                  3889fc80b89cce2811ceeaabf89f807e

                                  SHA1

                                  9a122d50c6d6492dd37f04983c409241b433d57f

                                  SHA256

                                  2804515fea28f5af62aabbad63f0d3660601237c61edd99f351b9a8d042b3f0f

                                  SHA512

                                  e113186f830f6e93e0d809e3cb02374f426965b8ef1ad5c3f6f61a3c17459058a40d3754a04ead5c4aa32e4f6fdf7d02d074005a9860625a6bac7012ed20fb0e

                                • C:\Program Files (x86)\Pranas.NET\SqlBackupFree\Xceed.FileSystem.dll

                                  Filesize

                                  124KB

                                  MD5

                                  744b43e230e0d44168bd885d57c06072

                                  SHA1

                                  7b3f490d00f81877f63ace31cfef0ea81f7b4143

                                  SHA256

                                  fdc0b0e4c34b2f33be418736f4143509e65dd7d14216edfc5a8eadd1b17601bb

                                  SHA512

                                  5c0b46261fc9676655684dfe48283170716fc33c1aa4de1c1070ab03fae3de98461665da492d5d23583aa7f2460b25fd745e53099e58a5ba1e24e7291ed188ab

                                • C:\Program Files (x86)\Pranas.NET\SqlBackupFree\Xceed.Zip.dll

                                  Filesize

                                  280KB

                                  MD5

                                  5f30e02c205dd190b84516e8cdd3aa61

                                  SHA1

                                  41169d6c3b1ef183349bd31e7be6ef0a9a7df990

                                  SHA256

                                  25f3e2385b620b48ecf0f7eb3c900e7feca8597a5848a9744c2d60758b989817

                                  SHA512

                                  7a253f23922ffb7e037f9d781cec4bf81e86863b3e3322cac8782357d34b4f0bc2e84c0087daaec05af4169f183fec852d8d92e9677c88e75577864899b22603

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5457A8CE4B2A7499F8299A013B6E1C7C_D734EC3DD00546F46D368325396086B0

                                  Filesize

                                  5B

                                  MD5

                                  5bfa51f3a417b98e7443eca90fc94703

                                  SHA1

                                  8c015d80b8a23f780bdd215dc842b0f5551f63bd

                                  SHA256

                                  bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

                                  SHA512

                                  4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5457A8CE4B2A7499F8299A013B6E1C7C_D734EC3DD00546F46D368325396086B0

                                  Filesize

                                  398B

                                  MD5

                                  d425fcc2556370534717d80c83ecba3f

                                  SHA1

                                  41e7101facce30ea68083d1318949fc07f42383b

                                  SHA256

                                  e350bea3a5d5dde6d80e16430d63bdfa219f322531b9258f24c4f8fa9ae6183a

                                  SHA512

                                  dd2e5f01c32322cb76b422c911f2841b0aa8582a970ff9dc549772b8c01f3036b5814bbe589b33452117a7f4524364234e09a791ee715058501644ffdb47dfb6

                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\SqlBackupFree.exe.log

                                  Filesize

                                  312B

                                  MD5

                                  f2f49ca9c234b152efb2d2152c7cf459

                                  SHA1

                                  8df377ad960cf6da714d9d220f88b85c578d5962

                                  SHA256

                                  ac82c08f4181f55e107f596014c7d38cd9f27e883381859a1dffe4cb4be15fb9

                                  SHA512

                                  093b52bca3b51d420f251ac1cd93512b89b5ed023748da0d8cbc92b38e8257412d86a4affa837bb32ed7da1802025952bd5ff04b4f047553ee8bccb29753b662

                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Zula Hack.exe.log

                                  Filesize

                                  408B

                                  MD5

                                  42157868488d3ef98c00e3fa12f064be

                                  SHA1

                                  aad391be9ac3f6ce1ced49583690486a5f4186fb

                                  SHA256

                                  b9520170e84597186ba5cc223b9c2773f70d0cda088950bae2182e3b2237995c

                                  SHA512

                                  8f4a4bd63ceefc34158ea23f3a73dcc2848eeacdba8355d1251a96b4e0c18e2f3b0c4939be359f874f81fe4ee63283b8be43a70fe2dbaa2e64784333d10a2471

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  37f660dd4b6ddf23bc37f5c823d1c33a

                                  SHA1

                                  1c35538aa307a3e09d15519df6ace99674ae428b

                                  SHA256

                                  4e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8

                                  SHA512

                                  807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  d7cb450b1315c63b1d5d89d98ba22da5

                                  SHA1

                                  694005cd9e1a4c54e0b83d0598a8a0c089df1556

                                  SHA256

                                  38355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031

                                  SHA512

                                  df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  216B

                                  MD5

                                  b1cf393446e8ea4657ffb42b66a68826

                                  SHA1

                                  210a4d44473fd33f75cf3397f57f03d0b86468c8

                                  SHA256

                                  709773a5175c95604ff69b15368b8789c26c173aff74d50f6565f950b39181f8

                                  SHA512

                                  f5aa4eb7fad64d31dccb37a18eab68f1e6c0a18df82e07b03d4331ebd98a431e9eae2e429e71e3a59e2e78427a492ddd5b899e695ef08fb7f178fa48329b264e

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                  Filesize

                                  1KB

                                  MD5

                                  49172fae588a936968726ef34efdfb99

                                  SHA1

                                  fcbfda0f5bc6cec9e180d29cfc60f9eb339d7f71

                                  SHA256

                                  f5134ad6e179649fe857e9988446bbe06d572daf60cc96c0d82d81cd353aa9e0

                                  SHA512

                                  84bc87328ef9b8773026f46e3b5e82a48a7000839b61c151386d521582c27134e9053c90b8497b62c11f8836bdcaef582b2e40d97aedfe93e198a495e111b062

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  5KB

                                  MD5

                                  e0306b03c868eacbdc77eb2aba94083b

                                  SHA1

                                  b25afb208a26a074e77e4148db76a633286587c7

                                  SHA256

                                  ccf013a0c107df6085884708f6f428266579291cfeb2ee3c84dd0cddc1695e30

                                  SHA512

                                  5a71ac20529e33b4de2a4bc81320c76b22ea940b3bcddca0365e21f945386e7d56c76a53cf9de0b747e51d79b276c98f25bc8c245fd8165d735a6069206bbdb1

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  7KB

                                  MD5

                                  e53c3ff57e6a5263ab4454007b25938e

                                  SHA1

                                  048a1f1bb56776390aceeb1eba84e114851d2e59

                                  SHA256

                                  3a849917a9060b381afa7116f1fe65cdb99373f3b3841e813eb85fbe9266b697

                                  SHA512

                                  7e64764bc06d3e55b9ed91c2ad635b0e522f9c671ef1d972097f7c8cc8f91f2bbf44864317ba33b6868ee32321f09f62af9c9fcd7d5a758a83d1af915e3d269a

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  10KB

                                  MD5

                                  6a4db9a08139e2d5e247b5a24f2dd6f6

                                  SHA1

                                  849e349c097ca03aadcf33c3e3d2bb51c297b1f8

                                  SHA256

                                  08cc549e2f8609634d8eb8f6eae0dedde7e151ea52b5ec80532624af08d1ec61

                                  SHA512

                                  818c1e56d6ccd6a69706c5d7078738f45d991ce4fed8bb3780d30cfe1bbb4027cc813e6f80d99f05cfd3d24c105bd00ae87f2e5f4b3fca48d8ee5f1cb14ff560

                                • C:\Users\Admin\AppData\Local\Temp\RES4C23.tmp

                                  Filesize

                                  1KB

                                  MD5

                                  12d926a3cd5305bea1f04252c95efa89

                                  SHA1

                                  fd9cdb2726c4fe6141224ef33ef76ddf4dc13776

                                  SHA256

                                  1a7d3df6a644e0180c9d8c08922f03d4a5fc0b1a021ac526046663b4109cde0d

                                  SHA512

                                  8665e5a6281f7f98039b42eddedffc41fd7e615a2d8a537b2271dd8d293a04a5d4a23d7076ba3ef29fa2281191e482cf67981115d8f220c00a7545bbe4c8587e

                                • C:\Users\Admin\AppData\Local\Temp\RES4CB0.tmp

                                  Filesize

                                  1KB

                                  MD5

                                  e0e67ea5a5e8516969a199613e12eb3f

                                  SHA1

                                  dc6af5f07b02c99504e2bbf59d1c6628d37619f3

                                  SHA256

                                  9fa33030dbefd228b578821df892b0ed561561d2492e4cb07d3a3a5d7de598d4

                                  SHA512

                                  96162d46f49d12bf2c2aba2035afccd19e325dee2045dcd3624a18ae8ed78e4146bdd14ce8002b0e3e8573360395331eb2db60270757b86d87f18d29c3689d59

                                • C:\Users\Admin\AppData\Local\Temp\nsbECAE.tmp\InstallOptions.dll

                                  Filesize

                                  14KB

                                  MD5

                                  eee2912bd1ee421cf1f1dfb1cc327d97

                                  SHA1

                                  c5d3741ddb195718c9b17923eb6abfb7a732bdc1

                                  SHA256

                                  e560384c5298ee2123e8340e716b2c4680f51b4d0347995ba3290dbd1130c6c0

                                  SHA512

                                  1808a068386c790d8ad5096d9fededcfa6e5688e3a68f2499418456c9cafd7b837c811298e6570212155b4a3d6038c1749cfcd9d1b86f090f66d1a5301adecb2

                                • C:\Users\Admin\AppData\Local\Temp\nsbECAE.tmp\ioSpecial.ini

                                  Filesize

                                  689B

                                  MD5

                                  cf7c0ded82423a991af309ed98c50bdb

                                  SHA1

                                  8c35e8b04e834739b0d0225dc6d93d100768ed40

                                  SHA256

                                  f2f2f73a81f1a9687b525c13925bf46948da1de6a6960fb74a633ed6fa8b998e

                                  SHA512

                                  2d7e8c47ebe3323313d2f9130c72f87ad235de85287356e089ec1f5cb5a5b1a6293132e548a4af21d7548b7ec59e7d455f26195d9a9829d72ee02c0df87d43d9

                                • C:\Users\Admin\AppData\Local\Temp\nsbECAE.tmp\ioSpecial.ini

                                  Filesize

                                  657B

                                  MD5

                                  21150a97e818e995b674f04c313853d0

                                  SHA1

                                  40171edd76b9ca1dacd44af986575caff7526adc

                                  SHA256

                                  f75de6942981d7f912c60bfa7686b4080415661a3302782437591695c525e7d8

                                  SHA512

                                  9e20c2f699524424fd96381f44bb484225baff78efa306509d27e5449fa6d3df44624f79348b7325ad59bc190a1ce65cf4dd55c80b7dead7ec817cb0828454f6

                                • C:\Users\Admin\AppData\Local\Temp\nsbECAE.tmp\ioSpecial.ini

                                  Filesize

                                  694B

                                  MD5

                                  2f3619c71defa5bc9010cfc9fb29fcf3

                                  SHA1

                                  a738b80010f6cf6d4b598525ab3bd5935ececf7c

                                  SHA256

                                  7e408f16c32026c71360e3744f9dbc3aa2a31d3fdef71dfaef5820918947f74c

                                  SHA512

                                  9b306ec4acd215eeea7261ed86a5eb7e9ea158d38e0549fe0b95b6effb7617eb5e19b85db0fb3c986ebe9c02a82a3ac2267e787e9a27f4645d03f32c137d0085

                                • C:\Users\Admin\AppData\Local\Temp\nsbECAE.tmp\ioSpecial.ini

                                  Filesize

                                  397B

                                  MD5

                                  6fa704e560fd4b122d6ba6488d330ff5

                                  SHA1

                                  04a6168d6ea86440d53e14822b1f62335eb9bc38

                                  SHA256

                                  5edeac2f23354944eadff3af9e1bd8070820aacf7871a99c7e43c5df98e7daed

                                  SHA512

                                  116aa67533acd4d0b04199f899b229ed37944b4719bec5d8f7642fd6ca5fcc5fa4b56c9ebb45d46279b4105dc4f28a94893936f60de01799597ca3e6952f6641

                                • C:\Users\Admin\AppData\Local\Temp\qiyjpnr3.dll

                                  Filesize

                                  8KB

                                  MD5

                                  a32ad1db36f2ab47eea25e38f3b583be

                                  SHA1

                                  51b666f864eac26b594077751aa6488cb416caa1

                                  SHA256

                                  1546e823b7a9313d48e3e404ce1bc228d4969dc43a835cf06ee0e5baf40b4783

                                  SHA512

                                  5155c404ccd117394860a57e43f0462928fe6051fe3bfb40abfeaa724aceca1085121c02431044bcee6332c764e5e0da0c72b0678cc207293d91224847ff63ab

                                • C:\Users\Admin\AppData\Local\Temp\ylavn2lp.dll

                                  Filesize

                                  12KB

                                  MD5

                                  76c0c55f0ec71b5655d179f2c7073d4a

                                  SHA1

                                  c061acff4fdbecd7808758379ff3d45b1c9012cf

                                  SHA256

                                  cda1f564c7ff85e6c5b49e4b9950a79dac5f64280d1d27e068a77f90c15d1dfa

                                  SHA512

                                  b719d1ad38e3f2bfbe2a3985d7e20c09f7bc41e58739787eda3aef9973fea292615c60b9d520ecd13fcf08b7c51cfc4bb7558af2ad67bb1d218a6fd5ccd6aeaa

                                • C:\Users\Admin\AppData\Roaming\MS WM Player\TorClient\LIBEAY32.dll

                                  Filesize

                                  1.9MB

                                  MD5

                                  db239662a89319db0d7e407f500048b7

                                  SHA1

                                  3af69f69c01424b133974b61cc5fd9f48284f55f

                                  SHA256

                                  91e61d73ff28c8ef120fac82bb1d7fee3e0deb8ecf5c25b74c48dc4aa0d4b555

                                  SHA512

                                  e4547c526c77848080a4ca565db6a016b110267f90359df4559364055245de53913fe5ca97b1ea8f326233505c1d6388582ba891cec993301209a62a0fe40fce

                                • C:\Users\Admin\AppData\Roaming\MS WM Player\TorClient\Tor.exe

                                  Filesize

                                  2.3MB

                                  MD5

                                  a3acfe36ee6fdf5498b049e3ba4ef526

                                  SHA1

                                  994bccda34d3f47742d7e2cd64c895e6b82d22d3

                                  SHA256

                                  c72708f2cf5b1c76cd3b44800e0bc9727b257ce4af8b545f4c64eb61f8b0c4f9

                                  SHA512

                                  9f8fa1f194d9043d56e5ef75aecaa61a210991420de70bb98fdd36791a02c20ff086ac11a6ea8f258b3ed6bdfe18a24bfba07568d2eae5a81106fe0beda59416

                                • C:\Users\Admin\AppData\Roaming\MS WM Player\TorClient\libevent-2-0-5.dll

                                  Filesize

                                  702KB

                                  MD5

                                  8cc9cbd4ff4855c05d102ac6d5263c55

                                  SHA1

                                  88f23c6661997aefb9e54ce202ccb75e66c46d69

                                  SHA256

                                  8a851002a11a2115ce37397500a236c94a750c2bbc998482e7aeea957ad65fa7

                                  SHA512

                                  2532d0c2f02223f68b8f3785c65fdd7265446008b8e574dda1241fc883544e1cb78b83ce45d1a8ccf78d0853afccfe3b64c5d8e82343b0d09a9c788e905aee2b

                                • C:\Users\Admin\AppData\Roaming\MS WM Player\TorClient\libgcc_s_sjlj-1.dll

                                  Filesize

                                  510KB

                                  MD5

                                  22cf4f72397a339fc945fd1ff1ba988b

                                  SHA1

                                  1d55f910ff6058a2ac198f8040f3d38607ee105f

                                  SHA256

                                  44c3f712c08a02e5504316ea8aa77bced35ed0db00425a3ba2de71e2562c5f1d

                                  SHA512

                                  00bb15022eaa3682f246dd5c8c000e881356c7a31b5b6fcd8a212a1f02b58ea1afa9014d1f3468488b7abf10bfc0a3eb602639ad9d0fdd5cd45c8d82f6d627d7

                                • C:\Users\Admin\AppData\Roaming\MS WM Player\TorClient\libssp-0.dll

                                  Filesize

                                  90KB

                                  MD5

                                  9b602a5dcf36e4c9c2cb4db7db1794ae

                                  SHA1

                                  53fba632e974d82bbee2ac79dce65a0720f57177

                                  SHA256

                                  245c88e93a77167595fd69123b83ef1b92c1df57cec05e0039df67c2180b239b

                                  SHA512

                                  06c935849638c8d28c99d14bb30925ab0083354ee852e693205cc013f863c848e38bb5c57d82e84abf6222a39301099866f9ff7aa5fffbc362701008b2449f07

                                • C:\Users\Admin\Desktop\Robuk.exe

                                  Filesize

                                  658KB

                                  MD5

                                  9a0826b3f29e1139da03cb6cbbc24e1a

                                  SHA1

                                  bc501b29486a1d695e51b4617714bc02675fb124

                                  SHA256

                                  58bf2b3caa78e4d8184591c70ae98eca8f828260127662d533165bc981ebb634

                                  SHA512

                                  ae835269d118e6b56cdfdb153f0737547145970166d45a5df83daa8c925ea55049f72bf99b64d44bc92625fc052070d48d86497df94b986deb1ff402b16df753

                                • C:\Users\Admin\Desktop\Zula Hack.exe

                                  Filesize

                                  43KB

                                  MD5

                                  90fb7351598d38fcfe4bbec3105eec9c

                                  SHA1

                                  0e2c5d186f421cc058557b311083575399f3ccc7

                                  SHA256

                                  13439cc861f1ec089daf3cb4b49f18ed447016b333d14081eb12e3bd0bf58ab0

                                  SHA512

                                  55731c105b1cce1ca085dd83364271a547ab05ea5a6348fccfb2c5d812381eb3aee553ecd2a54708f4533a900dca90274193f35bb984a7042c20833c75c7e71c

                                • C:\Users\Admin\Desktop\bak.exe

                                  Filesize

                                  668KB

                                  MD5

                                  f5c49e039b5060308e90b3e4828442c5

                                  SHA1

                                  94beaa059a141a83a5b0b8c5729c62abc6ffb1fa

                                  SHA256

                                  d5005624ba18bdc47350cb9b975beb84903e36449e39c70e3c24193abb97e25a

                                  SHA512

                                  f7a2ee383e2ea63b9bb8eeb2b0f0c2861f05ffb14a5a7056dbc81e60e57fd5e17899ff20e217b9c8657df833002143fe8ed1114dcbb95a247c1559681370b7da

                                • C:\Users\Admin\Desktop\floornite batle pas.exe

                                  Filesize

                                  72KB

                                  MD5

                                  db1af8db93035e7d79ec78e0151ae530

                                  SHA1

                                  0cdb435a3cd50c0df47acabee8dc6dd54eb9c797

                                  SHA256

                                  9b4e3718bb031b287972e371087544eebc7015102343f8f885d6654de066ee8b

                                  SHA512

                                  7136551ab50afb1adc5a29b4526a14c3b6dc1e6f57d53b2e0b0a2c15eb5d2afd3e87149046b4cc09d1a86c1734bdc884bc5b38ef71da39be24967e445c80b055

                                • C:\Users\Admin\Desktop\free vbuc.exe

                                  Filesize

                                  4.3MB

                                  MD5

                                  e0ea62bbeb2655be6bcdf13051e7b507

                                  SHA1

                                  2185a7ffa38932a8e6905669eac7da9a92779701

                                  SHA256

                                  c207e02a921a3c0ad14fa3e408edd2558378cb4ff803b335fb1dcd4bc5880c9a

                                  SHA512

                                  31905c3e96e3a245ccf003d9d87fba11e45336ea9443e882c3fd25c6a3fa46531a96418d008ec17dad3f5ed0ff2062fd6eae6c652bf2b08998d104544b07153c

                                • C:\Users\Admin\Desktop\free.panel.exe

                                  Filesize

                                  756KB

                                  MD5

                                  aa8f114ffa8ef8294b989bcd5b4c1b14

                                  SHA1

                                  43dfe1126d9be396a068d55842ab9234932c92ad

                                  SHA256

                                  a910b622169246ed5ceee3f3ef2817bbcfc7c6591bf6dba3a3feb6fb58a9dad0

                                  SHA512

                                  6176f4f5ebfe6a16202615406d7f22f4da7525d4f4dae30d73bf2e85a7403b10e3015cedc14ae890f1315d2249929a0b7c789932c1af6af8e7f26234d9b6191c

                                • C:\Users\Admin\Desktop\xeno_rat_client.exe

                                  Filesize

                                  40KB

                                  MD5

                                  a47f2402fa31c5a7a03447f4b26638b7

                                  SHA1

                                  bfbd1a604cb83ff08723acec7bf464b1e544873d

                                  SHA256

                                  8a7f29a7c99940b8438d966bc8755b02ced6f8a491449dc7d2437e13d70ee8d7

                                  SHA512

                                  358f1a45a7cb94c7d71f964095d2183274d8bc543e918c0c15d48edf62da88d0e0380e9dd97ce8892bfec20fdc5f0d9e78fa03b684927472c68736c33d1887e0

                                • \??\c:\Users\Admin\AppData\Local\Temp\CSC4C22.tmp

                                  Filesize

                                  652B

                                  MD5

                                  cff981faa3e279a6003bd7ea671caa34

                                  SHA1

                                  a7a3160516a09342720538aa915ffb0be9cd0dc7

                                  SHA256

                                  5482cc7cbbde6007d10100cc4c2eaa34b58c8287f260cc6c2678a5079f42042a

                                  SHA512

                                  72bda764b2a67f336ed5a30ab66adf1887b03cc6000572045de7ec98aa85ea47b366aebafb94c3f75c36acbe5d94d29032d9162c98e3611b0c5553f7a7519151

                                • \??\c:\Users\Admin\AppData\Local\Temp\CSC4CAF.tmp

                                  Filesize

                                  652B

                                  MD5

                                  192fed7692bd2df587572c6fd2b4cc4a

                                  SHA1

                                  6d3af123a3ad567547efc4033bd0985aff1e0595

                                  SHA256

                                  a3d1af1f2b88b7e79c2ed2c5b298d328e8d5e81d9321e3bbe3ae721e77b1e20f

                                  SHA512

                                  733a6e9fff7cddcb2d77ac7925fd1042ce85ff77fd19fcc729f8db7b376eb5f3431179b2470d3f41d4730c722b689439babd0a4c3b44c6e70aadbd139ced4a41

                                • \??\c:\Users\Admin\AppData\Local\Temp\qiyjpnr3.0.cs

                                  Filesize

                                  10KB

                                  MD5

                                  fc6f1cac32473d95fa5ecfc06f883e45

                                  SHA1

                                  59ef048a16cb4d37b61e7827a52b02cb026d1173

                                  SHA256

                                  d2cfc35f405e25dda6a923dd3dd3b5eeac18074eb3803cd33c296a33be961e85

                                  SHA512

                                  3fc5af1458ba69b6af97f1c7a2fe5373a3e0b050d7b4befb672c3adbaf5a1d9e31a1af6288c304d8e3041a6d185d9f26a525609e6322a410d5709ae9e07b83b3

                                • \??\c:\Users\Admin\AppData\Local\Temp\qiyjpnr3.cmdline

                                  Filesize

                                  598B

                                  MD5

                                  e1e1d26bb424e764c029e364135a3bb9

                                  SHA1

                                  608c701e5903ca9a6cfae0fc65c8b8f5fd12fd1c

                                  SHA256

                                  50bca36ffcb9289160fa652f19a9e7d4285681f16c16d842d30f04a49a104a3b

                                  SHA512

                                  fae3f360e697e2554b24b090c654d9b0a588954230d3d9765ce01ab30445bfb6396a04d2da5cb1aa7d63de1d6e9abc641cc3540fab3480d8a1edee80fc297466

                                • \??\c:\Users\Admin\AppData\Local\Temp\ylavn2lp.0.cs

                                  Filesize

                                  22KB

                                  MD5

                                  4ce30fbab9e5d28fc61b204ac3925ffa

                                  SHA1

                                  7cbb264b9287dc6f8f50d0cb515284cb8a7496bf

                                  SHA256

                                  4347234b359a8d5ebebb8c60539dacdc0b9f56430eaf9486e83da87349ad4713

                                  SHA512

                                  543ca5f602eb11d4496cd11d40ff1bf7c7ec4dd0ec2967ea5c4cfdbf8ad62b2e7f2471200b74fd87b59c53c0645f1ea961f62c4093062e0e971fba61ef9dcb88

                                • \??\c:\Users\Admin\AppData\Local\Temp\ylavn2lp.cmdline

                                  Filesize

                                  598B

                                  MD5

                                  8fb5f6dea3d2bca4809dcdbd5650460d

                                  SHA1

                                  20fde04c6852fca85c0e30d37e5c513b16455c72

                                  SHA256

                                  e9a722e398c8310f21056f5faf785afcf9ace69096bf5558a7d9b3bc045910a0

                                  SHA512

                                  546eb6671b6c4f91bd7b543854466c71737ac674834618a4ff141b5454d8df05d642025e311cc4aef1501c79fce0d9b8b3e1acdb1e5d44d47780af73e8608ce7

                                • memory/436-647-0x0000000061C00000-0x0000000061C9C000-memory.dmp

                                  Filesize

                                  624KB

                                • memory/1600-82-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/1836-625-0x0000000000400000-0x00000000004CA000-memory.dmp

                                  Filesize

                                  808KB

                                • memory/1912-620-0x0000000000400000-0x00000000004CA000-memory.dmp

                                  Filesize

                                  808KB

                                • memory/1964-18-0x0000000002410000-0x0000000002411000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1964-79-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/2416-507-0x0000000020800000-0x0000000020849000-memory.dmp

                                  Filesize

                                  292KB

                                • memory/2416-502-0x000000001BB00000-0x000000001BB08000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/2416-537-0x000000001DC30000-0x000000001DC38000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/2416-523-0x000000001CE10000-0x000000001CE1A000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/2416-504-0x000000001E310000-0x000000001E31C000-memory.dmp

                                  Filesize

                                  48KB

                                • memory/2416-505-0x000000001FD30000-0x000000001FE00000-memory.dmp

                                  Filesize

                                  832KB

                                • memory/2416-508-0x0000000020900000-0x000000002093E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/2416-506-0x0000000020220000-0x000000002052E000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/2680-555-0x00000000009E0000-0x00000000009F0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/2768-547-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/3184-621-0x0000000000400000-0x00000000004CA000-memory.dmp

                                  Filesize

                                  808KB

                                • memory/3328-200-0x000000001CA10000-0x000000001CA32000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/3328-196-0x000000001C6E0000-0x000000001C77C000-memory.dmp

                                  Filesize

                                  624KB

                                • memory/3328-194-0x000000001B6F0000-0x000000001B73A000-memory.dmp

                                  Filesize

                                  296KB

                                • memory/3328-195-0x000000001C170000-0x000000001C63E000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/3328-198-0x000000001C7C0000-0x000000001C7F4000-memory.dmp

                                  Filesize

                                  208KB

                                • memory/3844-622-0x0000000000400000-0x00000000004CA000-memory.dmp

                                  Filesize

                                  808KB

                                • memory/4456-639-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4456-471-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4456-626-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4456-544-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4456-643-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4456-644-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4456-551-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4456-548-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4456-627-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4456-556-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4456-84-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4456-83-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4456-80-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB